API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

Runscope

Runscope is a SaaS-based company that provides solutions for API performance testing, monitoring and debugging.

Tyk

Tyk is an open source API Gateway that is fast, scalable and modern, and offers an API management platform with an API Gateway, API analytics, developer portal and API Management Dashboard.

Restlet

Restlet is providing the fastest and easiest API-First Platform as a Service that developers and non-developers working on API projects can use.

Dreamfactory

DreamFactory Software develops and markets a technology that enables developers to connect modern mobile applications to enterprise back-end infrastructure in the cloud.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

Transmitting video and sharing content via a network using multiple encoding techniques

Embodiments disclose systems and methods for transmitting user-extracted video and content more efficiently by recognizing that user-extracted video provides the potential to treat parts of a single frame of a user-extracted video differently. An alpha mask of the image part of the user-extracted video is used when encoding the image part so that it retains a higher quality upon transmission than the remainder of the user-extracted video.

  • Pub Date: 2013/31/12
  • Number: 09386303
  • Owner: PERSONIFY, INC.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Tiered application permissions

Methods, systems, and computer-readable media for granting application permissions and providing notifications of API activity are provided. An example method may include processing a request to install an application that requires API calls by the application. The method may further include determining an authoring entity of the application, and determining whether the authoring entity is certified by one or more trusted entities. In addition, the method may include allowing an installation of the application when the authoring entity is certified by at least one trusted entity. An example system may include instructions that, when executed by the one or more processors, cause the one or more processors to process a request to install an application that requires access to one or more APIs, determine a sensitivity level of each of the required APIs, and when the determined sensitivity level of at least one API of the required APIs is associated with a restricted API classification, require that code of the application be delivered using a secure mechanism.

  • Pub Date: 2013/31/12
  • Number: 09280679
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Testing of transaction tracking software

In a method for generating test transactions across computing systems, a first test function of a first program on a first computing system of a plurality of computing systems receives a plurality of instructions, wherein a first instruction of the plurality of instructions is to invoke a first transaction between a second function of the first program and a second program on a second computing system of the plurality of computing systems. The first test function of the first program causes the transaction between the second function of the first program on the first computing system and the second program on the second computing system. The first test function of the first program sends the plurality of instructions to a second test function on a third computing system of the plurality of computing systems, based on a second instruction of the plurality of instructions.

  • Pub Date: 2013/31/12
  • Number: 09378123
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for exchanging contact information and establishing a connection via a social networking service

A method of making it easier for users to interact with each other via a social networking system is disclosed. It is detected that a first user of a social networking system performed an action with respect to a second user of the social networking system. It is interpreted that the action of the first user corresponds to a command that the first user intends to issue to a social networking system, the command pertaining to the second user. The command is processed by the social networking system on behalf of the first user.

  • Pub Date: 2013/31/12
  • Number: 09503413
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for iterative adjustment of video-capture settings based on identified persona

Disclosed herein are systems and methods for iterative adjustment of video-capture settings based on identified persona. In an embodiment, a method includes receiving video frames being captured by a video camera of an ongoing scene. The method also includes identifying a persona in one or more of the received frames at least in part by identifying, in each such frame, a set of pixels that is representative of the persona in the frame and that does not include any pixels representative of a background of the frame. The method also includes selecting, based collectively on the brightness values of the pixels in the identified set of pixels of one or more frames, an adjustment command for one or more adjustable video-capture settings of the camera, as well as outputting the selected commands to the camera for use in continuing to capture video data representative of the ongoing scene.

  • Pub Date: 2013/31/12
  • Number: 09485433
  • Owner: PERSONIFY, INC.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for guided user actions

Systems and methods for guided user actions are described, including detecting a first action performed by a user; gathering information associated with the first action; retrieving a predictive model based on the information; determining an applicability level of the predictive model to the first action, the predictive model suggests a second action; providing the second action in a user interface when the applicability level meets a threshold level; and receiving input from the user selecting the second action or a third action.

  • Pub Date: 2013/31/12
  • Number: 09519408
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for context based image compression

Techniques for compressing images based on context are provided. A first image and a second image may be identified for display on a client device. One or more contexts of the first image may be identified. One or more contexts of the second image may be identified. A first image quality for the first image may be determined based on the one or more contexts of the first image. A second image quality for the second image may be determined based on the one or more contexts of the second image. The first image may be compressed at the first image quality and the second image at the second image quality. The compressed first image and the compressed second image may be transmitted to the client device.

  • Pub Date: 2013/31/12
  • Number: 09224213
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Service access method and device for conducting the same

For service access, a physical address of a specified application service corresponding to a specified IP segment is acquired by a user mode component in accordance with an IP-segment information of the specified IP segment, which is included in a virtual network interface card configured in a system container, and an address information including the physical address is transmitted to a router module of a machine kernel. A routing table is established by the router module in accordance with the address information. Then a network data packet is acquired and forwarded to a destination service site by the router module in accordance with the routing table.

  • Pub Date: 2013/31/12
  • Number: 09407600
  • Owner: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
  • Location: Shenzhen, CN
  • Details: Visit USPTO

Visit USPTO Page


Providing virtual networking functionality for managed computer networks

Techniques are described for providing virtual networking functionality for managed computer networks. In some situations, a user may configure or otherwise specify one or more virtual local area networks (“VLANs”) for a managed computer network being provided for the user, such as with each VLAN including multiple computing nodes of the managed computer network. Networking functionality corresponding to the specified VLAN(s) may then be provided in various manners, such as if the managed computer network itself is a distinct virtual computer network overlaid on one or more other computer networks, and communications between computing nodes of the managed virtual computer network are handled in accordance with the specified VLAN(s) of the managed virtual computer network by emulating functionality that would be provided by networking devices of the managed virtual computer network if they were physically present and configured to support the specified VLAN(s).

  • Pub Date: 2013/31/12
  • Number: 09276811
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Preventing application downgrade in an application store

An application and system are provided that prevent an application repository from accepting a new installation package if the new application installation package would not be successfully installed on devices to which it is directed. The version number and constraints provided with the new application installation package may be compared to that of installation packages already existing or published within the repository to determine whether or not the new installation package will be unreachable by a device group to which it is directed. An indication may be provided if that new installation package is unreachable by at least one device group to which it is directed.

  • Pub Date: 2013/31/12
  • Number: 09367299
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Periodic channel state information (CSI) reporting using a physical uplink control channel (PUCCH)

Technology for periodic channel state information (CSI) reporting using a physical uplink control channel (PUCCH) is disclosed. One method can include a user equipment (UE) generating a CSI report with a physical uplink control channel (PUCCH) first reporting type and a CSI report with a PUCCH second reporting type; and dropping a CSI report with the PUCCH first reporting type of a serving cell when the CSI report with the PUCCH first reporting type has a collision with the CSI report with PUCCH second reporting type of the serving cell. The PUCCH first reporting type can have a lower priority level than the PUCCH second reporting type.

  • Pub Date: 2013/31/12
  • Number: 09554297
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Notification of application permissions

Methods, systems, and computer-readable media for granting application permissions and providing notifications of API activity are provided. An example method may include receiving a first API call by an installed application. The method may further include determining a sensitivity level of the received first API call. The method may further include when the determined sensitivity level of the received first API call is associated with a restricted API classification, determining whether an author of the installed application is an authorized author, and when the author of the installed application is determined to be an authorized author, allowing the received first API call access to its associated API. An example system may include instructions that, when executed by the one or more processors, cause the one or more processors to detect an API call by an application, the API call for accessing data associated with a computing device, determine a sensitivity level of the API call based on the associated data, and provide an indication of the API call based on the determined sensitivity level.

  • Pub Date: 2013/31/12
  • Number: 09256755
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring interactions between two or more objects within an environment

One or more techniques and/or systems are provided for monitoring interactions by an input object with an interactive interface projected onto an interface object. That is, an input object (e.g., a finger) and an interface object (e.g., a wall, a hand, a notepad, etc.) may be identified and tracked in real-time using depth data (e.g., depth data extracted from images captured by a depth camera). An interactive interface (e.g., a calculator, an email program, a keyboard, etc.) may be projected onto the interface object, such that the input object may be used to interact with the interactive interface. For example, the input object may be tracked to determine whether the input object is touching or hovering above the interface object and/or a projected portion of the interactive interface. If the input object is in a touch state, then a corresponding event associated with the interactive interface may be invoked.

  • Pub Date: 2013/31/12
  • Number: 09430093
  • Owner: Microsoft Technology Licensing, LLC.
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer readable mediums for performing workflow credential management in a converged infrastructure system

Methods, systems, and computer readable mediums for performing workflow credential information management in a converged infrastructure system (CIS) are disclosed. According to one example, the method includes, at a credential management interface module (CMIM) associated with a CIS, identifying one or more converged infrastructure elements (CIEs) included in the CIS that are associated with a workflow, obtaining credential information sets for each of the one or more CIEs associated with the workflow, and executing the workflow using the obtained credential information sets.

  • Pub Date: 2013/31/12
  • Number: 09325688
  • Owner: VCE COMPANY, LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for customizing vehicle user interface displays

Methods and systems are provide access to cloud services over the Internet for customizing user interface of a vehicle. One method includes receiving a request to access a server that provides logic for defining a custom user interface for a vehicle associated with a user account. The method also includes receiving selection options for associating applications to the custom user interface. The applications including interfaces associated with functionalities of the vehicle and interfaces for connecting with internet accessible services. The method includes receiving arrangement selections for placing at least one of the interfaces at a user defined location of a display screen of the vehicle. The selection options of the associated applications and the arrangement selections defining the custom user interface for the user account. The method further includes communicating the custom user interface to memory and electronics of the vehicle over a wireless internet connection. The custom user interface is to be rendered on the display screen of the vehicle.

  • Pub Date: 2013/31/12
  • Number: 09372607
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to create a panel of media device users

Methods and apparatus to create a panel of media device users are disclosed. An example method includes identifying a master frame of media devices that have executed an instrumented application. A media device is selected from the master frame. A first instrumented application on the selected media device is instructed to display a recruitment interface to a user associated with the selected media device requesting the user to join the panel.

  • Pub Date: 2013/31/12
  • Number: 09560149
  • Owner: The Nielsen Company (US), LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic update of applications as code is checked-in

Software accesses a code database and determines that a specified percentage of the code in the code database for an application has been updated. The software then accesses an application database and obtains the application as currently deployed. The software obtains one or more application specifications from the application database, based at least in part on a scan of the application. And the software obtains one or more code-module specifications from the code database, based at least in part on the one or more application specifications. The software then determines that an update can be made to the application as currently deployed, based at least in part on code-module dependencies identified in the one or more application specifications and updated code modules for the application in the code database. And the software creates a new version of the application using the updated code modules and deploys the new version.

  • Pub Date: 2013/31/12
  • Number: 09122556
  • Owner: Zynga Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic sandboxing

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for dynamic sandboxing. In one aspect, a method includes obtaining software including program instructions for execution by a data processing apparatus; identifying, from a plurality of predefined software characteristics, software characteristics of the software, each identified software characteristic corresponding to a set of the program instructions included in the software; accessing sandbox data defining, for each of the predefined software characteristics, one or more sandbox methods that are eligible for use when executing program instructions that correspond to the predefined software characteristics; selecting, from a plurality of sandbox methods, one or more sandbox methods based on the identified software characteristics and their respectively corresponding sandbox methods, each of the plurality of sandbox methods comprising sandbox instructions for executing program instructions using fault isolation techniques; and causing execution of the software using the selected sandbox methods.

  • Pub Date: 2013/31/12
  • Number: 09189375
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic presentation of actionable content items

Methods, systems, and computer-readable media are provided for determining and generating content items that provide patient information and content provided by, for example, a third-party content provider that is relevant to information associated with an open healthcare application. The content items are displayed in a separate display space from the healthcare application's user interface and dynamically change and update in response to changes in the information being displayed on the healthcare application's user interface. Additionally, the content items are actionable thereby enabling healthcare providers to address alerts, take actions, view supporting documentation, and the like.

  • Pub Date: 2013/31/12
  • Number: 09483614
  • Owner: CERNER INNOVATION, INC.
  • Location: Kansas City, US
  • Details: Visit USPTO

Visit USPTO Page


Data transmission between devices based on bandwidth availability

In one embodiment, in response to data to be transmitted to or from an electronic device, the electronic device determines whether the electronic device currently has a first network connection with a sufficiently high bandwidth. If the electronic device currently does not have a first network connection with a sufficiently high bandwidth, then the electronic device estimates a future time when the electronic device is likely to have a second network connection with a sufficiently high bandwidth, and schedules transmission of the data at the future time.

  • Pub Date: 2013/31/12
  • Number: 09185048
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Authored injections of context that are resolved at authentication time

Techniques are described for enabling principals to inject context information into a credential (e.g. session credential). Once the credential has been issued, any arbitrary principal is allowed to inject context information into the existing credential. The injected context is scoped to the principal that made the injection. Subsequently, at authentication time, when the credential is used to request access to a particular resource, the system can verify whether the principal that made the injection is trusted and if the principal is deemed trusted, the context information can be applied to a policy that controls access to one or more resources, or can alternatively be translated into some context residing in a different namespace which can then be applied to the policy. In addition, the system enables arbitrary users to insert additional deny statements into an existing credential, which further restrict the scope of permissions granted by the credential.

  • Pub Date: 2013/31/12
  • Number: 09479492
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual file system providing interface between analytics platform and physical file system

A virtual file system is arranged between a physical file system and an analytics platform comprising a plurality of compute nodes, and is configured to control movement of data between the analytics platform and the physical file system. For example, the virtual file system may be configured to present to the analytics platform a software application programming interface (API) through which the analytics platform accesses data stored in the physical file system. The analytics platform illustratively comprises a unified analytics platform that is configurable to support both database analytics and map-reduce analytics. In some embodiments, the physical file system comprises one or more of a Lustre file system, a Hadoop Distributed File System (HDFS) and a General Parallel File System (GPFS), and the virtual file system comprises a parallel log-structured file system (PLFS).

  • Pub Date: 2013/30/12
  • Number: 09305010
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Text import tool for a technical computing environment

A device receives text that includes data values, and parses the text to identify data types associated with the data values. The device generates, based on the data values and the data types, a graphical representation of the text that includes data cells corresponding to the data values, and provides the graphical representation for display. The device receives one or more selections of one or more data cells in the graphical representation, stores the one or more selections as a selection history, and provides the selection history for display.

  • Pub Date: 2013/30/12
  • Number: 09613017
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing ports for RTSP across cores in a multi-core system

The present application is directed towards systems and methods for systems and methods for handling real-time streaming protocol sessions by an intermediary multi-core system. When a multi-core intermediary receives a setup request for a real-time streaming protocol session, the intermediary processes and forwards the request to a server providing the streaming media. The server sets up an RTSP session and transmits a session identification to the multi-core intermediary. A core of the intermediary receives the transmitted session identification and determines an owner core of the session, based on a hash of the session identification. The core transmits the session information to the determined owner core, which selects two consecutive ports on which to establish listening services. The owner core then notifies all other cores to establish listening services on the same consecutive ports, such that any core that receives an RTSP control message from a client can handle it properly.

  • Pub Date: 2013/30/12
  • Number: 09407679
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for improving snapshot performance

Techniques for improving snapshot performance are disclosed. In one embodiment, the techniques may be realized as a method for improving snapshot performance comprising initiating change block tracking for each unit of storage associated with each of a plurality of virtual machines, creating backup images of each unit of storage associated with each of the plurality of virtual machines, quiescing each of the plurality of virtual machines, and creating snapshots of each unit of storage associated with each of the plurality of virtual machines. The techniques may include identifying one or more changed blocks in at least one of the backup images using the change block tracking, editing the at least one of the backup images by replacing the identified one or more changed blocks using corresponding blocks from at least one snapshot of the snapshots, and releasing the at least one snapshot based upon a determination that editing has completed.

  • Pub Date: 2013/30/12
  • Number: 09377964
  • Owner: Veritas Technologies LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for adjusting insurance processes using data from telematics-enabled portable devices

Systems and methods are disclosed herein for transmitting telematics data from a vehicle. The systems include a smartphone holder that provides a communications link between a smartphone and a vehicle computer, through the smartphone dataport and the vehicle onboard diagnostics (OBD) port. The smartphone holder is configured to keep the smartphone in a stable, known position and orientation with respect to the vehicle, such that data from an accelerometer in the smartphone can be calibrated. The smartphone accelerometer data and telematics data from vehicle telematics sensors is then transmitted via the smartphone or stored locally.

  • Pub Date: 2013/30/12
  • Number: 09070168
  • Owner: HARTFORD FIRE INSURANCE COMPANY
  • Location: Hartford, US
  • Details: Visit USPTO

Visit USPTO Page


Request and response aggregation system and method with request relay

A system and method for sending and receiving requests and responses, relaying requests, and aggregating requests and responses to and from social networks are described. In one aspect a system user can send a request to recipients chosen by the user as being people or groups most likely to have useful responses to the request. Recipients can respond to the request, relay the request to one or more additional recipients, or both. The other recipients can further respond to and/or relay the request, etc. The system user who originated the request (also referred to as the request originator, or the originator) has control over which other users, if any, can see the request. For example, the originator can specify that the request not be relayed.

  • Pub Date: 2013/30/12
  • Number: 08949360
  • Owner: crWOWd, Inc.
  • Location: Santa Monica, US
  • Details: Visit USPTO

Visit USPTO Page


Providing memory system programming interfacing

A memory system implements a plurality of cache eviction policies, a plurality of virtual address modification policies, or both. One or more application programming interfaces provide access to memory allocation and parameters thereof relating to zero or more cache eviction policies and/or zero or more virtual address modification policies associated with memory received via a memory allocation request. The provided application programming interfaces are usable by various software elements, such as any one or more of basic input/output system, driver, operating system, hypervisor, and application software elements. Memory allocated via the application programming interfaces is optionally managed via one or more heaps, such as one heap per unique combination of values for each of any one or more parameters including eviction policy, virtual address modification policy, structure-size, and element-size parameters.

  • Pub Date: 2013/30/12
  • Number: 09514053
  • Details: Visit USPTO

Visit USPTO Page


Preview display device, and method and computer readable medium for the same

A preview display device is provided that includes a display unit, and a controller configured to determine whether a print-requested page requested to be printed is permitted to be printed, based on print restriction information, and control the display unit to display a preview image showing a print result of the print-requested page in advance of printing of the print-requested page, in a manner to distinguish the preview image showing the print-requested page determined to be permitted to be printed from the preview image showing the print-requested page determined to be not permitted to be printed.

  • Pub Date: 2013/30/12
  • Number: 09323481
  • Owner: Brother Kogyo Kabushiki Kaisha
  • Location: Nagoya-shi, Aichi-ken, JP
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer readable mediums for updating components in a converged infrastructure system

Methods, systems, and computer readable mediums for updating components in a converged infrastructure system are disclosed. According to one method, the method includes identifying components in a converged infrastructure system that require remediation in order to comply with a defined converged infrastructure configuration and determining remediation content to enable each of the identified components to be compliant with the defined converged infrastructure configuration. The method further includes retrieving the remediation content for the identified components from a repository and utilizing the remediation content to update the identified components on the converged infrastructure system in accordance with the defined converged infrastructure configuration.

  • Pub Date: 2013/30/12
  • Number: 09483281
  • Owner: VCE IP Holding Company LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer readable mediums for generating instruction data to update components in a converged infrastructure system

Methods, systems, and computer readable mediums for generating instruction data to update components in a converged infrastructure system are disclosed. According to one example, a method includes identifying components in a converged infrastructure system that require remediation in order to comply with a defined converged infrastructure configuration and identifying remediation content to enable each of the identified components to be compliant with the defined converged infrastructure configuration. The method further includes determining a remediation process based on the identified remediation content associated with the components of the converged infrastructure system, wherein the determined remediation process includes an order of steps used to update the identified components in the converged infrastructure system. The method also includes generating instruction data indicating the determined remediation process to be applied to the identified components in the converged infrastructure system.

  • Pub Date: 2013/30/12
  • Number: 09389991
  • Owner: VCE COMPANY, LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to measure exposure to streaming media

Methods and apparatus to measure exposure to streaming media are disclosed. An example method includes detecting an ID3 tag associated with streaming media presented at a client device. A first request is sent from the client device to a first internet domain, the first request identifying the streaming media. A redirection message is received from the first internet domain. In response to the redirection message, a second request is sent to a second internet domain specified by the redirection message. A cookie is provided identifying the client device to the second internet domain.

  • Pub Date: 2013/30/12
  • Number: 09332035
  • Owner: The Nielsen Company (US), LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Method for providing application service

A method for providing application service is provided. The method discloses that a user is authenticated according to a received application service acquisition request from a user mobile phone, and when the user authentication is passed, the application service acquisition request is sent to an application server, so that the application server provides an application service to the user mobile phone according to the application service acquisition request. The application server does not need to authenticate the user mobile phone by performing an authentication operation on the user mobile phone through a wireless application protocol gateway, thus being capable of reducing the workload of the application server.

  • Pub Date: 2013/30/12
  • Number: 09198036
  • Owner: SHENZHEN JUNSHENGHUICHUANG TECHNOLOGIES CO., LTD.
  • Location: Shenzhen, CN
  • Details: Visit USPTO

Visit USPTO Page


Method and system for processing a data transfer related to a data-storing card

In a method for processing a data transfer, an electronic device accesses card-specific data and a card account number from a data-storing card. The electronic device generates a device-generated authentication number which is associated with the data transfer, and which is transmitted, together with the card account number and the card-specific data, to a network platform. The network platform compares an inputted authentication number from a portable device and the device-generated authentication number, and transmits to-be-transferred data to the portable device when the authentication numbers correspond with each other.

  • Pub Date: 2013/30/12
  • Number: 09021571
  • Owner: Yi-Fen Chou
  • Location: Keelung, TW
  • Details: Visit USPTO

Visit USPTO Page


Method and system for predicting block failure in a non-volatile memory

A method and system are disclosed for improved block erase cycle life prediction and block management in a non-volatile memory. The method includes the storage device tracking information relating to a first erase cycle count at which the block erase time exceeded a predetermined threshold relative to a first erase cycle at which this occurred in other blocks. Blocks having a later relative erase cycle at which the erase time threshold is exceeded are assumed to have a greater erase cycle life than those that need to exceed the erase time threshold at an earlier erase cycle. This information is used to adjust wear leveling in the form of free block selection, garbage collection block selection and other block management processes. Alternatively or in combination, the predicted erase cycle life information is used to adjust program and/or erase parameters such as erase voltage and time.

  • Pub Date: 2013/30/12
  • Number: 09423970
  • Owner: SanDisk Technologies LLC
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for hosting entity-specific photo-sharing websites for entity-specific digital cameras

A system and method hosts entity-specific photo-sharing websites for entity-specific image capture devices. The system and method provides software for the entity-specific image capture devices that causes the image capture devices to transmit entity ID information when the image capture devices transmit images over the Internet. The system and method further provide an online photosharing service capable of hosting the entity-specific photo-sharing websites for each of the entities, such that when the image capture devices connect to photo-sharing service, the photo-sharing service uses the entity ID received from the image capture devices to automatically associate the image with the photo-sharing websites of the identified entity.

  • Pub Date: 2013/30/12
  • Number: 09118740
  • Owner: KDL Scan Designs LLC
  • Location: Dover, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for adjusting block erase or program parameters based on a predicted erase life

A method and system are disclosed for improved block erase cycle life prediction and block management in a non-volatile memory. The method includes the storage device tracking information relating to a first erase cycle count at which the block erase time exceeded a predetermined threshold relative to a first erase cycle at which this occurred in other blocks. Blocks having a later relative erase cycle at which the erase time threshold is exceeded are assumed to have a greater erase cycle life than those that need to exceed the erase time threshold at an earlier erase cycle. This information is used to adjust wear leveling in the form of free block selection, garbage collection block selection and other block management processes. Alternatively or in combination, the predicted erase cycle life information is used to adjust program and/or erase parameters such as erase voltage and time.

  • Pub Date: 2013/30/12
  • Number: 09329797
  • Owner: SanDisk Technologies Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for delivery of data-based/voice services over piconets and wireless LANs (WLANs) coupled to 3GPP devices including protocol architecture and information elements relating to short message service (SMS) over WLANs

Method and apparatus delivering voice/data services within a piconet operating over a limited range or over a WLAN communicating with 3GPP devices by reformatting data into IP format before delivering to the WLAN. The service is short message service (SMS). Upon receipt of an SMS message, relevant routing information is retrieved. A PDGW address for the SMS message is identified and is sent to the PDGW address which identifies the WLAN user equipment (UE) for receiving the SMS and reformats the SMS message into IP format (text or encapsulation) for delivery to the UE. A protocol architecture is provided for SMS delivery over WLANs, in particular, for UMTS/CDMA based SMS over WLAN through two alternative mechanisms, i.e., SMS tunneling and SMS proxy, for protocols for the delivery of SMS across the WLAN. The invention enhances standard 802.11 in the context of UMTS and CDMA 2000; as well as other scenarios.

  • Pub Date: 2013/30/12
  • Number: 09332415
  • Owner: InterDigital Technology Corporation
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Managing external communications for provided computer networks

Techniques are described for providing managed computer networks. In some situations, the techniques include managing communications for computing nodes of a managed computer network by using a pool of multiple alternative intermediate destinations to forward at least some communications to other final destinations. For example, a manager module associated with a source computing node may select a particular one of multiple alternative intermediate destinations to use for one or more particular communications from the source computing node to an indicated final destination, such as based on network addresses associated with the source computing node and/or the final destination. The multiple alternative intermediate destinations may have various forms, including multiple alternative edge devices at a first location at which various computing nodes are co-located that operate to manage communications between those co-located computing nodes at the first location and other external computer systems at one or more other locations.

  • Pub Date: 2013/30/12
  • Number: 09356860
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Local rendering of an object as an image

Techniques for locally rendering an object as an image may be provided. For example, an application may be executed by a computing device to access and retrieve information from a network-based resource and may display the retrieved information to a user of the computing device. In response to identifying (e.g., by way of a user selection or an automated selection) of an object within the displayed information, the application may locally process the object to generate a graphics object. Further, the application may configure the graphics object to support image-rendering operations by, for example, importing properties from the object into the graphics object and storing the graphics object as binary data at a location in a local memory of the application. Subsequently, the application may use the binary data and the location in the local memory to render an image based on the graphics object.

  • Pub Date: 2013/30/12
  • Number: 09460062
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Interconnection method, apparatus, and system based on socket remote invocation

An interconnection method, apparatus, and system where a remote Socket invocation client component obtains information about a first socket application programming interface Socket application programming interface (API) function invoked by a service client; encapsulates the information about the first Socket API function to a message structure; and sends the message structure, so that a remote Socket invocation server executes a second Socket API function corresponding to the first Socket API function in the message structure. The interconnection method, apparatus, and system solve the problem of an interconnection on a public network between the service client on a first local area network and a service server on a second local area network.

  • Pub Date: 2013/30/12
  • Number: 09137334
  • Owner: Huawei Technologies Co., Ltd.
  • Location: Shenzhen, CN
  • Details: Visit USPTO

Visit USPTO Page


Identifying entries in a location store associated with a common physical location

A social networking system generates a location store based on information received from its users. The location store includes entries having a physical location description and one or more terms associated with the physical location description. One or more entries associated with physical location descriptions within an area are identified. A local frequency of occurrence of each term in the identified entry is determined, and a global frequency of occurrence of each term in the identified entries within the location store is determined. Trending terms in the identified entries are determined based on the local frequencies and the global frequencies. Identified entries are compared to each other, with a score based on differing terms in compared entries and whether the differing terms are trending terms is generated. If a score is less than a threshold value, a combined entry is generated from the compared entries.

  • Pub Date: 2013/30/12
  • Number: 09430495
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying descriptive terms associated with a physical location from a location store

A social networking system generates a location store based on information received from its users. The location store includes entries having a physical location description and one or more terms associated with the physical location description. One or more entries associated with physical location descriptions within an area are identified. A local frequency of occurrence of each term in the identified entry is determined, and a global frequency of occurrence of each term in the identified entries within the location store is determined. Trending terms in the identified entries are determined based on the local frequencies and the global frequencies. Identified entries are compared to each other, with a score based on differing terms in compared entries and whether the differing terms are trending terms is generated. If a score is less than a threshold value, a combined entry is generated from the compared entries.

  • Pub Date: 2013/30/12
  • Number: 09613054
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Graphical data conversion/translation

One or more computer-readable storage media for storing computer-executable instructions executable by processing logic is provided. The media storing one or more instructions that when executed by the processing logic causes the processing logic to receive data in a first format for conversion to a second format different than the first format, wherein the data includes information having a first type and information having a second type and display the data in the first format via a graphical interface. One or more translation rules are received relating to processing the information having the first type or the information having the second type. The one or more translation rules are pre-applied to the data in the first format. Effects of the pre-applied rules on the displayed data are displayed via the graphical interface. The data in the first format is converted to the data in the second format based on the one or more translation rules.

  • Pub Date: 2013/30/12
  • Number: 09454513
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Generating member profile recommendations based on connection timing data in a social graph

Systems and methods for generating recommendations based on data derived from a social network are described. For example, a first indirect connection of a source member profile may be identified. The first indirect connection is a member profile connected to the source member through a first connection path. A second indirect connection of the source member profile is also identified. The second indirect connection is a member profile connected to the source member through a second connection path. A selection is made between the first indirect connection and the second indirect connection based on a comparison of timing scores calculated for the indirect connections. The selected indirect connection is then surfaced to a client device associated with the source member profile.

  • Pub Date: 2013/30/12
  • Number: 09361006
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Feed routing for object based collaboration

Systems and methods for routing activity information related to objects in an external application to activity feeds associated with users in a collaboration group are disclosed. When activity information is received, it is routed to collaboration group feeds and user feeds based on a set of routing tables. The routing tables associated objects with events, containers, collaboration groups, and finally users. Based on the routing tables, users who belong to a collaboration groups that are associated with a particular object may see the activity information about that object rendered in an activity feed if the external application grants them permission to access the object. Accordingly, security associated with the object in the external application can be maintained when event information about that object is shared in an activity feed in a collaboration system.

  • Pub Date: 2013/30/12
  • Number: 09356978
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Enhancing user experience by presenting past application usage

Past usage of an application is presented in order to enhance the experience of a user with an application. An application is executed in a hosted environment in one or more computing devices. Input commands may be obtained from a client and provided to the application. A real-time state of the application may be recorded as the application is executed in the hosted environment. The real-time state of the application that has been recorded may be replayed.

  • Pub Date: 2013/30/12
  • Number: 09409090
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Document synchronization solution

A method for synchronizing a database with displayed data, includes providing a data feed to receive data from the database to provide displayed document data, detecting a database change to the data within the database by a database synchronizer to provide a change event, polling the database synchronizer using an HTTP message to detect the change event, and pushing the database change to the displayed document data to update the displayed document data in accordance with the database change and the polling. The polling includes long polling and short polling. A polling servlet within the database synchronizer performs the polling by the database synchronizer. The database synchronizer updates the displayed document data by way of a data structure. The data structure is a queue.

  • Pub Date: 2013/30/12
  • Number: 09251236
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Database hierarchical inheritance

A database system comprising a plurality of access keys stored in a first data memory device sector, each access key associated with a node value stored in a second data memory device sector. An access key processor configured to receive an input value and return the associated node value for the input value if the input value matches an access key stored in the first data memory device sector. The access key processor is configured to generate a revised input value if the input value does not match an access key stored in the first data memory device; a default node value stored in the second data memory device sector and associated with a portion of the input value, wherein the access key processor is configured to return the default node value as part of the revised input value.

  • Pub Date: 2013/30/12
  • Number: 09418240
  • Owner: CONEXANT SYSTEMS, INC.
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Counter operation in a state machine lattice

Disclosed are methods and devices, among which is a device that includes a finite state machine lattice. The lattice may include a counter suitable for counting a number of times a programmable element in the lattice detects a condition. The counter may be configured to output in response to counting the condition was detected a certain number of times. For example, the counter may be configured to output in response to determining a condition was detected at least (or no more than) the certain number of times, determining the condition was detected exactly the certain number of times, or determining the condition was detected within a certain range of times. The counter may be coupled to other counters in the device for determining high-count operations and/or certain quantifiers.

  • Pub Date: 2013/30/12
  • Number: 09058465
  • Owner: Micron Technology, Inc.
  • Location: Boise, US
  • Details: Visit USPTO

Visit USPTO Page


Automated establishment of access to remote services

A software application designed to operate within an enterprise system is modified to operate properly within a system of a third-party provider. In one embodiment, a site manager obtains pertinent information about the software application from the source systems that make up the enterprise system and provides it to a cloud manager, and the cloud manager uses the information to generate a modified version of the software application for use on the cloud provider. The modification may include operations such as driver injection, file system mounting customization, customization of hostname-to-network address mappings, and boot image creation. Secure connections may also be established between the enterprise system and third-party provider to allow the application running on the third-party provider to access the services of the enterprise system.

  • Pub Date: 2013/30/12
  • Number: 09602344
  • Owner: CLOUDVELOX, INC.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive hardware reconfiguration of configurable co-processor cores for hardware optimization of functionality blocks based on use case prediction, and related methods, circuits, and computer-readable media

Adaptive hardware reconfiguration of configurable co-processor cores for hardware optimization of functionality blocks based on use case prediction, and related methods, circuits, and computer-readable media are disclosed. In one embodiment, an indication of one or more applications for possible execution is received. Execution probabilities for respective ones of the one or more applications are received. One or more mappings of the one or more applications to one or more functionality blocks is accessed, and a net benefit of hardware reconfiguration of one or more configurable co-processor cores of a multicore central processing unit for the one or more functionality blocks is calculated based on the execution probabilities and the mappings. An optimal hardware reconfiguration is determined based on a current hardware configuration and the calculated net benefit. The configurable co-processor cores are reconfigured based on the optimal hardware reconfiguration.

  • Pub Date: 2013/30/12
  • Number: 09286084
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for informing fuel efficient driving

A method and system for informing fuel efficient driving are provided. The method includes collecting, by a controller, vehicle context data that includes fuel consumption per second and calculating a fuel efficiency influencing factor that includes a driving time after starting an engine based on the vehicle context data. The fuel efficiency influencing factor is stored in a database and a driving propensity of a driver is analyzed based on the data stored in the database. Further, fuel efficiency analysis data that includes a fuel efficient driving index is produced a fuel efficiency analysis result based on the fuel efficiency analysis data is displayed.

  • Pub Date: 2013/29/12
  • Number: 09098952
  • Owner: Hyundai Motor Company
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Driverless vehicle commerce network and community

A method, device, and system of a driverless automobile commerce network and community is disclosed. Disclosed are methods and a system of associating a unique identifier associated with a driverless vehicle (DV) with an automobile sharing server, periodically analyzing a location of the DV based on a geospatial data associated with the location of the DV, and declaring a non-transitory location of the DV based on a predictable behavior algorithm. An owner of the DV is permitted to list the DV on an automobile sharing network. The methods and system comprise processing a payment of a renter of the DV in a threshold radial distance from the DV when the DV is at the non-transitory location for a predictably available period of time and crediting a financial account of the owner of the DV with the payment of the renter in the threshold radial distance from the DV when the DV is at the non-transitory location for the predictably available period of time.

  • Pub Date: 2013/28/12
  • Number: 09459622
  • Owner: LEGALFORCE, INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Agile acquisition of location services in a device

Aspects of the disclosure permit agile acquisition of a location service in a device. In one aspect of such acquisition, the device can rely on location signals available globally in order to determine a region associated with the device, and in response to determination of the region, the device can acquire service information representative or otherwise indicative of the location service based at least on the region. In another aspect, the device can be configured to consume the location service. The agility of such acquisition can stem from the absence of (i) scanning for location services associated with the area in which the device is present and/or (ii) a predefined pool of location services established in production of the device.

  • Pub Date: 2013/28/12
  • Number: 09188446
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Variably controlling access to content

A software module is presented that enables a person to determine the relevance of a document while preventing the person from making a copy of the entire document. In one embodiment, this is accomplished by programmatically controlling which portions of a document will be presented to a user and which portions will not be presented to the user. In one embodiment, the software module is used in conjunction with a search engine to present a document search result.

  • Pub Date: 2013/27/12
  • Number: 08838645
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for populating a content stream on a mobile device

Techniques for populating a content stream of a mobile application are described. A content request for content to be presented in a personalized activity or content stream of a member of a social networking service is communicated from a mobile computing device to a content server. The content request includes a member identifier, location information indicating the current location of the member, and/or an activity status identifier indicating an inferred physical activity state of the member. Using the information received with the content request, a content selection and relevance module will process the request and provide contextually relevant content for presentation in the member's activity or content stream, at the mobile device.

  • Pub Date: 2013/27/12
  • Number: 09225522
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing location based services

An subscriber location device for determining location information for User Equipment (UE) in a communication network monitors a network interface between a Mobility Management Entity node and an Evolved Serving Mobile Location Center (E-SMLC) node, receive location information from network interface between the MME node and the E-SMLC node, associates the received location information with corresponding UE to yield associated location information and stores the associated location information in a subscriber location database, indexed according to the UE.

  • Pub Date: 2013/27/12
  • Number: 09055547
  • Owner: Tektronix, Inc.
  • Location: Beaverton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for generating expert curated results

Aspects and embodiments are directed to systems and methods for managing validated information. Validated information can leverage previous research on an issue, track social interaction around the issue, and simplify any request from information on the same or related problems. Additionally, validated information can include background information on an issue being addressed (e.g., a tech support question), information on how the issue was resolved, links to source information used to resolve the issue, and can provide information on whether the resolution continues to be effective for other users. According to some embodiments, validated information can be organized into answer objects configured to provide an answer to a technical question. According to one embodiment, this capture of information into a validated knowledge base facilitates subsequent requests and better leverages the best resolutions by tracking, scoring, and elevating search results (including, for example, answer objects) and/or users that are the most effective.

  • Pub Date: 2013/27/12
  • Number: 09489460
  • Details: Visit USPTO

Visit USPTO Page


N-node virtual link trunking (VLT) systems management plane

Aspects of the present invention include an N-Node virtual link trunking (VLT) system comprising a set of N nodes collectively provide a logical fabric-level view that is consistent across the set of N nodes. Embodiments of the N-Node VLT system comprise a control plane mechanism to provide Layer multipathing between access network devices (switches or servers) and the core network. The N-Node VLT system provides a loop-free topology with active-active load-sharing of uplinks from access to the core. Accordingly, the N-Node VLT system eliminates the disadvantage of Spanning Tree Protocol (STP) (active-standby links) by allowing link aggregation group (LAG) terminations on multiple separate distribution or core switches and also supporting a loop-free topology. Additional benefits of an N-Node VLT system include, but are not limited to, higher resiliency, improved link utilization, and improved manageability of the network.

  • Pub Date: 2013/27/12
  • Number: 09276815
  • Owner: DELL PRODUCTS L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


N-node virtual link trunking (VLT) systems fault management

Aspects of the present invention include an N-Node virtual link trunking (VLT) system comprising a set of N nodes collectively provide a logical fabric-level view that is consistent across the set of N nodes. Embodiments of the N-Node VLT system comprise a control plane mechanism to provide Layer 2 multipathing between access network devices (switches or servers) and the core network. The N-Node VLT system provides a loop-free topology with active-active load-sharing of uplinks from access to the core. Accordingly, the N-Node VLT system eliminates the disadvantage of Spanning Tree Protocol (STP) (active-standby links) by allowing link aggregation group (LAG) terminations on multiple separate distribution or core switches and also supporting a loop-free topology. Additional benefits of an N-Node VLT system include, but are not limited to, higher resiliency, improved link utilization, and improved manageability of the network.

  • Pub Date: 2013/27/12
  • Number: 09288105
  • Owner: DELL PRODUCTS L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


N-node virtual link trunking (VLT) systems data plane

Aspects of the present invention include an N-Node virtual link trunking (VLT) system comprising a set of N nodes collectively provide a logical fabric-level view that is consistent across the set of N nodes. Embodiments of the N-Node VLT system comprise a control plane mechanism to provide Layer 2 multipathing between access network devices (switches or servers) and the core network. The N-Node VLT system provides a loop-free topology with active-active load-sharing of uplinks from access to the core. Accordingly, the N-Node VLT system eliminates the disadvantage of Spanning Tree Protocol (STP) (active-standby links) by allowing link aggregation group (LAG) terminations on multiple separate distribution or core switches and also supporting a loop-free topology. Additional benefits of an N-Node VLT system include, but are not limited to, higher resiliency, improved link utilization, and improved manageability of the network.

  • Pub Date: 2013/27/12
  • Number: 09264308
  • Owner: DELL PRODUCTS L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


N-node virtual link trunking (VLT) systems control plane

Aspects of the present invention include an N-Node virtual link trunking (VLT) system comprising a set of N nodes collectively provide a logical fabric-level view that is consistent across the set of N nodes. Embodiments of the N-Node VLT system comprise a control plane mechanism to provide Layer 2 multipathing between access network devices (switches or servers) and the core network. The N-Node VLT system provides a loop-free topology with active-active load-sharing of uplinks from access to the core. Accordingly, the N-Node VLT system eliminates the disadvantage of Spanning Tree Protocol (STP) (active-standby links) by allowing link aggregation group (LAG) terminations on multiple separate distribution or core switches and also supporting a loop-free topology. Additional benefits of an N-Node VLT system include, but are not limited to, higher resiliency, improved link utilization, and improved manageability of the network.

  • Pub Date: 2013/27/12
  • Number: 09264347
  • Owner: DELL PRODUCTS L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


N-node virtual link trunking (VLT) systems and methods

Aspects of the present invention include an N-Node virtual link trunking (VLT) system comprising a set of N nodes collectively provide a logical fabric-level view that is consistent across the set of N nodes. Embodiments of the N-Node VLT system comprise a control plane mechanism to provide Layer 2 multipathing between access network devices (switches or servers) and the core network. The N-Node VLT system provides a loop-free topology with active-active load-sharing of uplinks from access to the core. Accordingly, the N-Node VLT system eliminates the disadvantage of Spanning Tree Protocol (STP) (active-standby links) by allowing link aggregation group (LAG) terminations on multiple separate distribution or core switches and also supporting a loop-free topology. Additional benefits of an N-Node VLT system include, but are not limited to, higher resiliency, improved link utilization, and improved manageability of the network.

  • Pub Date: 2013/27/12
  • Number: 09288138
  • Owner: DELL PRODUCTS L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-domain applications with authorization and authentication in cloud environment

A multi-domain application requiring SSO and SLO operations in cloud environment is presented. The computing system of the multi-domain application includes a multi-domain service (MDS) to redirect the calls for the multi-domain application to an identity provider to authenticate the user or to invoke the single logout services (SLOs) on the domains of the multi-domain application and to invalidate the user sessions on the domains. A cookie that includes the multi-domain application URL is generated to reach the assertion consumer service (ACS) and the single logout service (SLO) that receive an identity assertion response from the identity provider. Domain specific SLOs are provided. A trust between these domain specific SLOs and the SLO is provided based on service provider keys. The SAML mechanism for a logout scenario is reused for communication between the SLO and the domain specific SLOs, where the SLO plays a role of a local IDP.

  • Pub Date: 2013/27/12
  • Number: 09386007
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Model augmentation in a model-driven application development environment

A principal model is configured to facilitate automatic generation of at least one resource for use by a computer-executable application. The principal model includes a group of classes, references, attributes, and associations between any of the classes. At least one model item required for a task that is absent from the principal model is identified. The absent model item is instantiated in a decoration model that operates with the principal model to augment operational functionality of the principal model. The decoration model includes a class, a reference, and an attribute for any corresponding one of the group of classes, references, and attributes of the principal model.

  • Pub Date: 2013/27/12
  • Number: 09513879
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for genetic analysis

This disclosure provides systems and methods for sample processing and data analysis. Sample processing may include nucleic acid sample processing and subsequent sequencing. Some or all of a nucleic acid sample may be sequenced to provide sequence information, which may be stored or otherwise maintained in an electronic storage location. The sequence information may be analyzed with the aid of a computer processor, and the analyzed sequence information may be stored in an electronic storage location that may include a pool or collection of sequence information and analyzed sequence information generated from the nucleic acid sample. Methods and systems of the present disclosure can be used, for example, for the analysis of a nucleic acid sample, for producing one or more libraries, and for producing biomedical reports. Methods and systems of the disclosure can aid in the diagnosis, monitoring, treatment, and prevention of one or more diseases and conditions.

  • Pub Date: 2013/27/12
  • Number: 09128861
  • Owner: Personalis, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for traffic metering to limit a received packet rate

One embodiment provides a network device. The network device includes a a processor including at least one processor core; a network interface configured to transmit and receive packets at a line rate; a memory configured to store a scheduler hierarchical data structure; and a scheduler module. The scheduler module is configured to prefetch a next active pipe structure, the next active pipe structure included in the hierarchical data structure, update credits for a current pipe and an associated subport, identify a next active traffic class within the current pipe based, at least in part, on a current pipe data structure, select a next queue associated with the identified next active traffic class, and schedule a next packet from the selected next queue for transmission by the network interface if available traffic shaping token bucket credits and available traffic class credits are greater than or equal to a next packet credits.

  • Pub Date: 2013/27/12
  • Number: 09450881
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for detecting and resolving conflicts in an automatic content recognition based system

A device that handles operations for automatic content recognition detects utilizing the automatic content recognition (ACR) operations, a conflict when a first overlay and a second overlay are concurrently presented on a channel on the device. The device may modify the presentation of the first overlay and/or the second overlay for the channel based on the detection. The device utilizes the ACR operations to determine an identity of the channel based on a unique identifier such as a channel logo. The device utilizes the ACR operations to determine a location where the first overlay and/or the second overlay is presented based on the channel identity and may relocate the first overlay and/or the second overlay from the determined location to a new location. If the conflict is detected, the device may be resize, defer or cancel presentation of one of the first overlay and/or the second overlay for the channel.

  • Pub Date: 2013/27/12
  • Number: 09154841
  • Owner: Turner Broadcasting System, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and device for loudness level determination

A method on a mobile device for providing an audio output to a user at a determined loudness level is described. A text input is received. A loudness level of an audio output, corresponding to the text input, is determined based on a volume setting of the mobile device and a non-linear adjustment of the volume setting. The audio output is provided to an audio output component at the determined loudness level.

  • Pub Date: 2013/27/12
  • Number: 09225815
  • Owner: Google Technology Holdings LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Media service delivery system providing conditional access to media content from various client devices

A system for protecting the digital rights of content owners allows digital media to be delivered to only those media rendering client devices that have been approved for the media content. Before delivering requested media, the media service provider may determine whether the media rendering client device that requested the media is the type of device that is authorized to receive the request media. If it is, the media service provider may transmit the media to a middleman server over a network (such as the Internet). A middleman server may then serve the media to the client device over a local network. By allowing the media content to be distributed to approved devices only, the media service provider can prevent a user from using the media in a way that is not authorized by the content owner.

  • Pub Date: 2013/27/12
  • Number: 09465945
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Managing nodes in a distributed computing environment

Various embodiments of systems and methods for managing a plurality of nodes in a distributed computing environment are described herein. Initially a request to process a to-be-processed request is received. Next one or more nodes from a plurality of nodes, included in a cluster, is identified to process the to-be-processed request. Next the to-be-processed request is divided into a plurality of sub-requests. Next the plurality of sub-requests are assigned to the identified one or more nodes and the generated additional node. A node failure of one of the one or more identified nodes is identified. Finally, one or more of the plurality of sub-requests assigned to the failed node is re-assigned to another node of the plurality of nodes.

  • Pub Date: 2013/27/12
  • Number: 09348709
  • Owner: SYBASE, INC.
  • Location: Dublin, US
  • Details: Visit USPTO

Visit USPTO Page


Machine-to-machine service based on common data format

A method, a device, and a non-transitory storage medium having instructions to establish a connection with the simple sensor device; receive sensor data from the simple sensor device via the connection; convert the sensor data into common data of a common data format, wherein the common data includes metadata that supports an ontology; store the common data; and transmit the common data to a network device of a network.

  • Pub Date: 2013/27/12
  • Number: 09380060
  • Owner: Cellco Partnership
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Global contact synchronization

A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive non-calendaring related context information, and, based on that context information, to automatically determine one or more parameters of a meeting request.

  • Pub Date: 2013/27/12
  • Number: 08798596
  • Details: Visit USPTO

Visit USPTO Page


Functionality watermarking and management

A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to perform at least one function of a user device and identifying at least one watermark template. The method further includes applying the at least one watermark template to at least one function of the user device and authorizing the request to perform the at least one function of the user device.

  • Pub Date: 2013/27/12
  • Number: 09195811
  • Owner: AirWatch LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic programmable texture sampler for flexible filtering of graphical texture data

For a given texture address, a multi-mode texture sampler fetches and reduces texture data with a multi-mode filter accumulator suitable for providing a weighted average over a variety of filter footprints. A multi-mode texture sampler is configurable to provide both a wide variety of footprints and allow for a filter footprint significantly wider than the bi-linear (2×2 texel) footprint. In embodiments, filter coefficients specifying a weighting for each texel in a flexible footprint are cached from coefficient tables stored in memory. Techniques and systems are provided for dynamic allocation, update and handling of weighting coefficient tables as resources independent of sampler state.

  • Pub Date: 2013/27/12
  • Number: 09355465
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Decision making using algorithmic or programmatic analysis

A system for determining an instruction in a first time limit that can be executed by an executing system is disclosed. The system is configured to request proposed action regarding an event from each of a plurality of operator systems. In some embodiments, the system can calculate a score for each of the proposed actions received from the plurality of operator systems. The system can then automatically determine an instruction in a first time limit based on the calculated scored and command the executing system to execute the instruction.

  • Pub Date: 2013/27/12
  • Number: 08781987
  • Details: Visit USPTO

Visit USPTO Page


Cloud black box for cloud infrastructure

A cloud black box (CBB) subsystem in a cloud computing infrastructure includes CBB storage and computer processing circuitry executing a CBB application having first and second operating modes. In a depository mode information messages are continually received from hardware computing devices during normal operation and device information from the messages is stored into the CBB storage. The information messages are generated by CBB agents executing on the hardware computing devices, which continually collect the device information and generate the information messages according to a common information transfer protocol. In a retrieval mode, device information in the CBB storage is provided to a requestor such as a data analysis application, which may be part of or external to the CBB subsystem. The CBB subsystem operates independently and remains available upon failure of hardware or software components in the cloud infrastructure, providing a centralized source of information for diagnosis or other analysis.

  • Pub Date: 2013/27/12
  • Number: 09307015
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Call handoff between different networks for hybrid mobile device

Disclosed are techniques for hosting a communication session in a call server between communication devices. The call server functions as a bridge service between the communication devices joining an original communication link between the first communication device and the call server with a second communication link between the second communication device and the call server. The first communication device includes at least two RF transceivers each capable of communicating with the call server over a separate network using separate telephone numbers. The call server establishes an alternate communication link with the first communication device on an alternate network and joins it with the second communication link before disabling the original communication link to maintain the communication session between the communication devices.

  • Pub Date: 2013/27/12
  • Number: 08897265
  • Owner: Bandwidth.com, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Aggregated actions

Exemplary methods, apparatuses, and systems receive a first plurality of actions from a first entity with respect to a first plurality of objects. A global object related to each of the first plurality of objects is determined and a representation of the global object is displayed in association with a representation of the first entity. Additionally, in response to receiving user feedback on the representation of the global object displayed in association with the representation of the first entity, an instance of the global object that is unique to the first entity is created. The displayed representation of the global object is converted into a representation of the instance of the global object that is unique to the first entity.

  • Pub Date: 2013/27/12
  • Number: 09349020
  • Owner: FACEBOOK, INC.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for adding users to a networked computer system

Systems and methods are provided for adding new nodes to a computer networked system. The systems and methods may identify a first set of nodes in a networked computer system. The first set of nodes may be included in a first hash computation that clusters the first set of nodes into communities. An application shard space including a first space and a second space may be generated. The first set of nodes may be mapped to application shards in the first space based on the first hash computation. The application shards in the first space may be assigned to a first set of machines of the networked computer system. The second space may be maintained for mappings of nodes not included in the first hash computation to application shards in the second space.

  • Pub Date: 2013/26/12
  • Number: 09652554
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


System, apparatus and method for integrated wireless link management for a multi-polarized antenna system

According to one embodiment of the disclosure, a non-transitory computer-readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations. One of these operations comprises transmitting, from a first device to a second device, a first plurality of frames using a first polarization configuration for a first antenna corresponding to the first device. Based on feedback information associated with the first plurality of frames, a second polarization configuration, which is different than the first polarization configuration, is selected for transmitting a second plurality of frames. Thereafter, the second plurality of frames is transmitted from the first device to the second device using the second polarization configuration for the first antenna.

  • Pub Date: 2013/26/12
  • Number: 09312944
  • Owner: ARUBA NETWORKS, INC.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method to extend the capabilities of a web browser of a web application issue root cause determination techniques

Disclosed is a system and method for extending the web application root cause determination functionality to a web browser. In one aspect, the present invention plots the network topology diagram for the web application by executing network trace commands. In another aspect, the present invention allows user to upload their web application network topology diagram. In another aspect, the present invention allows user to build their web application network topology diagram using UI Devices Toolkit. The present invention collects the information relating to the web application issue from various entities such as network infrastructure devices, servers through ICMP, SNMP, TRAP, SYS/APPLOG, HTTP and Network traffic analysis. In one aspect, the present invention highlights the entity in the web application network topology diagram based on the collected information and provides the experts recommended suggestion for the issue through Internet web search query.

  • Pub Date: 2013/26/12
  • Number: 09154383
  • Details: Visit USPTO

Visit USPTO Page


System and method for hardware based security

An asset management system is provided, which includes a hardware module operating as an asset control core. The asset control core generally includes a small hardware core embedded in a target system on chip that establishes a hardware-based point of trust on the silicon die. The asset control core can be used as a root of trust on a consumer device by having features that make it difficult to tamper with. The asset control core is able to generate a unique identifier for one device and participate in the tracking and provisioning of the device through a secure communication channel with an appliance. The appliance generally includes a secure module that caches and distributes provisioning data to one of many agents that connect to the asset control core, e.g. on a manufacturing line or in an after-market programming session.

  • Pub Date: 2013/26/12
  • Number: 09183158
  • Owner: Certicom Corp.
  • Location: Mississauga, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Self-service testing

An architecture and techniques for implementing a unified and extensible meta-testing framework within a distributed environment. This framework allows entities within the distributed environment to run tests written in different testing frameworks in a unified way. In addition, this disclosure describes techniques for allowing an entity within the distributed environment to test itself, both from its own perspective as well as from the perspective of other entities within the distributed environment.

  • Pub Date: 2013/26/12
  • Number: 09053084
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Providing personalized platform application content

A social networking website maintains a profile for each user of the website. The profile includes data associated with a user, such as a connection to one or more plurality of other users of the social networking website or user preferences. The social networking website communicates with one or more third-party application servers to provide one or more applications to social networking website users. When a social networking website user requests an application provided by a third-party application server, the social networking website communicates a subset of the user's profile to the third-party application server, allowing the third-party application server to use this profile data to personalize the application performed for the user. A privacy setting associated with a user profile allows the social networking website to limit the profile data communicated to the third-party application server.

  • Pub Date: 2013/26/12
  • Number: 08886718
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Namespace and storage management application infrastructure for use in management of resources in a storage system environment

A namespace and storage management (NSM) application includes an infrastructure configured to enable efficient management of resources in a storage system environment. The NSM application executes on a NSM console and interacts with an NSM server to integrate namespace management and storage management in the storage system environment. The NSM server, in turn, interacts with one or more remote agents installed on host machines in the environment to convey application programming interface (API) function calls that enable remote management of the resources.

  • Pub Date: 2013/26/12
  • Number: 09270741
  • Owner: NETAPP, INC.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for deploying content to wireless devices

A method and system for deploying content to devices is provided. The method and system can be used to deploy markup content to web browser applications on wireless devices. The wireless devices may included, for example, WAP phones, HDML phones, Palm VII, Palm V, etc. The method and system can also be used in conjunction with wired systems. A translator receives data, in a variety of formats, from the wireless devices. The translator then translates the data into a standardized format. A content provider interface receives the data in the standardized format and provides content data, also in the standardized format. The content data in the standardized format is provided to a transformer. The transformer transforms the content data into the pre-selected format for the particular wireless device. The content data can then be utilized and manipulated by the wireless device.

  • Pub Date: 2013/26/12
  • Number: 09418053
  • Owner: ZHIGU HOLDINGS LIMITED
  • Location: Grand Cayman, KY
  • Details: Visit USPTO

Visit USPTO Page


Integrated circuit defect detection and repair

In accordance with the present description, a device includes an internal defect detection and repair circuit which includes a self-test logic circuit built in within the device and a self-repair logic circuit also built in within the device. In one embodiment, the built in self-test logic circuit may be configured to automatically identify defective memory cells in a memory. Upon identifying one or more defective memory cells, the built in self-repair logic circuit may be configured to automatically repair the defective memory cells by replacing defective cells with spare cells within the memory.

  • Pub Date: 2013/26/12
  • Number: 09564245
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


In-place recipient preservation

One or more indirect recipients of a communication item within a communication management application (CMA) may be preserved in-place. Indirect recipients include individual recipients within a distribution list (DL) via TO, carbon copy (CC), and/or blind carbon copy (BCC) fields of the communication item. At time of submission of the communication item, the CMA in conjunction with an assistant service may expand the DL to retrieve a list of individual recipients from the DL. The DL may be expanded by querying a directory server associated with the CMA. The DL expansion list may be saved to the communication item at the CMA by updating one or more properties of the communication item according to the expansion list. The DL expansion list may then be referenced for indexing so that a discovery search may be performed in-place at the CMA if and when the search is needed.

  • Pub Date: 2013/26/12
  • Number: 09378236
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Independent targeted sponsored content management system and method

A system may include a database configured with individual partitions, one of the partitions corresponding to a sponsored content campaign of a social network. The system may further include multiple servers each communicatively coupled to the database, and each configured to implement a campaign having a campaign termination criterion. Each of the servers may include a processor configured to track sponsored content event data received from a user device based on the campaign and transmit the event data to the database and terminate the campaign based on a comparison of the event data as received from a partition of the database corresponding to the campaign and an estimation of event data not received from the database. The database may be configured to store the event data as received from the servers in the partition corresponding to the campaign upon receipt of the event data.

  • Pub Date: 2013/26/12
  • Number: 09286621
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic delivery and integration of static content into cloud

A documentation application periodically checks content of a documentation repository to determine whether the documentation repository includes documentation content for update. A documentation archive for update is retrieved from the documentation repository and parsed to read meta information specified in the documentation archive. Based on the meta information, content of the documentation archive for update is integrated into the documentation application at runtime of the documentation application.

  • Pub Date: 2013/25/12
  • Number: 09274783
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Wireless communication terminal, wireless communication method, and wireless communication system

A wireless communication terminal according to an embodiment includes a wireless LAN communication unit, a prediction unit which predicts a moving area of a user, an estimation unit, and a communication control unit. The estimation unit estimates a switching state of a wireless LAN connection in the wireless LAN communication unit, on the basis of a wireless LAN communication environment in the moving area predicted by the prediction unit. The communication unit restricts the wireless LAN connection in the wireless LAN communication unit, on the basis of the switching state estimated by the estimation unit.

  • Pub Date: 2013/24/12
  • Number: 09301277
  • Owner: YAHOO JAPAN CORPORATION
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Systems and techniques for control of storage device power states

Systems and techniques for control of storage device power states are described herein. In some embodiments, a control system for a storage device of a computing device may include receiver logic to receive a proximity signal indicative of a distance of a user from a proximity sensor, transition logic to determine that the proximity signal satisfies out-of-proximity criteria and generate an out-transition signal based at least in part on the determination that the proximity signal satisfies the out-of-proximity criteria, and state-change logic to cause a change in a power state of the storage device from a first power state to a second power state, in response to the out-transition signal, wherein the storage device consumes less power in the second power state than in the first power state. Other embodiments may be described and/or claimed.

  • Pub Date: 2013/24/12
  • Number: 09348405
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for predictive download

A time a user of a client application is likely to access a preferred network connection is predicted. A pre-download index for one or more multimedia content items is calculated, where the pre-download index represents how likely the user is to interact with the one or more multimedia content items at approximately the predicted time. The indexed multimedia content items are ranked based on the pre-download index of each of the one or more multimedia content items. The ranked multimedia content items are provided to the client application at the predicted time.

  • Pub Date: 2013/24/12
  • Number: 09344876
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for generating and sharing video clips of cloud-provisioned games

Apparatus, systems and methods for providing inputs to a game executing on a game server, is disclosed. A controller includes a circuit, a plurality of input controls interfaced with the circuit of the controller for producing controller data, and a communication circuit for connecting the controller with an internet access device. The communication circuit is configured to exchange controller data with a game server. The exchange of the controller data occurs without a communication link between the controller and a local game console. The game server is configured to execute a game play of a video game and drive interactivity of the video game using the controller data. The game server is remote from the local game console. The game server transmits a video feed of the game play to the game console.

  • Pub Date: 2013/24/12
  • Number: 09550111
  • Owner: Sony Interactive Entertainment America LLC
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Non-volatile memory systems and methods

A high speed voltage mode sensing is provided for a digital multibit non-volatile memory integrated system. An embodiment has a local source follower stage followed by a high speed common source stage. Another embodiment has a local source follower stage followed by a high speed source follower stage. Another embodiment has a common source stage followed by a source follower. An auto zeroing scheme is used. A capacitor sensing scheme is used. Multilevel parallel operation is described.

  • Pub Date: 2013/24/12
  • Number: 09640263
  • Owner: Silicon Storage Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to measure an audience of an online media service

Methods, apparatus, systems and articles of manufacture are disclosed to measure an audience of an online media service. An example method includes requesting an access history associated with a subscriber of an online media service using a programming interface for the online media service; and determining ratings information using the access history and demographic information corresponding to the subscriber.

  • Pub Date: 2013/24/12
  • Number: 09451323
  • Owner: The Nielsen Company (US), LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Insuring integrity of remote procedure calls used in a client and server storage system

A system and method generates a message integrity check. The message integrity check value is computed by hashing one or more block checksums from procedure specific parameters of an RPC and then encrypting the resulting hash value. The computed message integrity check is appended to the RPC to thereby provide a level of security approaching or equal to the level of Integrity defined by the RPCSEC_GSS protocol specification.

  • Pub Date: 2013/24/12
  • Number: 09401921
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Information processing related to wireless setting for wireless communication using first type interface section with first communication protocol and using second type interface section with second communication protocol

An information processing apparatus may communicate with a communication-target device, which is a device with which the information processing apparatus is to communicate, via a first type interface section. The information processing apparatus may store, in a first storage area, target identification information for identifying the communication-target device as default identification information, in a case where a first network to which the communication-target device belongs is identical to a second network to which the information processing apparatus belongs via the second type interface section. The target identification information may be stored in association with at least one of a plurality of attributes. The information processing apparatus may cause the target identification information not to be stored in the first storage area as the default identification information in a case where the first network is not identical to the second network.

  • Pub Date: 2013/24/12
  • Number: 09041965
  • Owner: Brother Kogyo Kabushiki Kaisha
  • Location: Nagoya-shi, Aichi-ken, JP
  • Details: Visit USPTO

Visit USPTO Page


Cloud compute scheduling using a heuristic contention model

Technologies for contention-aware cloud compute scheduling include a number of compute nodes in a cloud computing cluster and a cloud controller. Each compute node collects performance data indicative of cache contention on the compute node, for example, cache misses per thousand instructions. Each compute node determines a contention score as a function of the performance data and stores the contention score in a cloud state database. In response to a request for a new virtual machine, the cloud controller receives contention scores for the compute nodes and selects a compute node based on the contention score. The cloud controller schedules the new virtual machine on the selected compute node. The contention score may include a contention metric and a contention score level indicative of the contention metric. The contention score level may be determined by comparing the contention metric to a number of thresholds. Other embodiments are described and claimed.

  • Pub Date: 2013/24/12
  • Number: 09614779
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Client device using a web browser to control a periphery device via a printer

A device control system has a terminal with a web browser , and a printer that controls a connected device. The terminal calls an object that controls a device and is instantiated by the device API to support the device, and sends a request to the printer , by the web application ; and the printer executes a device control script that controls the device, receives requests sent through the device API , and controls the device.

  • Pub Date: 2013/24/12
  • Number: 09052853
  • Owner: Seiko Epson Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Client device using a markup language to control a periphery device via a printer

A device control system has a terminal with an application , and a printer that controls a device. The terminal sends a request written in XML generated by the application . The printer receives the XML request, the terminal sends an XML response, and if the terminal requested control of the device in the XML request, controls the device.

  • Pub Date: 2013/24/12
  • Number: 09280305
  • Owner: Seiko Epson Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Viewing three dimensional digital slides

Systems and methods for providing a view of a digital slide image. In an embodiment, a digital slide image file is accessed. The digital slide image file may comprise a plurality of first image planes representing an image of at least a portion of a slide specimen at varying focal depths. Then, a three-dimensional object is constructed from the digital slide image file. The three-dimensional image object comprises a plurality of second image planes that are derived from one or more of the first image planes and may comprise at least one image plane that has been interpolated from one or more of the first image planes. In addition, a two-dimensional and/or three-dimensional view of the three-dimensional object may be generated.

  • Pub Date: 2013/23/12
  • Number: 08953859
  • Owner: Leica Biosystems Imaging, Inc.
  • Location: Vista, US
  • Details: Visit USPTO

Visit USPTO Page


Unified and best messaging systems for communication devices

A unified messaging system which can provide messaging services for a plurality of different “message types” is disclosed. The unified messaging system can serve as a single interface to a number of messaging services provided by various messaging components which use different message types (e.g., mail server). A unified message type is implemented and presented to a user as an abstract message. In addition, the unified messaging system can automatically determine, based on a first selected feature, if one or more message types should be used. A particular message type can also be automatically selected as a “best message type” based on one or more selected options.

  • Pub Date: 2013/23/12
  • Number: 08942358
  • Owner: Lenovo Group Limited
  • Location: Quarry Bay, HK
  • Details: Visit USPTO

Visit USPTO Page


Techniques for presenting information on a graphical user interface

Techniques for presenting information on a graphical user interface are disclosed. In one particular embodiment, the techniques may be realized as a method for presenting information on a graphical user interface including generating a first display for the graphical user interface, wherein the first display displays content of a web browser, displaying, on a display unit, the first display, determining whether an icon of the first display has been selected, generating a thumbnail based on content of the web browser when the icon has been selected, generating a new display for the graphical user interface comprising the thumbnail, and displaying, on the display unit, the new display.

  • Pub Date: 2013/23/12
  • Number: 09377929
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and computer program products for collecting and reporting sensor data in a communication network

A system for collecting and reporting sensor data in a communication network includes a microprocessor coupled to a memory and an electronic storage device. The microprocessor receives sensor data from sensors, and stores the sensor data for each sensor in the electronic storage device. The microprocessor also receives, via the communication network, a data reporting instruction defining a data reporting technique corresponding to the sensor data associated with one or more of the sensors. The data reporting instruction is stored in the electronic storage device, and the microprocessor transmits, to a trust mediator over the communication network, at least a portion of the sensor data based on the data reporting instruction. The trust mediator maintains an acceptable level of security for data throughout the communication network by adjusting security safeguards based on the sensor data.

  • Pub Date: 2013/23/12
  • Number: 08955140
  • Owner: American Express Travel Related Services Company, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for enforcing enterprise data access control policies in cloud computing environments

A computer-implemented method for enforcing enterprise data access control policies in cloud computing environments may include (1) intercepting, at a proxy, an attempt to configure a computing instance on a cloud computing platform with a permission that would provide the computing instance with access to secured data on the cloud computing platform, (2) identifying a user within an enterprise that initiated the attempt to configure the computing instance with the permission, (3) determining, based on a data access control policy for the enterprise, that the user is not entitled to access the secured data, and (4) blocking the attempt to configure the computing instance with the permission based on determining that the user is not entitled to access the secured data. Various other methods, systems, and computer-readable media are also disclosed.

  • Pub Date: 2013/23/12
  • Number: 09407664
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for associating location information with a communication sub-assembly housed within a communication assembly

An exemplary optical distribution frame includes a frame structure defining multiple positions into which multiple chassis can be inserted and a frame controller unit attached to the frame structure. The frame structure includes a frame controller and a switch communicatively coupled to the frame controller, wherein the switch includes a multiple ports. The frame structure including multiple cables, each cable being attached to a respective one of the ports of the switch and routed and attached to the optical distribution frame so that each cable can be attached to a chassis inserted into a predetermined one of the positions in the optical distribution frame, wherein the frame controller is configured to communicate port mapping information to a management entity that is communicatively coupled to the frame controller for use by the management entity in associating location information with a chassis inserted into the optical distribution frame.

  • Pub Date: 2013/23/12
  • Number: 09507113
  • Owner: CommScope Technologies LLC
  • Location: Hickory, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for private online social networking system and for time releasing pre-recorded digital content

A private online social networking system and method that provides time released dispersal of pre-recorded digital video and images wherein users record digital content such as videos and images at a first time, select from several system-generated, user specific criterion for future time release of the digital content to pre-selected recipients via the system or other third party services such as social networks.

  • Pub Date: 2013/23/12
  • Number: 09161070
  • Details: Visit USPTO

Visit USPTO Page


System and method for interactive internet video conferencing

A system and method for Internet video conferencing is provided. The method includes, generating a facilitator user interface on a display associated with a facilitator user device comprising a plurality of participant icons corresponding to a plurality of participant user devices for a conference, forming a plurality of subgroups comprising a first subgroup of the plurality of participant user devices and a second subgroup of the plurality of participant user devices, generating a participant user interface on each screen display associated with the first subgroup and the second subgroup for controlling interaction with a respective subgroup, linking each participant user device within the first subgroup with a second video signal, linking each participant user device in the second subgroup with a second video signal and intercommunicating between the first subgroup at the participant user devices without intercommunicating to the second subgroup.

  • Pub Date: 2013/23/12
  • Number: 09148627
  • Owner: VIDEOCONNECT, LLC
  • Location: Peterborough, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for analyzing web content

A system and computer based method are provided for identifying active content in websites on a network. One embodiment includes a computer based method of classifying web content. The method receives content of a web page, and determines a first property associated with the content, the first property including static content. The method executes active content associated with the webpage, and determines a second property associated with the content based at least in part on the executing, the second property including the active content. The method also evaluates a logical expression relating the first property and the second property, and associates the web page with a category based on a result of the evaluation. The evaluation of the logical expression at least in part evaluates whether a constant value matches at least a portion of the content of the web page.

  • Pub Date: 2013/23/12
  • Number: 09003524
  • Owner: Websense, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Secure system for allowing the execution of authorized computer program code

Systems and methods for selective authorization of code modules are provided. According to one embodiment, a trusted service provider maintain a cloud-based whitelist containing cryptographic hash values including those of code modules that are approved for execution on computer systems of subscribers of the service provider. A code module information query, including a cryptographic hash value of a code module, is received from a computer system of a subscriber by the service provider. If the cryptographic hash value matches one the cryptographic hash values contained within the cloud-based whitelist and the code module is an approved code module, then the service provider responds with an indication that the code module is authorized for execution; otherwise, it (i) responds with an indication that the code module is an unknown code module; and (ii) causes one or more behavior analysis techniques to be performed on the code module.

  • Pub Date: 2013/23/12
  • Number: 08856933
  • Owner: Fortinet, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Rolling cache configuration for a data replication system

Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

  • Pub Date: 2013/23/12
  • Number: 09208210
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Rendez vous management using mobile phones or other mobile devices

A system for exchanging GPS or other position data between wireless devices for purposes of group activities, child location monitoring, work group coordination, dispatching of employees etc. Cell phones and other wireless devices with GPS receivers have loaded therein a Buddy Watch application and a TalkControl application. The Buddy Watch application communicates with the GPS receiver and other wireless devices operated by buddies registered in the users phone as part of buddy groups or individually. GPS position data and historical GPS position data can be exchanged between cell phones of buddies and instant buddies such as tow truck drivers via a buddy watch server. Emergency monitoring services can be set up with notifications to programmable individuals in case an individual does not respond. Positions and tracks can be displayed. TalkControl simplifies and automates the process of joining talk groups for walkie talkie services such as that provided by Nextel.

  • Pub Date: 2013/23/12
  • Number: 09584960
  • Owner: X One, Inc.
  • Location: Union City, US
  • Details: Visit USPTO

Visit USPTO Page


Remote accessory for generating customized and synchronized reference notes for a programmable metrology system

A method for operating a remote device in relation to a programming environment of a programmable metrology system is provided. The metrology system may comprise an accessory interface portion comprising an accessory communication portion, and a user interface comprising a programming environment having part program instruction representation representations in an editing window, including an active “current instruction” representation. The method provides a connection between the remote device and the programming environment, which outputs current instruction identifiers for current instruction representations. The remote device receives a current instruction identifier and operates responsive to the that current instruction identifier to display a current instruction reference information user interface portion configured such that it is specifically related to a generic instruction type corresponding to the current instruction representation. That user interface may display customized reference information previously configured by a user of the remote device in association with that generic instruction type.

  • Pub Date: 2013/23/12
  • Number: 09606525
  • Owner: Mitutoyo Corporation
  • Location: Kanagawa-ken, JP
  • Details: Visit USPTO

Visit USPTO Page


Processing of a coarse location request for a mobile device

A location proxy server receives a network-initiated location request. The location proxy server determines the location request is a coarse location request for a mobile device. The location proxy server forwards the coarse location request for the mobile device to a location server. The location server completes a control plane function to determine the location of the mobile device and provides a location answer to the location proxy server. The location proxy server provides the location answer to the application server initiating the location request.

  • Pub Date: 2013/23/12
  • Number: 09439163
  • Owner: Cellco Partnership
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


NETCONF/DMI-based secure network device discovery

A system receives discovery rule inputs that include addresses, verifies one or more device identifiers for one or more addresses, obtains device information from each verified device associated with the one or more verified device identifiers, determines whether each verified device is a discovered device based on the device information, and automatically adds each verified device as a discovered device to a management system without human intervention when it is determined that the verified device is discovered. The system further creates device configuration information, creates an identifier and password, provides device configuration information, the identifier, and the password, to each of the discovered devices based on the NETCONF or the Device Management Interface standards, waits for a connection from the discovered devices, imports device configuration information from the discovered devices when the connection has been established, and indicates that the discovered devices are managed devices.

  • Pub Date: 2013/23/12
  • Number: 09100296
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for determining memory usage ratings for a process configured to run on a device

Methods and systems for determining memory usage ratings for system processes and providing for display are described. An example method may include determining, by a processor, a memory usage value for a process configured to run on a computing device over a time period, and the memory usage value is indicative of an amount of memory of the computing device that the process uses while running. The method may also include determining a memory usage rating for the process based on the memory usage value and a run time for the process. The memory usage rating for the process indicates an amount of memory the process uses over the time period and the run time indicates how long the process runs during the time period. The method may also include providing for display, by the processor, a representation of the memory usage rating of the process over the time period.

  • Pub Date: 2013/23/12
  • Number: 09021152
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatuses for implementing a layer 3 internet protocol (IP) echo response function on a small form-factor pluggable (SFP) transceiver and providing a universal interface between an SFP transceiver and network equipment

A small form factor pluggable device (SFP) or other compact transceiver device is provided at a subscriber's site and is configured to perform Layer 3 testing (e.g., ICMP echo request and response operations) for testing connectivity across networks. A universal interface coupling a conventional transceiver to host equipment is also disclosed which has components that can provide additional functionality to the transceiver while maintaining compatibility between the transceiver and the host equipment.

  • Pub Date: 2013/23/12
  • Number: 09549234
  • Owner: Enginuity Communications Corporation
  • Location: St. Charles, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to identify wireless carrier performance effects

Example methods and apparatus to identify wireless carrier performance effects are disclosed. A disclosed example method includes receiving an indication of media content presentation on a wireless communication device, monitoring a wireless carrier operating parameter in response to receiving the indication of media content presentation, and monitoring the wireless communication device for a media content presentation command. The example method also includes associating the media content presentation command and the wireless carrier operating parameter with a scoring factor indicative of subscriber preferences, and generating a report including the scoring factor.

  • Pub Date: 2013/23/12
  • Number: 09185589
  • Owner: THE NIELSEN COMPANY (US), LLC
  • Location: Schaumburg, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for detecting space-shifted media associated with a digital recording/playback device

Methods and apparatus for detecting space-shifted media content associated with a digital recording/playback device are disclosed. An example method for detecting space-shifted media content includes detecting, at a router, a data packet transmitted from a first media device of a home network to a second media device of the home network; and determining, at the router, that media associated with the data packet is space-shifted when the data packet comprises at least one of media data or command data.

  • Pub Date: 2013/23/12
  • Number: 09538240
  • Owner: THE NIELSEN COMPANY (US), LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for searching stored data

A complete document management system is disclosed. Accordingly, systems and methods for managing data associated with a data storage component coupled to multiple computers over a network are disclosed. Systems and methods for managing data associated with a data storage component coupled to multiple computers over a network are further disclosed. Additionally, systems and methods for accessing documents available through a network, wherein the documents are stored on one or more data storage devices coupled to the network, are disclosed.

  • Pub Date: 2013/23/12
  • Number: 09639529
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for resource load balancing in a conferencing session

Methods and systems for resource load balancing of teleconference and video conference sessions are provided herein. In some embodiments, a method for resource load balancing of a teleconference session including a plurality of participant devices may include assigning each of the plurality of participant devices into one of a plurality of groups of participant devices based on at least one first heuristic, designating a leader device for each group of participant devices, based on at least one second heuristic to coordinate the teleconference session communications, and coordinating the teleconference session communications of each leader device to facilitate the teleconference session among the plurality of participant devices.

  • Pub Date: 2013/23/12
  • Number: 09538134
  • Owner: Vonage Business Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing player incentives

A system and method is provided for incentivizing players to visit a gambling location. In one aspect, a qualified person is invited to play an electronic game which has a plurality of outcomes, at least one of which is a winning outcome. In one embodiment, the qualified person may be required to redeem the outcome at the gambling location. In another embodiment, the person may be required to redeem the outcome at a redemption location. In another aspect, a method is provided for permitting a person to take one or more actions within a gambling location and in response inviting the person to play an electronic game separate from the games offered in a gambling environment at the gambling location, where the game has a plurality of outcomes, at least one of which is a winning outcome, and if the person obtains a winning outcome, requiring the person to redeem the at least one outcome at the gambling location. In one embodiment, the method includes the acts of qualifying a person. Qualification may require specific acts, for example, referring another person, and/or providing an invitation to play an electronic game to another person. Various systems and method assist in tracking and maintaining such referrals. Additionally group gaming in and amongst referrals and/or designated groups may be performed, and in some embodiment required for qualification and/or redemption. Further, another aspect relates to providing special incentives, for example for referral of a new player, for providing casino affiliation or membership information, among others.

  • Pub Date: 2013/23/12
  • Number: 09317993
  • Owner: Scientific Games Holdings Limited
  • Location: Ballymahon, Co. Longford, IE
  • Details: Visit USPTO

Visit USPTO Page


Instruction and logic for memory disambiguation in an out-of-order processor

A system includes a processor with a front end to receive an instruction stream reordered by a software scheduler and including a plurality of memory operations and alias information indicating how a given memory operation may be evaluated. Furthermore, the processor includes a hardware scheduler to reorder, in hardware, the instruction stream for out-of-order execution. In addition, the processor includes a calculation module to determine, for a given memory operation and based upon the alias information, a checking range of memory atoms subsequent to the given memory operation and a virtual order of the memory operation. The virtual order indicates an original ordering of the instructions. The processor also includes an alias unit to reorder the instruction stream, determine whether the hardware reordering caused an error, and determine whether the software reordering caused an error based upon the checking range and the virtual order.

  • Pub Date: 2013/23/12
  • Number: 09524170
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


GHRH agonists for islet cell transplantation and function and the treatment of diabetes

Disclosed herein are compositions of GHRH agonists and peptides, and methods to treat diabetes. In one embodiment, a method of promoting survival of grafted cells and/or tissues may involve exposing the cells and/or tissues to an effective amount of at least one agonist of GHRH. In some embodiments, the grafted cells and/or tissues may be pancreatic cells. In some embodiments, the grafted cells may be islet cells co-cultured with non-pancreatic cells. In a further embodiment, a method of treating a patient diagnosed with diabetes involves transplanting and/or grafting the islet cells and/or tissues comprising islet cells into a patient, and administering a therapeutically effective amount of at least one agonist of GHRH to the patient. In some embodiments, the islet cells and/or tissues comprising islet cells may be optionally exposed to GHRH and/or at least one agonist of GHRH prior to transplantation into a patient. In some embodiments, the at least one agonist of GHRH is administered pre-transplantation, concurrently with transplantation, post-transplantation or any combinations thereof.

  • Pub Date: 2013/23/12
  • Number: 09393271
  • Owner: Dresden University of Technology
  • Location: Dresden, DE
  • Details: Visit USPTO

Visit USPTO Page


End to end testing automation and parallel test execution

Provisioning and/or configuring machines (real and/or virtual) for multiple parallel execution of multiple test cases. The test cases correspond to different software configurations (such as different platform version and product version configurations) and are executed at substantially overlapping time(s), which is to say in “parallel.”

  • Pub Date: 2013/23/12
  • Number: 09032373
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamically retraining a prediction model based on real time transaction data

Various embodiments of systems and methods to dynamically retrain prediction models based on real time transaction data are described herein. In one aspect, real time application data and status data associated with an entity are obtained. The obtained application data is inputted to a prediction model to produce an assessment of a risk. The obtained status data with the assessed risk are compared. When the obtained payment status data does not match the determined risk, the prediction model is retrained.

  • Pub Date: 2013/23/12
  • Number: 09449344
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Automatic wireless device message management responsive to end user preferences

Automatically retrieving messages by a wireless telephone based on user preferences. A method of the invention receives a notification, on a wireless device, indicating that a computing device has a message for a user. One or more rules associated with the user are evaluated based on the received notification. The method also automatically requests the message from the computing device as a function of the evaluated rules and received from the computing device. The method further stores the received message in a memory area of the wireless telephone for rendering to the user. Alternatively, one or more rules associated with the user are dynamically generated by monitoring the user interaction with the wireless telephone.

  • Pub Date: 2013/23/12
  • Number: 09451424
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Assisted shopping server

Disclosed are various embodiments for facilitating an assisted shopping experience. A speech input can be captured and transcribed. The transcribed speech input can be transmitted to a customer service agent in a data session that is contemporaneous with a voice session. The customer service agent can then facilitate an assisted shopping experience via the voice session and data session.

  • Pub Date: 2013/23/12
  • Number: 08977554
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and apparatuses for multi-directional still pictures and/or multi-directional motion pictures

The disclosure is generally directed to methods, systems and apparatuses for multi-directional still pictures and/or multi-directional motion pictures and their applications on mobile, embedded, and other computing devices and applications.

  • Pub Date: 2013/22/12
  • Number: 09282309
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for cloud data loss prevention integration

A system, method, and computer readable medium is provided to provide an integrated storage system. For example, an embodiment may detect, by an enterprise computer system, an activity notification from a cloud service that stores data on behalf of an enterprise. The activity notification may specify a file name involved in an activity performed by the cloud service (e.g., creating or modifying a file). The enterprise computer system may then download a file (or contents thereof) from the cloud service using the file name specified by the activity notification. After downloading the file, the enterprise computer system may analyze the file against a data loss prevention rule. Based on an outcome from the data loss prevention rule, the enterprise computer system may communicate an action response to the cloud service. The action response may direct the cloud service to perform an action on the file stored by the cloud service.

  • Pub Date: 2013/21/12
  • Number: 09460405
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time vulnerability monitoring

A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The system exposes an API to support security-related decisions by other applications. For example, an intrusion detection system (IDS) accesses the database to determine whether an actual threat exists and should be (or has been) blocked.

  • Pub Date: 2013/21/12
  • Number: 09117069
  • Owner: SecurityProfiling, LLC
  • Location: Garland, US
  • Details: Visit USPTO

Visit USPTO Page


Countering security threats with the domain name system

Described herein are methods, systems, and apparatus in which the functionality of a DNS server is modified to take into account security intelligence when determining an answer to return in response to a requesting client. Such a DNS server may consider a variety of security characteristics about the client and/or the client's request, as described more fully herein. Such a DNS server can react to clients in a variety of ways based on the threat assessment, preferably in a way that proactively counters or mitigates the perceived threat.

  • Pub Date: 2013/21/12
  • Number: 09467461
  • Owner: Akamai Technologies Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Centralised interactive graphical application server

A system for processing a plurality of graphical programs on a centralized computer system whereby the images produced by the programs are compressed and transmitted to a plurality of remote processing devices where they are decompressed. Compression assistance data (CAD) is produced by intercepting instructions outputted by the programs and the CAD is then used in the compression step.

  • Pub Date: 2013/21/12
  • Number: 09117285
  • Owner: T5 LABS LTD
  • Location: London, GB
  • Details: Visit USPTO

Visit USPTO Page


Volume redirection

Exemplary systems and methods enable a user of a mobile device that is communicatively coupled to a remote device to adjust the audio output volume level of an application running on the remote device using audio volume adjustment inputs on the mobile device. The application produces an audio output signal that has an adjustable audio volume output level. The mobile device receives the audio output signal from the remote device. The mobile device detects an audio volume adjustment input. The mobile device redirects the audio volume adjustment to the remote device to control the audio output volume level of the application.

  • Pub Date: 2013/20/12
  • Number: 09099974
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Visual audio quality cues and context awareness in a virtual collaboration session

Systems and methods for providing visual audio quality cues and context awareness in a virtual collaboration session. In some embodiments, a method may include receiving a plurality of audio signals, each audio signal captured from one of a plurality of a participants of a virtual collaboration session; determining, for each of the plurality of participants, a voice quality of the participant's audio signal; and providing a visual cue of the voice quality of each participant's audio signal to at least one of the plurality of participants.

  • Pub Date: 2013/20/12
  • Number: 09329833
  • Owner: DELL PRODUCTS, L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Video conferencing

A video conferencing system is provided, in which at least two cameras are used to capture images of people at a first location participating in a video conference. One or more active speakers are identified among the people at the location, and one of the at least two cameras is automatically selected based on a position or positions of the one or more active speakers. Images from the selected camera are provided to a person at a second location participating the video conference.

  • Pub Date: 2013/20/12
  • Number: 09179098
  • Details: Visit USPTO

Visit USPTO Page


Three dimensional (3D) printing of epoxy, hardener, and parts of an object to be assembled later

A three dimensional (3D) printer and method for dispensing a material to form a 3D substructure and for dispensing an adhesive onto the 3D substructure. The adhesive printed onto the 3D substructure may be used to attach the 3D substructure to another substructure such as a conventionally formed substructure or another 3D printed substructure. Printing the adhesive using the 3D printer during the same 3D manufacturing process used to print the 3D substructure may improve precision of the location at which the adhesive is dispensed, thereby improving the quality of superstructure created by joining the substructures. An embodiment of the present teachings may decrease the overall time and cost to attach substructures.

  • Pub Date: 2013/20/12
  • Number: 09527241
  • Owner: XEROX CORPORATION
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Testing conversion and rendering of digital content

Some examples include testing of software able to render a content item on a display of an electronic device. The testing may include capturing images of rendered portions of a content item and comparing the captured images with previously obtained reference images that have been verified to be correctly rendered. The testing techniques can be applied to conversion software that converts digital content items from one format to another and/or testing of the converted content items themselves. Additionally, content presentation software that displays digital content items on an electronic device, such as by interacting with rendering software, may also be tested using a similar technique.

  • Pub Date: 2013/20/12
  • Number: 09164874
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for establishing cloud-based instances with independent permissions

A method and system for facilitating management of cloud-based service instances, the system including one or more computing systems configured to communicate with at least one multi-tenant computing cloud, and configured to establish a cloud-based service instance hosted in the multi-tenant computing cloud and an access entity with permissions to access the established cloud-based service instance. The system can receive a request for the cloud-based service instance, the request authenticated as originating from a requestor; consult a set of access controls associated with the cloud-based service instance; determine, responsive to the consulting, if the request is allowable by the requestor; and enable, responsive to determining that the request is allowable by the requestor, the requestor to complete the request using a restricted access credential associated with the access entity.

  • Pub Date: 2013/20/12
  • Number: 08769644
  • Owner: Rightscale, Inc.
  • Location: Santa Barbara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for referencing a dynamic module system within a component oriented application development framework

A system and method can support a hybrid application development environment. The system allows a client application in the application runtime environment to obtain a reference to a framework instance for a dynamic module system. Furthermore, the system can configure a bundle in the dynamic module system to be a gateway bundle based on the framework instance, and the client application can access the dynamic module system using the gateway bundle.

  • Pub Date: 2013/20/12
  • Number: 09152384
  • Owner: ORACLE INTERNATIONAL CORPORATION
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for provisioning a dynamic module system within a component oriented application development framework

A system and method can support a hybrid application development environment. The system can provision a framework instance for a dynamic module system in the application runtime environment. Furthermore, the system can associate a host application in the application runtime environment with a system bundle in the dynamic module system, wherein an application class loader can be used to load the framework instance when the host application is started/loaded. Then, the host application can export one or more resources associated with the host application to the dynamic module system, and/or consume one or more services provided by the dynamic module system.

  • Pub Date: 2013/20/12
  • Number: 09116542
  • Owner: ORACLE INTERNATIONAL CORPORATION
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for cache monitoring in storage systems

A system and method of cache monitoring in storage systems includes storing storage blocks in a cache memory. Each of the storage blocks is associated with status indicators. As requests are received at the cache memory, the requests are processed and the status indicators associated with the storage blocks are updated in response to the processing of the requests. One or more storage blocks are selected for eviction when a storage block limit is reached. As ones of the selected one or more storage blocks are evicted from the cache memory, the block counters are updated based on the status indicators associated with the evicted storage blocks. Each of the block counters is associated with a corresponding combination of the status indicators. Caching statistics are periodically updated based on the block counters.

  • Pub Date: 2013/20/12
  • Number: 09471510
  • Owner: NETAPP, INC.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Supporting color fonts

A system includes a computing device that includes a memory configured to store instructions. The computing device also includes a processor to execute the instructions to perform operations that include receiving information that indicates whether an asset presenter being executed by a computing device is capable of presenting one or more colored fonts of a web asset. In response to receiving the information, sending color font information to the computing device to allow content of the web asset represented in colored fonts to be presented by the computing device.

  • Pub Date: 2013/20/12
  • Number: 09569865
  • Owner: Monotype Imaging Inc.
  • Location: Woburn, US
  • Details: Visit USPTO

Visit USPTO Page


Strongly isolated malware scanning using secure virtual containers

Described systems and methods allow protecting a host system, such as a computer or smartphone, from malware. In some embodiments, an anti-malware application installs a hypervisor, which displaces an operating system executing on the host system to a guest virtual machine (VM). The hypervisor further creates a set of virtual containers (VC), by setting up a memory domain for each VC, isolated from the memory domain of the guest VM. The hypervisor then maps a memory image of a malware scanner to each VC. When a target object is selected for scanning, the anti-malware application launches the malware scanner. Upon intercepting the launch, the hypervisor switches the memory context of the malware scanner to the memory domain of a selected VC, for the duration of the scan. Thus, malware scanning is performed within an isolated environment.

  • Pub Date: 2013/20/12
  • Number: 09117081
  • Owner: Bitdefender IPR Management Ltd.
  • Location: Nicosia, CY
  • Details: Visit USPTO

Visit USPTO Page


State customization of forked virtual machines

Embodiments support instant forking of virtual machines (VMs) and state customization. A computing device initiates execution of a first group of services (e.g., identity-independent) in a first VM. A second VM is instantiated from the first VM. The second VM shares memory and storage with the first VM. The computing device customizes the second VM based on configuration data associated with the second VM. A second group of services (e.g., identity-dependent) starts executing on the second VM after configuring the identity of the second VM. Customizing the second VM includes configuring one or more identities of the second VM. In some embodiments, a domain identity is selected from a pool of previously-created identities and applied to the second VM, before bootup completes on the second VM.

  • Pub Date: 2013/20/12
  • Number: 09477507
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Sponsored story sharing user interface

A method includes monitoring an activity stream to identify actions that match stored sponsored story specifications, for providing one or more sponsored stories to a viewing user. The sponsored story specifications include a visual specification for the sponsored story, and matched sponsored stories are ranked for a viewing user. Users can set privacy preferences related to sponsored stories. The ranking and privacy settings contribute to which sponsored stories are provided for display to the viewing user.

  • Pub Date: 2013/20/12
  • Number: 09645702
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Sponsored story creation using inferential targeting

A method includes monitoring an activity stream to identify actions that match stored sponsored story specifications, for providing one or more sponsored stories to a viewing user. The sponsored story specifications include a visual specification for the sponsored story, and matched sponsored stories are ranked for a viewing user. Users can set privacy preferences related to sponsored stories. The ranking and privacy settings contribute to which sponsored stories are provided for display to the viewing user.

  • Pub Date: 2013/20/12
  • Number: 09098165
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Seasonal portfolio construction platform apparatuses, methods and systems

The SEASONAL PORTFOLIO CONSTRUCTION PLATFORM APPARATUSES, METHODS AND SYSTEMS (“SPC”) transform user data request via SPC components into seasonal portfolio investment transaction records. In one implementation, the SPC may provide an investment analytics and management tool facilitating a user (e.g., investors, consumers, portfolio managers, traders, etc.) to research, build and maintain an investment strategy for a customized portfolio based on a current economic cycle phase.

  • Pub Date: 2013/20/12
  • Number: 08768815
  • Owner: FMR, LLC
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Provisioning customized virtual machines without rebooting

Embodiments provision and customize virtual machines (VMs), such as desktop VMs, without rebooting the desktop VMs. In response to a request to provision the VMs, a computing device creates a clone VM from a parent VM template identified in the request. One or more customization that prompt rebooting of the clone VM are applied to the clone VM. The computing device instantiates a plurality of child VMs from the customized clone VM. A child VM configuration is applied to at least one of the instantiated child VMs without provoking a reboot of those child VMs.

  • Pub Date: 2013/20/12
  • Number: 09323565
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Policy enforcement based on dynamically attribute-based matched network objects

A policy that includes an address group is received. The policy is compiled into a set of one or more rules. The compiling is performed at least in part by determining members of the address group. The compiling can further include substituting one or more IP addresses of the members for the address group. At least one rule included in the set of rules is enforced.

  • Pub Date: 2013/20/12
  • Number: 09537891
  • Owner: Palo Alto Networks, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Paging of a user equipment (UE) within a wireless communications system

A user equipment (UE) determines to activate a data session. The UE configures a data session activation request message to include an indication of an association with communication sessions of a given type (e.g., delay-sensitive communication sessions), and then transmits the data session activation request message to an access network. The access network determines to establish an aggressive paging cycle of a downlink channel for the UE based in part upon receiving a message (e.g., which can be different than the data session activation request message) that conveys the indication of the association to the access network. The access network sends at least one instruction for facilitating an allocation of the aggressive paging cycle to the UE, and the UE receives the at least one instructions and monitors the downlink channel accordingly.

  • Pub Date: 2013/20/12
  • Number: 09445393
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring device and monitoring method

A monitoring unit in a monitoring system determines whether or not a program to be executed is a program to be monitored. If it is determined that the program to be executed is a program to be monitored, the monitoring unit in the monitoring system adds, in order, before an instruction string included in a function called by the program to be monitored, an instruction string satisfying a predetermined condition, and a condition branch instruction, which is an instruction starting a predetermined control process when the predetermined condition is satisfied.

  • Pub Date: 2013/20/12
  • Number: 09600665
  • Owner: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
  • Location: Chiyoda-ku, JP
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer readable mediums for utilizing application programming interfaces for accessing key performance indicator information

Methods, systems, and computer readable mediums for implementing an attribute into a network system are disclosed. According to one method, the method includes collecting raw data from a network node and defining a performance indicator definition associated with the collected raw data. The method can also include integrating the performance indicator definition into an attribute monitoring entity, and injecting the entity into a repository during system runtime.

  • Pub Date: 2013/20/12
  • Number: 09521052
  • Owner: VCE Company, LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for indicating application data use and providing data according to permissions

Methods and systems for indicating application data use and providing data according to permissions are described. An example method may include providing for display, by a computing device that includes one or more processors, a representation of a first indicator and the first indicator indicates a sensor of the computing device is collecting sensory data from an ambient environment of the computing device. The first indicator is configured to change states so as to further indicate an application running on the computing device is receiving and processing the sensory data. The method further includes providing for display, by the computing device, a representation of a second indicator that identifies the application receiving the sensory data collected by the sensor of the computing device.

  • Pub Date: 2013/20/12
  • Number: 09058096
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for communicating between a remote printer and a server

In order to enable downloading to a mobile printer data items from a server, a method comprising the steps of establishing communication connection end points (“sockets”), communicating with the server, where the communication includes sending a request for authentication to the server, receiving an authentication response, requesting print data portions from the server, receiving the requested print data portions, and notifying the server after each print data portion has been printed. The method also includes the step of terminating their communication connection when a printing session ends or if an error occurs. The method constitutes a printer-server protocol.

  • Pub Date: 2013/20/12
  • Number: 09448750
  • Owner: Intellectual Ventures I LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Messaging with key-value persistence

Techniques are described for providing a messaging service that employs a distributed key-value store for message persistence. On receiving a message to be enqueued for subsequent delivery, a message identifier is generated and employed as a key to store the message in the key-value store. The message identifier may be generated based on an available location in a message tracking data structure. In some cases, the message tracking data structure may be an append tree data structure that is substantially self-balancing as an increasing number of messages are tracked using the append tree data structure. The message tracking data structure may be further employed to determine a message identifier for a message to be vended from the key-value store.

  • Pub Date: 2013/20/12
  • Number: 09578120
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Measuring link performance using multiple radio access networks

Technology for measuring link performance using multiple radio access networks (RANs) is described. Data packets of a flow can be received, at a mobile node via a first connection with the mobile node with a first RAN. An active measurement can be initiated when a Real-time Traffic Flow Measurement (RTFM) triggering condition occurs. A second connection can be formed with the mobile node with a second RAN. Selected packets of the flow can be received for the active measurement using the first RAN and using the second RAN. An RTFM execution event can be communicated to a virtual access network (VAN) to move the flow from the first RAN to the second RAN when the active measurement of the selected packets is received via the second RAN is greater than a selected threshold value.

  • Pub Date: 2013/20/12
  • Number: 09456368
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Location-based application program management

Methods, program products, and systems for location-based application program management are described. A mobile device can receive a first application program to be executed in an application subsystem. The first application program can be configured to be invoked or notified when the mobile device is located at a defined location. The mobile device can register the first application program to a second application program that executes in a baseband subsystem. The mobile device can set the application subsystem to a power-saving operating mode. The second application program can monitor a current location of the mobile device. When the mobile device is currently located at the defined location, the second application program can set the application subsystem to an active operating mode, and invoke the first application program.

  • Pub Date: 2013/20/12
  • Number: 09210529
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Late bound, transactional configuration system and methods

Systems and methods for configuring software systems help guarantee correctness while providing operational flexibility and minimal time to recover. A configuration system uses a un-typed syntax tree with transactional semantics layered under a set of late-bound semantic constraints. Configuration settings are defined in property flies which are parsed into a syntax tree during startup and which can be safely reloaded. Semantic constraints are dynamically specified by software components. The system maintains a transactional history to enable rollback and inspection.

  • Pub Date: 2013/20/12
  • Number: 09298847
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive user interface providing weather information and available trips

Systems and methods for providing an interactive user interface that displays anticipated weather conditions alongside a plurality of available trips between an origin and a destination are provided. An exemplary user interface can include a plurality of trip identifiers on a graph having an axis indicative of time. For example, the plurality of trip identifiers can respectively represent a plurality of available transit trips. For example, each trip identifier can provide an intuitive sense regarding the overall duration of the trip, a number of transfers or legs for each trip, time spent in each leg of the trip, a mode of transportation associated with each leg of each trip, and/or other information. The anticipated weather conditions associated with the trips can be presented alongside the plurality of trip identifiers.

  • Pub Date: 2013/20/12
  • Number: 09459117
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Installation of a technical computing environment customized for a target hardware platform

A device may receive installation software for installing a technical computing environment to be executed by a hardware platform, and may receive platform information associated with the hardware platform. The device may generate code for the technical computing environment based on the installation software and the platform information, and may generate, based on the code, one or more binary files or bitstream files for installing the technical computing environment on the hardware platform. The device may utilize the one or more binary files or bitstream files to install the technical computing environment on the hardware platform and for execution by the hardware platform. The technical computing environment may be customized for the hardware platform.

  • Pub Date: 2013/20/12
  • Number: 09141365
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Four corner high performance depth test

One or more apparatus and method for multi-pixel/sample level depth testing in a graphics processor is described. In embodiments, a bounding-box of variable size over which a depth test is to be performed is determined based on the pattern of lit pixels or samples within rasterizer tile. A multi-corner depth test may be performed between a source depth data plane and a destination depth plane within a source depth data bound where destination depth data is continuous within the source data bound. A range-based depth test may be performed in response to the destination data being discontinuous. Source depth data prevailing in the depth test may be stored in a compressed plane equation format in response to the source data being continuous within the source data bound, and may be stored as min/max depth data if discontinuous.

  • Pub Date: 2013/20/12
  • Number: 09569882
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic user interface authoring

A system and method for facilitating authoring computer code to facilitate rendering a display of data via a user interface display screen. An example method includes accepting a signal from a user input device to specify an attribute in accordance with a definition of a class of attributes in a data model; providing the specification of the attribute to a software component characterizing a webpage, wherein the software component includes an indicator for dynamic rendering of at least a portion of data included in the data model and associated with the attribute; and storing the definition of the class of attributes and data associated with the attribute, for retrieval and rendering of the data on a target device. The example method may include providing a mechanism for modifying attributes of the data model and propagating data model changes to webpage computer code.

  • Pub Date: 2013/20/12
  • Number: 09116710
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic generation of test images for ambient light testing

In a remote access environment that includes a server, a client device may remotely access, e.g., medical images from the server and may be provided with a mechanism to retrieve a test image, such as the TG-18 CT or TG-18 MP sample test patterns. The client device communicates display size information to the server, which generates the test image on-the-fly for the particular display size of the client device. For example, components in the test image and borders may be scaled to create an appropriate test image for any client device.

  • Pub Date: 2013/20/12
  • Number: 09411549
  • Owner: Calgary Scientific Inc.
  • Location: Calgary, AB, CA
  • Details: Visit USPTO

Visit USPTO Page


Decentralized de-duplication techniques for largescale data streams

A local de-duplication table for at least a particular partition of a data stream is instantiated at a particular ingestion node of a multi-tenant stream management service. A submission request indicating a data record of the partition is received at the ingestion node. In response to a determination that (a) the submission request was received within a de-duplication time window corresponding to the particular partition, and (b) the local de-duplication table does not indicate that the data record is a duplicate, a write operation to store the data record at one or more storage locations of the stream management system is initiated.

  • Pub Date: 2013/20/12
  • Number: 09471585
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Combining user profile information maintained by various social networking systems

A social networking system generates an augmented user profile for a user. The augmented user profile includes information from user profiles maintained by additional social networking systems that correspond to the user of the social networking system. For example, user profiles maintained by additional social networking systems having a threshold similarity to a user profile maintained by the social networking system are identified, and characteristics of the user in the identified user profiles are included in the augmented user profile along with characteristics from the user profile maintained by the social networking system. Characteristics of the user from the augmented user profile are used to identify content, such as advertisements, for presentation to the user.

  • Pub Date: 2013/20/12
  • Number: 09380128
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Chained replication techniques for large-scale data streams

A replication chain comprising one or more replication nodes of a multi-tenant stream management system is assigned to store data records of a partition of a particular data stream. A data record of the partition is received at a selected replication node of the replication chain. In a sequential order, a respective replica of the data record is stored at each replication node of the chain. An acknowledgement of a successful storage of the data record is provided after the replications are completed.

  • Pub Date: 2013/20/12
  • Number: 09639589
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Beacon content propagation

Systems and methods for transmitting beacon messages are described. A beacon message is transmitted from a first beacon device and broadcast to an area within a transmission range of the first beacon device. A mobile device receives and stores the message. When the mobile device is out of the range of the first beacon device and within the range of a second beacon device, the message is transmitted to the second beacon device and broadcast by the second beacon device.

  • Pub Date: 2013/20/12
  • Number: 09215570
  • Owner: PayPal, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Balanced append tree data structure

Techniques are described for employing a substantially self-balanced append tree data structure to store and access information. The append tree data structure is a hierarchical data structure in which a leaf node or a parent node may be added to expand the append tree data structure. The determination to add a leaf node or a parent node may be based on a counter for leaf nodes present in the append tree data structure. Nodes in the append tree data structure may be blocks in memory, with each block corresponding to a plurality of positions that may be employed to tracking message identifiers in a messaging service.

  • Pub Date: 2013/20/12
  • Number: 09372879
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic content retrieval based on location-based screen tags

Systems and methods automatically obtain contents and display the contents on location-specific display screens, based on content attributes associated with the screens. Associating content attributes (“tags”) with the screens allows administrators to specify the types of contents desired for display on the screens. For example, an establishment that caters to customers of a particular demographic (such as 21-27 year old singles, families with children, fans of rock-and-roll music, “bikers,” sports fans or ice cream lovers) may associate one or more content attributes (such as “dating,” “Disney,” “Led Zeppelin,” or “Red Sox”) with its display screen. The system then automatically obtains contents based on the attribute(s) and displays the contents on the screen. Patrons with mobile telephones or web-based users may send text messages for display on the screen or play interactive games displayed on the screen, as described in the incorporated patent application. However, even absent such activity, the disclosed systems and methods populate the screen with potentially ever-changing contents, thereby keeping the screen “fresh” and avoiding a situation known as the “ghost town” effect. The system may obtain the contents to be displayed from a variety of sources. For example, Twitter messages (“Tweets”) that contain or are otherwise associated (such as via “hashtags”) with a content attribute of a screen may be displayed.

  • Pub Date: 2013/20/12
  • Number: 08880649
  • Owner: Monster Patents, LLC
  • Location: Orlando, US
  • Details: Visit USPTO

Visit USPTO Page


ARP for logical router

Some embodiments provide a method for a computing device serving as a host machine in a logical network. The method executes several virtual machines that are in several different segments of the logical network. The method operates a managed physical routing element (MPRE) for routing data packets between different segments of the logical network. The MPRE includes several logical interfaces, each of which is for receiving data packets from a different segment of the logical network. Each of the logical interfaces is addressable by a network layer address. The method intercepts an Address Resolution Protocol (ARP) broadcast message when the destination address matches the network address of one of the logical interfaces. The method formulates an ARP reply to the ARP broadcast message.

  • Pub Date: 2013/20/12
  • Number: 09575782
  • Owner: NICIRA, INC.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Application programming interface for rendering personalized related content to third party applications

A system includes an ingestion component configured to receive a request from an entity for content related to a content item and a user identity. The request has a content identifier representative of the content item and a token. A request processing component of the system is configured to access a database associated with the system and identify the content item and the user identity using the content identifier and the token, wherein the database has information associating the token with the user identity and associating the content identifier with the content item. In response to identification of the content item and the user identity, the request processing component directs a recommendation engine associated with the system to identify the content related to the content item and the user identity. Information identifying the content related to the content item and the user identity is then transmitted back to the entity.

  • Pub Date: 2013/20/12
  • Number: 09219736
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and systems for providing location-based services within a wireless network

A system for providing wireless telecommunications services to mobile devices includes structure and functionality for location-based services, and includes both server and client/mobile device apparatuses. One apparatus includes a data store storing at least a first record associated with a first wireless device or a second record associated with a second wireless device. A computer is coupled to the data store and is configured to receive a request from the first wireless device to obtain location information associated with the second wireless device. The computer is configured to receive a change location privileges request, and to update the first or second records in the data store based on the received change request. Other apparatuses provide additional structures and functions.

  • Pub Date: 2013/20/12
  • Number: 09037159
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Weed control from applications of aminopyralid, triclopyr, and an organosilicone surfactant

Disclosed herein are herbicidal compositions comprising a herbicidal effective amount of (a) aminopyralid, or an agriculturally acceptable salt or ester thereof, (b) triclopyr, or an agriculturally acceptable salt or ester thereof, and (c) an organosilicone surfactant. Also disclosed herein are methods of controlling undesirable vegetation, which comprise applying to vegetation or an area adjacent the vegetation or applying to soil or water to prevent the emergence or growth of vegetation (a) aminopyralid, or an agriculturally acceptable salt or ester thereof, (b) triclopyr, or an agriculturally acceptable salt or ester thereof, and (c) an organosilicone surfactant.

  • Pub Date: 2013/19/12
  • Number: 09603363
  • Owner: Dow AgroSciences LLC
  • Location: Indianapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Verification of transformed content

A computer manages methods for determining accurate document transformation by rendering the source document into a non-rasterized format, where the non-rasterized format is a rendered source document. The computer rendering the target document into a non-rasterized format, where the non-rasterized format is a rendered target document. The computer comparing one or more aspects of the rendered source document to corresponding one or more aspects of the rendered target document. The computer determining, based, at least in part, on the compared one or more aspects, whether or not the source document was accurately transformed to the target document.

  • Pub Date: 2013/19/12
  • Number: 09529874
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


User application initiated telephony

Systems and methods for initiating telephony calls are presented. In one example, a user selection of a desired application item is received at a computing device and a dial number associated with the desired application item is transmitted from the computing device to a wireless headset. The dial number is received at the wireless headset and a call is responsively initiated by transmitting the dial number from the wireless headset to a mobile phone device.

  • Pub Date: 2013/19/12
  • Number: 08948691
  • Owner: Plantronics, Inc.
  • Location: Santa Cruz, US
  • Details: Visit USPTO

Visit USPTO Page


Testing service with control testing

The techniques described herein provide software testing of a candidate software system. In some examples, a testing service compares at least one candidate response to at least a first control response to obtain one or more candidate test differences. The testing service may compare at least a second control response of the plurality of control responses to at least one of the first control response of the plurality of control responses or a third control response of the plurality of control responses to obtain one or more control test differences. The testing service may then analyze the one or more candidate test differences based on the one or more control test differences to generate an evaluation of whether one or more of the candidate test differences are due to differences between the candidate software system and the control software system that generated the first control response.

  • Pub Date: 2013/19/12
  • Number: 09558106
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Tessellating patches of surface data in tile based computer graphics rendering

A method and system for culling a patch of surface data from one or more tiles in a tile based computer graphics system. A rendering space is divided into a plurality of tiles and a patch of surface data read. Then, at least a portion of the patch is analyzed to determine data representing a bounding depth value evaluated over at least one tile. This may comprise tessellating the patch of surface data to derive a plurality of tessellated primitives and analyzing at least some of the tessellated primitives. For each tile within which the patch is located, the data representing the bounding depth value is then used to determine whether the patch is hidden in the tile, and at least a portion of the patch is rendered, if the patch is determined not to be hidden in at least one tile.

  • Pub Date: 2013/19/12
  • Number: 09547934
  • Owner: Imagination Technologies Limited
  • Location: Kings Langley, GB
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and apparatuses for implementing data masking via compression dictionaries

In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing data masking via compression dictionaries including, for example, means for receiving customer data at the host organization; compressing the customer data using dictionary based compression and a compression dictionary; storing the compressed customer data in a database of the host organization; retrieving the compressed customer data from the database of the host organization; and de-compressing the compressed customer data via a masked compression dictionary, in which the masked compression dictionary de-compresses the customer data into masked customer data. Other related embodiments are disclosed.

  • Pub Date: 2013/19/12
  • Number: 09519801
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods identifying and reacting to potentially malicious activity

Information security may include defending information from unauthorized access, use, disclosure, modification, destruction, and so forth. Described herein are systems, methods and devices for enabling a user device to implement functions for dynamically identifying and reacting to potentially malicious activity. In one example, a user device configures a sentinel node to identify potentially malicious behavior by causing the sentinel node to analyze data from selected emitter nodes and selected algorithms. The user device may also specify how the sentinel node reacts to potential malicious activity.

  • Pub Date: 2013/19/12
  • Number: 09154515
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for implementing an enterprise-class converged compute-network-storage appliance

A distributed storage system that dispatches an input/output request is described. In an exemplary embodiment, a storage controller client receives the input/output request, wherein the distributed storage system includes the storage controller client, a plurality of storage controller servers, a plurality of virtual nodes distributed among a plurality of physical nodes, and each of the plurality of physical nodes is hosted on one of the plurality of storage controller servers. The storage controller client further computes a target virtual node for the input/output request, where the target virtual node is one of the plurality of virtual nodes. Using the computed target virtual node, the storage controller client determines a target physical node that corresponds to the target virtual node, where the target physical node is one of the plurality of physical nodes. In addition, the storage controller client dispatches the input/output request to a target storage controller that corresponds to the target physical node, wherein the target storage controller server is one of the plurality of storage controller servers. In addition, the virtual node includes a set of one or more mirrored copies across different fault domains for ensuring resiliency and high availability.

  • Pub Date: 2013/19/12
  • Number: 09521198
  • Owner: Springpath, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for removing obsolete data in a distributed system of hybrid storage and compute nodes

A distributed garbage collection in a distributed storage system is described, where the storage controller functions of the distributed storage system are separated from that of distributed storage system storage media. In an exemplary embodiment, a storage controller server generates a live object map of live objects stored on the distributed storage system in a plurality of block segments distributed across a plurality of storage controller servers. The storage controller server further scans the plurality of block segments to generate segment summary statistics, where the segment summary statistics indicates the number of live objects stored in the plurality of block segments. In addition, the storage controller server compacts each of the plurality of block segments that have a low utilization based on the segment summary statistics. Furthermore, the live object map is a probabilistic data structure storing a list of valid objects.

  • Pub Date: 2013/19/12
  • Number: 09448927
  • Owner: Springpath, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for a mobile wallet

A computer-implemented method includes capturing an image by a mobile computing device and determining a geographic location and a direction of the mobile computing device while capturing the image. The method includes generating a display that includes the image and that identifies the locations of merchants that have at least one offer available for a user of the mobile device based on the geographic location and the direction of the mobile computing device and generating the at least one offer based on the past transactions of the user.

  • Pub Date: 2013/19/12
  • Number: 09037509
  • Owner: Wells Fargo Bank, N.A.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Style configuration mode

Techniques for customizing a user interface are described. An application having the user interface is executed with style configuration mode enabled. A first user interface element of the user interface is selected for customization. First information is displayed regarding one or more properties of the first user interface element. The properties of the first user interface element are modifiable by specifying a new property value for the property. A visual aspect of the first user interface element is customized by specifying a first updated value for a first of the properties. An updated display is rendered that includes an updated first user interface element. The updated first user interface element is the first user interface element rendered in accordance with the first updated value for the first property. The first updated value for the first property is automatically stored in a first file including customized property values.

  • Pub Date: 2013/19/12
  • Number: 09626080
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Scalable content delivery network request handling mechanism to support a request processing layer

Described herein are improved systems, methods, and devices for delivering and managing metadata in a distributed computing platform such as a content delivery network (CDN) so as to configure content servers to handle client requests. The teachings hereof provide, among other things, scalable and configurable solutions for delivering and managing metadata, preferably by leveraging dynamically obtained control information. For example, in one embodiment, a given content server may store metadata, e.g., in a configuration file, that references dynamic, late-bound control information for use in satisfying dependencies. This dynamic control information can be requested by the CDN content server, typically from a remote host, when needed to parse and execute the metadata.

  • Pub Date: 2013/19/12
  • Number: 09509804
  • Owner: Akami Technologies, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Rule-based actions for resources in a distributed execution environment

A distributed execution environment provides resources such as computing resources, hardware resources, and software resources. Resource action rules (“rules”) may be defined and associated with resources in the distributed execution environment. The rules may be evaluated based upon resource state data defining the state of one or more resources. The results of the evaluation of the rules may be utilized to take various actions. For example, the results of the evaluation of rules may be utilized to generate a user interface (UI) object for providing information regarding the evaluation of the rule, to initiate a workflow, and/or perform another type of action. The results might also be utilized to prohibit certain types of operations from being performed with regard to a resource. The results might be propagated to other resources. A UI might also be provided for use in defining the rules.

  • Pub Date: 2013/19/12
  • Number: 09647896
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Parallel migration of data objects to clustered storage

Data objects can be migrated, while live, to virtualized clustered storage arrays in an efficient manner to allow for efficient transition from non-clustered storage to the virtualized clustered storage arrays. A data migration specification indicates data objects to be migrated and parameters for the migration. The parameters include a source of a data object, a destination of the data object in the virtualized clustered storage arrays, and a transfer space. A migration engine validates and parses the data migration specification. For each unique association of source, destination, and transfer space, the migration engine instantiates a migration process that drives and monitors migration of the corresponding data object. The migration processes operate in parallel for migration of the specified data objects into the virtualized clustered storage arrays.

  • Pub Date: 2013/19/12
  • Number: 09207873
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for electronic document handling

A method for electronic document handling utilizing a browser apparatus communicatively coupled to a document execution server comprises downloading an unsigned electronic document from the document execution server to the browser apparatus and downloading a front-end program including zoom instructions from the document execution server to the browser apparatus. The front-end program may be separate from or part of the unsigned electronic document. The method also includes displaying the unsigned electronic document on the display screen of the browser apparatus. This displaying includes displaying fields to be filled in by the operator of the browser apparatus using the pointing apparatus and the data entry apparatus. The method also includes running the front-end program downloaded from the document execution server to zoom into or out of at least one of the displayed fields.

  • Pub Date: 2013/19/12
  • Number: 09507760
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Method of sensing acidic/acid-forming and oxidizable gases for use as a residual filter life indicator

Processes of detecting the presence of an environmental challenge such as contact with an acidic/acid-forming and/or oxidizable gas are provided whereby a metal oxyhydroxide is used as a detection agent. The metal oxyhydroxide will irreversibly interact with an acidic/acid-forming and/or oxidizable gas causing a red-stretch of the emission spectra. This red-stretch alters the ratio of emission intensities at higher wavelengths relative to lower wavelengths. A reduced post-exposure photoluminescence ratio is, therefore, used to detect exposure to such a gas or environmental challenge. The materials and processes may be used as a residual life indicator for filtration systems or for the detection of environmental challenges.

  • Pub Date: 2013/19/12
  • Number: 09310309
  • Owner: The United States of America, as Represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for managing calendar entries in a document

A method for managing calendar entries in a document is provided. In one embodiment, a document comprising a calendar entry is accessed by an electronic device. The document is not a meeting invitation email. The calendar entry is then extracted from the document. Further, the calendar entry is included in a calendar of a user. An apparatus for substantially performing the method as described herein is also provided.

  • Pub Date: 2013/19/12
  • Number: 09436717
  • Owner: ADOBE SYSTEMS INCORPORATED
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Interconnect partition binding API, allocation and management of application-specific partitions

One system includes one or more host computing systems, each host computing system including at least one execution core and a system memory. The system includes a plurality of virtual partitions executing on the one or more host computing systems and including a first partition having at least a portion of the system memory associated with at least one of the one or more host computing systems and configure to store a database therein. The system also includes an interconnect layer communicatively connecting the plurality of virtual partitions, the interconnect layer providing a programming interface by which direct memory access operations between partitions are coordinated. In response to database commands received at the first partition, the data stored in the database is provided to a requesting partition a direct memory access operation.

  • Pub Date: 2013/19/12
  • Number: 09519795
  • Owner: Unisys Corporation
  • Location: Blue Bell, US
  • Details: Visit USPTO

Visit USPTO Page


Input control assignment

Various techniques may be employed for assigning user inputs such as a touch on a touchscreen to various input controls such as buttons or other features provided on a touchscreen. One example input assignment technique is a nearest neighbor technique, whereby a touch may, for example, be assigned to an input control that is positioned closest to the touch location. Another example input assignment technique is an angle and distance technique, whereby a touch may, for example, be assigned to an input control based on an angle and a distance of the touch relative to a prior touch.

  • Pub Date: 2013/19/12
  • Number: 09086759
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Graphics processor sub-domain voltage regulation

Voltage regulation of processor sub-domains supplied by a same voltage domain power supply rail. Voltage to certain logic units within the voltage domain may be reduced relative to other logic units of the voltage domain, reducing idle time at high power. In an embodiment, a first voltage-regulated sub-domain includes at least one execution unit (EU) while a second voltage-regulated sub-domain includes at least one texture sampler to provide flexibility in setting the graphics core power-performance point beyond modulating active EU count through power domain (gating) control. In embodiments, a sub-domain voltage is regulated by an on-chip DLDO for fast voltage switching. Clock frequency and sub-domain voltage may be switched faster than the voltage of the voltage domain supply rail, permitting a more finely grained power management that can be responsive to EU workload demand.

  • Pub Date: 2013/19/12
  • Number: 09563263
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


GNSS receiver positioning system

A method of extracting pseudorange information using a cellular device. A Global Navigation Satellite System (GNSS) chipset which is physically remote from a cellular device is accessed which provides raw GNSS observables information based upon signals received from a circularly polarized GNSS antenna. The raw GNSS observables information is wirelessly transmitted from the GNSS chipset to the cellular device. The raw GNSS observables information is extracted by a processor of the cellular device. The raw GNSS observables information, in addition to GNSS corrections from at least one correction source, is used by the processor to determine a position of the circularly polarized GNSS antenna.

  • Pub Date: 2013/19/12
  • Number: 09612341
  • Owner: Trimble Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Extensible service execution framework with data mapping architecture

A service description associated with a service is received. An input data mapping rule from a first caller context to a service context associated with the service is automatically determined at least in part by transforming the service description. A service binding data consumer based at least in part on the service description is created. The service and the input data mapping rule between the first caller context and the service context is automatically executed.

  • Pub Date: 2013/19/12
  • Number: 09342327
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Electronically binding to a lost mobile device

A first mobile device detects a second mobile device in the vicinity of the first mobile device and determines that the second mobile device is lost. The first mobile device electronically binds to the second mobile device and obtains information relating to the second mobile device. The first mobile device sends the information relating to the second mobile device to a designated party. The first mobile device receives an indication that the second device is no longer lost. The first mobile device, in response to receiving the indication that the second device is no longer lost, unbinds from the second mobile device.

  • Pub Date: 2013/19/12
  • Number: 09191775
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed multi-level caching for storage appliances

A distributed multi-layer cache in a distributed storage system is described, where the storage controller functions of the distributed storage system are separated from that of distributed storage system storage media. In an exemplary embodiment, a storage controller server determines if an object is in a cache that stores a plurality of objects. In addition, the distributed storage system includes the cache and a distributed object layer for persistently storing the plurality of objects. The cache further includes a de-duplicated cache layer. The storage controller server accesses the object from the cache if the object is in the cache and accesses the object from the distributed object layer if the object is not in the cache.

  • Pub Date: 2013/19/12
  • Number: 09582421
  • Owner: Springpath, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Data storage system utilizing proxy device for storage operations

A data storage environment can include a secondary storage computing device that acts as a proxy for other secondary storage computing devices. For example, the secondary storage computing device receives a storage operation request from one or more of the other secondary storage computing devices, such as a request to create a snapshot of client data. The secondary storage computing device generally acts as an intermediary between the other secondary storage computing devices and the storage device to carry out the snapshots or other storage operations. The secondary storage computing device may further receive a notification upon completion of the storage operations, and transmit relevant data to the requesting secondary storage computing device regarding the storage operation.

  • Pub Date: 2013/19/12
  • Number: 09471578
  • Owner: CommVault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Communication traffic processing architectures and methods

Communication traffic processing architectures and methods are disclosed. Processing load on main Central Processing Units (CPUs) can be alleviated by offloading data processing tasks to separate hardware.

  • Pub Date: 2013/19/12
  • Number: 09654406
  • Owner: REALTEK SINGAPORE PTE LTD
  • Location: Singapore, SG
  • Details: Visit USPTO

Visit USPTO Page


CIM-based data storage management system having a restful front-end

Techniques are directed to a method performed by a computing device. The method includes (a) receiving, from a client via a network connection of the computing device, a first management request to manage a data storage system, the first management request being in a RESTful style, (b) generating, by the computing device, a second management request formatted in a non-RESTful style compliant with a back-end storage management protocol, (c) sending the second management request to a back-end storage management server, (d) receiving a first management response from the back-end storage management server in response to the second management request, the first management response being formatted in the non-RESTful style compliant with the back-end storage management protocol, (e) converting, by the computing device, the first management response into a second management response in the RESTful style, and (f) sending the second management response to the client via the network connection.

  • Pub Date: 2013/19/12
  • Number: 09432484
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


White-box testing systems and/or methods in web applications

Certain example embodiments relate to white-box testing techniques, e.g., for graphical user interfaces (GUIs). Responsive to a first parameter received from a test suite executer, test bootstrap code included in an application is executed, where the application and the test suite executer run in the same browser. A test case to be run on the application and a test case executer to execute the test case are retrieved by the executed test bootstrap code. The retrieved test case is executed in a same context of the browser as the application. Results from executing the test case are stored.

  • Pub Date: 2013/18/12
  • Number: 09098636
  • Owner: SOFTWARE AG
  • Location: Darmstadt, DE
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and apparatuses for implementing cross organizational data sharing

In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing cross organizational data sharing including, for example, means for storing customer organization data in a database of the host organization; allocating at least a sub-set of the customer organization data to be shared as shared data; configuring a hub to expose the shared data to a proxy user and configuring the proxy user at the hub with access rights to the shared data; configuring one or more spokes with access rights to the shared data of the hub via the proxy user; receiving a request from one of the hubs for access to the shared data of the customer organization via the proxy user at the hub; and returning a response to the hub having made the request. Other related embodiments are disclosed.

  • Pub Date: 2013/18/12
  • Number: 09185078
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for secure password entry

Systems and methods for secure password entry are provided. When a user wishes to log in or otherwise authenticate as an authorized user of a system using a password, the system can provide an apparently random sequence of characters to the user. The user can select all of the characters in the sequence of characters that also appear in the user's password. The system can determine whether all of the selected characters are in the password and that all of the characters in the sequence of characters that are also in the password were selected. The user can select the characters in any order and the selected characters can include less than all of the characters in the password. In this way, the system can authenticate the user without the user entering their entire password, thereby increasing both the efficiency and the security of the password entry operation.

  • Pub Date: 2013/18/12
  • Number: 09178873
  • Owner: PAYPAL. INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for evaluating and prioritizing responses from multiple OCSP responders

The present disclosure is directed towards systems and methods for determining a status of a client certificate from a plurality of responses for an Online Certificate Status Protocol (OCSP) request. An intermediary device between a plurality of clients and one or more servers identifies a plurality of OCSP responders for determining a status of a client certificate responsive to receiving the client certificate from a client during a Secure Socket Layer (SSL) handshake. Each of the plurality of OCSP responders may transmit a request for the status of the client certificate to a uniform resource locator corresponding to each OCSP responder. The intermediary device may determine a single status for the client certificate from a plurality of statuses of the client certificate received via responses from each uniform resource locator.

  • Pub Date: 2013/18/12
  • Number: 09172545
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for analyzing content engagement in conjunction with social media

Various embodiments disclose a system and methods for media content analysis based at least in part upon social media data. In some embodiments, a computer system may identify social media messages corresponding to televised content. For example, following the uploading of a television show (or advertisement) to an Internet website, or transmission across a television network, viewers and non-viewers of the show may begin commenting upon the show. The system may correlate the number of viewers of the show with the social media messages to generate one or more metrics describing relations between the show's viewership and the show's social media effects.

  • Pub Date: 2013/18/12
  • Number: 09609386
  • Owner: RENTAK CORPORATION
  • Location: Portland, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for a mobile wallet

A computer-implemented method includes capturing an image by a mobile computing device and determining a geographic location and a direction of the mobile computing device while capturing the image. The method includes generating a display that includes the image and that identifies the locations of merchants that have at least one offer available for a user of the mobile device based on the geographic location and the direction of the mobile computing device and generating the at least one offer based on the past transactions of the user.

  • Pub Date: 2013/18/12
  • Number: 09311654
  • Owner: Wells Fargo Bank, N.A.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Normalization seismic attribute

A method can include providing seismic data values for a subsurface region that includes a reflector; determining a gradient magnitude value based on at least a portion of the seismic data values; normalizing the gradient magnitude value using a nonlinear normalization equation that includes a gradient magnitude variable divided by a normalization variable raised to a power that depends on an adjustable parameter; and outputting the normalized gradient magnitude value. Various other apparatuses, systems, methods, etc., are also disclosed.

  • Pub Date: 2013/18/12
  • Number: 09523781
  • Owner: Schlumberger Technology Corporation
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to correlate census measurement data with panel data

Methods, apparatus, systems and articles of manufacture are disclosed to correlate census measurement data with panel data. An example method disclosed herein includes instructing, via a first computing device of a monitoring entity, a media provider to embed a tag in media, the tag to cause a device accessing the media to send a message to the monitoring entity when the media is accessed by the device, the message to identify a geographic location of the device. The example method also includes accessing the message with a second computing device of the monitoring entity. The example method also includes identifying, with the second computing device of the monitoring entity, a panelist identifier based on the geographic location of the device. The example method also includes associating media identifying information included in the message with panelist data associated with the panelist identifier.

  • Pub Date: 2013/18/12
  • Number: 09635404
  • Owner: The Nielsen Company (US), LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Executing a populated code template to generate a browser-executable software program to present a web page as a mobile application

A browser-executable software program for presenting a web page that provides the “look and feel” and functionality of a mobile application can be automatically generated from a mobile application specification. The mobile application specification identifies one or more predetermined content component types and one or more associated content sources. For each content component type, a copy of a corresponding code generation template is populated with a URL for each corresponding content source and executed to produce browser-executable program code. The browser-executable program code is then embedded into a populated copy of a navigation container code template to form a complete browser-executable software program, which is integrated into an HTML page. The HTML page can be returned in response to a request from a browser executing on a networked mobile wireless telecommunication computing device and the HTML page carries the browser-executable software program to the browser.

  • Pub Date: 2013/18/12
  • Number: 09501458
  • Owner: Weever Apps Inc.
  • Location: , CA
  • Details: Visit USPTO

Visit USPTO Page


Detecting code alteration based on memory allocation

Techniques are described for identifying potential code injection attacks against a process by analyzing the memory allocation for the process. Memory allocation data may be collected on one or more host computing devices, the memory allocation data describing the amount of memory allocated for a process or utilized by a process during its execution. The collected memory allocation data may be analyzed to identify instances of anomalous memory allocation during process execution. Statistical or machine learning algorithms may be employed to identify anomalous memory allocation based on the analysis of aggregated memory allocation data for the process.

  • Pub Date: 2013/18/12
  • Number: 09348742
  • Owner: AMAZON TECHNOLOGIES, INC.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Blurring while loading map data

Aspects of the disclosure relate to rendering three-dimensional (3D) models to increase visual palatability. One or more computing devices may render an image of a 3D model. This rendering may actually occur in one or more stages. At an interim stage, the one or more computing devices determine an error value for a rendering of a partially-loaded version of the image. The error value is compared to a threshold. Based on the comparison, the one or more computing device generates an at least partially blurred rendering based at least in part on the rendering of the partially-loaded version of the image. The one or more computing devices provide the at least partially blurred rendering and subsequently provide for display a completely loaded version of the image.

  • Pub Date: 2013/18/12
  • Number: 08982120
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Travel account

A user can set up a travel account with a payment provider, to inform the payment provider of expected dates and locations of travel, along with limits or restrictions at the various locations and/or dates. When the user travels and attempts to make a payment, the payment provider can determine the location and date to aid in processing the payment request, resulting in an easier process for the user, while still providing additional security with the limits and restrictions.

  • Pub Date: 2013/17/12
  • Number: 09262758
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Therapeutic thiazolidinone compounds

Thiazolidinone compounds, including pharmaceutically acceptable salts of the compounds, are CETP inhibitors and are useful for raising HDL-cholesterol, reducing LDL-cholesterol, and for treating or preventing atherosclerosis.

  • Pub Date: 2013/17/12
  • Number: 09376408
  • Owner: Merck Sharp & Dohme Corp.
  • Location: Rahway, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for wireless load balancing and channel selection for a wireless device using WLAN modules operating simultaneously in different wireless bands

Systems and methods for enabling a WLAN client to communicate simultaneously over more than one band at a time are described, where each client has at least one radio that is operational in each supported band. Load balancing based on traffic requirements optimizes the use of the multiple bands.

  • Pub Date: 2013/17/12
  • Number: 09402199
  • Owner: NETGEAR, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for simultaneously using multiple WLAN modules operating in different wireless bands

Systems and methods for enabling a wireless local area network (WLAN) client to communicate simultaneously over more than one band at a time are described, where each client has at least one radio that is operational in each supported band. Load balancing based on traffic requirements optimizes the use of the multiple bands.

  • Pub Date: 2013/17/12
  • Number: 09439099
  • Owner: NETGEAR, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for optically projecting three-dimensional text, images and/or symbols onto three-dimensional objects

The present invention provides a method whereby the spatial relationship and orientations of one or more three-dimensional objects being illuminated by an optical projector, and the optical projector itself, can be very accurately defined both quickly and easily. The present invention also provides a novel computerized optical projection system whereby three-dimensional data when viewed by the human eye projected onto three-dimensional objects is not deformed as a result of the non-planar projection surface. In one embodiment, the invention provides computerized optical assembly or manufacturing guidance systems, and related methods, that provide step-by-step assembly or manufacturing instructions for instructing technicians how to assemble or manufacture three-dimensional objects or systems. The assembly instructions are in the form of calibrated three-dimensional text, images and/or symbols, and are projected by one or a plurality of optical projectors that are in operable communication with one or a plurality of computers onto the three-dimensional objects or systems, or component parts or skins thereof.

  • Pub Date: 2013/17/12
  • Number: 09332251
  • Owner: DELTA SIGMA COMPANY
  • Location: Kennesaw, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for implementing a wireless device that supports WLAN modules operating simultaneously in different wireless bands

Systems and methods for enabling a WLAN client to communicate simultaneously over more than one band at a time are described, where each client has at least one radio that is operational in each supported band. Load balancing based on traffic requirements optimizes the use of the multiple bands.

  • Pub Date: 2013/17/12
  • Number: 09516540
  • Owner: NETGEAR, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Streamlined provisioning and configuration of computing devices

Methods and systems for provisioning a computing device are provided. An example method may include receiving, by a computing device, information indicating a uniform resource identifier (URI) and a wireless access point configured to allow the computing device to connect to a wireless network to enable the computing device to access the URI. The method may also include downloading, onto the computing device, a provisioning software application from the URI. The method may also include executing the provisioning software application on the computing device, wherein the provisioning software application is configured to provision the computing device such that the provisioned computing device is configured to operate in a limited function mode. The method may also include locking the provisioned computing device to prevent changes to the limited function mode.

  • Pub Date: 2013/17/12
  • Number: 08886933
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Resource data query processing

A distributed execution environment provides resources such as computing resources, hardware resources, and software resources. One or more resource data providers might also operate in conjunction with the distributed execution environment to provide resource data describing various aspects of the resources in the distributed execution environment. A query service may obtain resource data provided by the resource data providers in order to generate responses to queries. In order to obtain the resource data from the resource data providers, the query service may utilize various “pull” and “push” mechanisms. Using a push mechanism, the resource data providers push resource data to the query service. Utilizing a pull mechanism, the query service pulls the resource data from the resource data providers. The query service might also store resource data received from the resource data providers in a cache and utilize the cached resource data when responding to queries for resource data.

  • Pub Date: 2013/17/12
  • Number: 09473799
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Reconfiguring reserved instance marketplace offerings for requested reserved instance configurations

A virtual computing resource provider may implement reconfiguration of reserved compute instance marketplace offerings for requested reserved compute instance configurations. A request for listings of reserved compute instances available for resale according to a specified instance configuration may be received. Reserved compute instances may be identified that are reconfigurable to satisfy the specified configuration (e.g., a particular type, location, or reservation term length). Listing may be provided for reservation by a client that include modified listings that describe a configuration for the reconfigurable reserved compute instances that satisfies the specified configuration. In some embodiments, a reservation request for a modified listing may be received, and in response the reserved compute instance associated with the modified listing may be reconfigured (e.g., modified, upgraded, downgraded, or term adjusted) as described in the modified listing. Access to the reconfigured reserved compute instance may then be provided to the reserving client.

  • Pub Date: 2013/17/12
  • Number: 09639875
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Propagating state information to network nodes

Method and apparatus for propagating state information updates are disclosed. In the method and apparatus, a node establishes connections with one or more nodes of a plurality of nodes based at least in part on the number of connections retained by each node of the plurality of nodes. The node may then propagate state information updates to the one or more nodes.

  • Pub Date: 2013/17/12
  • Number: 09609031
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Predictive diagnosis of SLA violations in cloud services by seasonal trending and forecasting with thread intensity analytics

Data can be categorized into facts, information, hypothesis, and directives. Activities that generate certain categories of data based on other categories of data through the application of knowledge which can be categorized into classifications, assessments, resolutions, and enactments. Activities can be driven by a Classification-Assessment-Resolution-Enactment (CARE) control engine. The CARE control and these categorizations can be used to enhance a multitude of systems, for example diagnostic system, such as through historical record keeping, machine learning, and automation. Such a diagnostic system can include a system that forecasts computing system failures based on the application of knowledge to system vital signs such as thread or stack segment intensity and memory heap usage. These vital signs are facts that can be classified to produce information such as memory leaks, convoy effects, or other problems. Classification can involve the automatic generation of classes, states, observations, predictions, norms, objectives, and the processing of sample intervals having irregular durations.

  • Pub Date: 2013/17/12
  • Number: 09495395
  • Owner: ORACLE INTERNATIONAL CORPORATION
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Operating system in a commodity-based computing system

Disclosed herein is a commodity infrastructure operating system that manages and implements the resources and services found in the heterogeneous components of the common infrastructure. The infrastructure operating system managing one or more services residing within an operating system image of a partition. The infrastructure operating system capable of providing a service of a first partition's operating system to a second partition's operating system when the second partition is in need of the service.

  • Pub Date: 2013/17/12
  • Number: 09483289
  • Owner: Unisys Corporation
  • Location: Blue Bell, US
  • Details: Visit USPTO

Visit USPTO Page


Natural language access to application programming interfaces

Users of online services may avoid having to gain knowledge of the intricacies of specific Application Programming Interface (API) syntaxes and elements by using natural language requests which are processed to extract components of the request. The components are then used to find one or more matches of known APIs, and then at least one structured API call is constructed by mapping the request's components to the structured API call's elements. The system can then invoke the online service on behalf of the client, and return the results to the client, or it can return the constructed structured API call to the client. The known API details can be initialized and updated by ingesting the description documents for the structured APIs, and then using natural language processing to extract components from the descriptions, which can then be utilized in the matching process to further enhance the results of the tool.

  • Pub Date: 2013/17/12
  • Number: 09015730
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile device pass through for signaling messages

A mobile device pass through for signaling messages procedure allows smart devices to participate in and control multimedia communications by providing the ability to control multimedia communications to the smart device by the mobile device. A mobile device and a smart device establish a channel of communications between the mobile device and a web browser executing on the smart device, e.g. when both are connected to the same Wi-Fi access point. When the web browser accesses a web application that utilizes signaling messages to control multimedia content, the web browser will send signaling message requests to the mobile device. The mobile device, in turn, generates and forwards the signaling message. Media content is delivered directly to the smart device without passing through the mobile device or the established channel of communications.

  • Pub Date: 2013/17/12
  • Number: 09635524
  • Owner: Cellco Partnership
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer readable mediums for role-based access control involving one or more converged infrastructure systems

Methods, systems, and computer readable mediums for implementing role-based access control (RBAC) are disclosed. According to one method, the method includes authenticating a user for implementing RBAC across multiple components associated with one or more converged infrastructure systems, receiving, from the user, RBAC related information for implementing RBAC across the multiple components associated with the one or more converged infrastructure systems, and implementing, using the RBAC related information, RBAC across the multiple components associated with the one or more converged infrastructure systems.

  • Pub Date: 2013/17/12
  • Number: 09280646
  • Owner: VCE Company, LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Message handling multiplexer

A method and apparatus for processing message is described. In one embodiment, an application programming interface is configured for receiving and sending messages. A multiplexer receives messages from different servers. A service name is coupled to each message with the corresponding destination service. A single shared channel is formed. The messages are processed over the single shared channel.

  • Pub Date: 2013/17/12
  • Number: 09548949
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Mechanism to enable WiFi offload based on power preference of user equipment

In typical UEs, scanning for WiFi access points (APs) can consume a significant amount of power. This scanning occurs when the UE is connected through the cellular network, but does not occur when the UE is connected to a WiFi network. As a result, offloading a UE from a cellular network to a WiFi network can allow the UE to conserve power. An issue with existing cellular networks is that the UE cannot inform a cellular network that the UE is running low on power, and therefore cannot direct the cellular network to offload the UE for power conservation reasons. A technique discussed herein allows the UE to indicate its power saving needs to the cellular network. In response, the cellular network can lower (or raise) a particular threshold, so that the UE now exceeds (or no longer exceeds) the threshold, and initiates offloading.

  • Pub Date: 2013/17/12
  • Number: 09609565
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Knowledge intensive data management system for business process and case management

Data can be categorized into facts, information, hypothesis, and directives. Activities that generate certain categories of data based on other categories of data through the application of knowledge which can be categorized into classifications, assessments, resolutions, and enactments. Activities can be driven by a Classification-Assessment-Resolution-Enactment (CARE) control engine. The CARE control and these categorizations can be used to enhance a multitude of systems, for example diagnostic system, such as through historical record keeping, machine learning, and automation. Such a diagnostic system can include a system that forecasts computing system failures based on the application of knowledge to system vital signs such as thread or stack segment intensity and memory heap usage. These vital signs are facts that can be classified to produce information such as memory leaks, convoy effects, or other problems. Classification can involve the automatic generation of classes, states, observations, predictions, norms, objectives, and the processing of sample intervals having irregular durations.

  • Pub Date: 2013/17/12
  • Number: 09330119
  • Owner: ORACLE INTERNATIONAL CORPORATION
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive zooming in video conferencing

In a video conferencing application, a user viewing a scene can performing zooming by selecting an area in the scene, then dynamically switching a video feed of the scene to the selected area of the scene. The hardware and software of the video conferencing application can limit the video transmitted to the user to include only the selected area of the scene. Transmitting only the selected area of the scene, and excluding the non-selected area of the scene from transmission, can more efficiently use the available bandwidth of the video conferencing application.

  • Pub Date: 2013/17/12
  • Number: 09307192
  • Owner: Intel IP Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Indexed electronic book annotations

A request for annotations identifying a user, an electronic content item (e.g., an electronic book), and a portion of the electronic content item is received from a client device. A set of annotations is identified that correspond to the identified portion of the electronic content item and an unlocked subset of this set of annotations is determined based on an access history of the identified user that indicates electronic content the identified user has previously accessed. At least one annotation from the unlocked subset is sent to the client device for presentation in conjunction with the identified electronic content item.

  • Pub Date: 2013/17/12
  • Number: 09323733
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Indazole compounds as aldosterone synthase inhibitors

  • Pub Date: 2013/17/12
  • Number: 09522141
  • Owner: Merck Sharp & Dohme Corp.
  • Location: Rahway, US
  • Details: Visit USPTO

Visit USPTO Page


Gaming machine with award based on sub-game outcomes

Disclosed are games, gaming machines, gaming systems and methods including a primary game award at least partially based on the outcomes of one or more sub-games. The outcomes are related according to a pay table associated with the primary game.

  • Pub Date: 2013/17/12
  • Number: 09355526
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Distributing processing for imaging processing

Approaches are described for managing the processing of images or video on a computing device. A portable computing device can include one or more dedicated components, such as an application-specific integrated circuit (ASIC) or other dedicated processor component, to be integrated into the computing device to perform at least a portion of the imaging processing of captured images or video. For example, the dedicated processor component can enable the offloading of basic image signal processing, as well as higher level or “machine vision” processing from the device processor of the device. In this way, the dedicated processor component can perform signal processing for which the input is an image (or video), and where image or video data can be analyzed, interpreted and/or manipulated to generate an output, the output of image processing being either an image or a set of characteristics or parameters related to the image. The output can be provided to a device processor for further processing.

  • Pub Date: 2013/17/12
  • Number: 09402018
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Compression of image data

Image content may be compressed using a plurality of block truncation coding schemes resulting in a plurality of compressed versions of the image content. The plurality of compressed versions may be combined together into a single data structure. Prior to combining the plurality of compressed versions, each compressed version may be further compressed. In one embodiment, a data structure containing a plurality of block truncation encoded format versions of image content may be received. Rendering hardware-compatible block truncation encoded content from the plurality of compressed versions may be determined and provided to rendering hardware. The hardware may then decode the selected one block truncation encoded format for display. In one embodiment, each of the received plurality of block truncation encoded content versions may be further compressed. Before providing the selected version to the hardware for decoding, the further compression may be decompressed.

  • Pub Date: 2013/17/12
  • Number: 08761528
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Automating software availability management based on API versioning

A method is disclosed for automating software availability management based on application program interface (API) versioning. The method includes receiving a call to a first version of an API method from a software application. The method includes retrieving software configuration information for the software application, the software configuration information including a set of supported versions of the API method. The method includes retrieving server configuration information for a server computing device, the server configuration information including a set of available versions of the API method. The method then includes determining availability of the server computing device to support the software application.

  • Pub Date: 2013/17/12
  • Number: 09262237
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Automated banking machine that operates responsive to data

In an example embodiment, an automated banking machine is provided which may comprise a trusted platform (TP) including a trusted platform module (TPM) in a computer of the machine. Through use of the TP, the machine may perform cryptographic functions for use in enabling the machine to perform transaction functions for users. The machine may be operative to use the TP to securely store secret keys, or other critical information in sealed storage on a data store of the machine. The TP may also be used to measure, attest, and verify transaction function devices, hardware devices, firmware, software, and/or other components of the machine prior to enabling the machine to function in an enabled mode. The TP may also be used to establish secure communication between components of the machine. The TP may also be used to perform key transfers between the machine and a host banking system.

  • Pub Date: 2013/17/12
  • Number: 09117328
  • Owner: Diebold Self-Service Systems division of Diebold, Inc.
  • Location: North Canton, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for recognizing a tap gesture on a touch sensing device

Methods and apparatus include determine velocity of a detected presence in a first direction relative to a capacitive sensing surface, during a period of time, and determine velocity of the detected presence in a second direction relative to the capacitive sensing surface, during the period of time. Methods and apparatus detect a change in the determined velocity in the first direction at a first time, detect a change in the determined velocity in the second direction at a second time; and recognize a user command based on a difference between the first time and the second time.

  • Pub Date: 2013/17/12
  • Number: 09588676
  • Owner: MONTEREY RESEARCH, LLC
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for image browsing

A set of images may be obtained by a computing system of a user device. A display may be provided on the user device including a first image of the set of images. An indication may be received that indicates a tilt action of the user device. Based at least in part on the tilt action being within a particular tilt threshold, a partial view of the first image and a partial view of the second image may be provided to the user.

  • Pub Date: 2013/16/12
  • Number: 09299103
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for configuring policy bank invocations

Systems and methods for configuring and evaluating policies that direct processing of one or more data streams are described. A configuration interface is described for allowing users to specify object oriented policies. These object oriented policies may allow any data structures to be applied with respect to a payload of a received packet stream, including any portions of HTTP traffic. A configuration interface may also allow the user to control the order in which policies and policy groups are executed, in addition to specifying actions to be taken if one or more policies are undefined. Systems and methods for processing the policies may allow efficient processing of object-oriented policies by applying potentially complex data structures to unstructured data streams. A device may also interpret and process a number of flow control commands and policy group invocation statements to determine an order of execution among a number of policies and policy groups. These policy configurations and processing may allow configuration and processing of complex network behaviors relating to load balancing, VPNs, SSL offloading, content switching, application security, acceleration, and caching.

  • Pub Date: 2013/16/12
  • Number: 09450837
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing recommendations for in-game events

Recommendations for in-game content are provided to players of an online game. An instance of a virtual space is executed in which an online game is conducted and implemented to facilitate presentation of a view of the virtual space to users through client computing platforms associated with the users. Device specification sets of the client computing devices are determined and recommendations for in-game content are presented to the users based on the obtained device specification sets of the client computing devices associated with the users.

  • Pub Date: 2013/16/12
  • Number: 09295916
  • Owner: KABAM, INC.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for networked PVR storage and content capture

A content management system for managing content stored by a number of networked Personal Video Recorders (PVRs) associated with a user community is provided. More specifically, the storage space of each of the personal video recorders is physically or logically partitioned into a personal space and a community space. The content management system manages the community spaces of the PVRs such that content relevant to the user community is stored in the collective community space of the PVRs and available to the user community.

  • Pub Date: 2013/16/12
  • Number: 09118949
  • Owner: Qurio Holdings, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for identity management for mobile devices

Systems and methods for managing a user identity on a mobile device are provided. The system comprises the mobile device comprising a user agent and a client application, the user agent and the client application in communication with each other. The system further comprises an identity provider in communication with the mobile device, and a client service in communication with the mobile device. The user agent is configured to communicate with the identity provider and retrieve the user identity for the client application, and the client application is configured to transmit the user identity to the client service.

  • Pub Date: 2013/16/12
  • Number: 09363272
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for automated network configuration

A method of configuring a data network with a controller, the data network including a plurality of hosts each associated with at least one of a plurality of switches, the method including receiving a request to boot an operating system image on one of the plurality of hosts, the operating system image having network connectivity requirements. Further, the method includes selecting a host out of the plurality of hosts on which to boot the operating system image. The method also includes booting the operating system image on the host, and configuring a switch out of the plurality of switches associated with the host based upon the network connectively requirements of the operating system image. Additionally, the method includes configuring networking attributes of a network interface in the host based upon the network connectivity requirements of the operating system image.

  • Pub Date: 2013/16/12
  • Number: 08892863
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time communications client architecture

A distributed services modular client architecture may be used to implement IP-based real time communication services in a flexible manner among a wide variety of different types of chip sets and systems-on-chip. The various services are distributed among one or more processor cores, at least one of which is a low power core, in accordance with a number of factors, including power consumption, media latency, on-time, performance, and other considerations. A processor “core” may refer to a processor itself where the processor has only a single core, and may also refer to a “core” of a multicore processor. The architecture uses a SIP/IMS framework, and is modularized by placing certain services into their own framework so that a particular service may be plugged into the SIP/IMS framework if and when desired, and otherwise omitted. The frameworks may be installed on various processor cores within the chip set or system-on-chip, including in particular the low power core, to allow for more effective power conservation without unduly sacrificing performance.

  • Pub Date: 2013/16/12
  • Number: 09152478
  • Owner: ECRIO, INC.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Presentation interface in a virtual collaboration session

Systems and methods for a presentation interface in a virtual collaboration session. In some embodiments, a method may include receiving, from a gesture capture system, an indication of a body movement performed by a participant of a virtual collaboration session; receiving, from a drawing control system, an indication of a drawing characteristic associated with the participant of the virtual collaboration session, and identifying an intent of the participant based upon a combination of the indications.

  • Pub Date: 2013/16/12
  • Number: 09372543
  • Owner: DELL PRODUCTS, L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Out-of band configuration of BIOS setting data

In certain aspects, a system for out-of-band configuring BIOS setting data (BIOSSD) includes a host computer and a service processor (SP). The SP stores a BIOSSD collection and a human interface data (HID) collection. The HID collection includes questions for data of the BIOSSD collection and corresponding options for each question. When a remote management computer sends to the SP an information request, the SP retrieves the HID collection and transmits the questions and the corresponding options to the remote management computer. In response to a command indicating a selected corresponding option, the SP changes corresponding data of the BIOSSD collection according to the command. When the BIOS executed at the host computer issues a BIOSSD update request to the SP, the SP transmits a copy of the BIOSSD collection to the BIOS chip of the host computer to replace the BIOSSD collection stored in the BIOS chip.

  • Pub Date: 2013/16/12
  • Number: 09558007
  • Owner: AMERICAN MEGATRENDS, INC.
  • Location: Norcross, US
  • Details: Visit USPTO

Visit USPTO Page


Network virtualization-aware data storage system

A data storage system includes at least one network virtualization-aware switch. The data storage system also includes at least one storage array operatively coupled to the network virtualization-aware switch, wherein the storage array is operatively coupled to at least one host computing device, and wherein the host computing device instantiates at least one virtual machine in at least one virtual network. Further, the data storage system includes at least one controller operatively coupled to the network virtualization-aware switch, wherein the controller is configured to link the storage array with the virtual machine of the virtual network through the network virtualization-aware switch.

  • Pub Date: 2013/16/12
  • Number: 09128622
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Mooring cleat with open design for non-threaded entry

A mooring cleat with open design for restraining a line and for attaching a free end of the line, the mooring cleat having an overlapping horn design with an angled slot that allows a line/rope into the device at any desired position along the line, wherein the cleat restrains the line against static pull in nearly any three-dimensional direction.

  • Pub Date: 2013/16/12
  • Number: 09376171
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and compositions for inhibiting CNKSR1

Embodiments include compositions and methods of inhibiting CNKSR1 and methods of identifying inhibitors of CNKSR1.

  • Pub Date: 2013/16/12
  • Number: 09340532
  • Owner: Phusis Therapeutics, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method, application, and device for audio signal transmission

The current invention discloses methods, applications, and devices for audio transmission from a mobile terminal. After receiving an audio signal transmission request from a user, the mobile terminal may initiate a recording session to record audio signals into audio frames. During the recording session, the terminal may adjust the audio codecs used for encoding the audio frames based on the workload and the performance of the terminal. By measuring and evaluating the encoding time, the terminal may change between using a floating-point AMR audio codec and a fixed-point AMR audio codec. The encoded audio frames are transmitted to a remote server. The current invention provides a flexible and efficient approach for audio signal encoding and transmission, balancing signal integrity and encoding speed at the same time.

  • Pub Date: 2013/16/12
  • Number: 09437205
  • Owner: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
  • Location: Shenzhen, Guangdong Province, CN
  • Details: Visit USPTO

Visit USPTO Page


Method and system for automated intellegent advertising on wearable devices

A method and system for automated intelligent advertising on wearable devices. The wearable devices includes digital eyewear, clothing, jewelry, watches, etc. Messages sent to an invalid alphanumeric identifier (e.g., WiFi addresses, e-mail address, text message address, social networking identifier, etc.) for a desired network service are returned including a notification that an attempt to connect to the desired network service has failed and also includes electronic advertising information that allows a network device to view and display a retrieved pre-determined advertisement or the dynamically generated advertisement and make a selection input to automatically connect to another network device associated with the retrieved pre-determined or dynamically advertisement to obtain additional electronic advertising information.

  • Pub Date: 2013/16/12
  • Number: 08913728
  • Details: Visit USPTO

Visit USPTO Page


Interfaces for digital media processing

APIs discussed herein promote efficient and timely interoperability between hardware and software components within the media processing pipelines of media content players. A PhysMemDataStructure API facilitates a hardware component's direct access to information within a memory used by a software component, to enable the hardware component to use direct memory access techniques to obtain the contents of the memory, instead of using processor cycles to execute copy commands. The PhysMemDataStructure API exposes one or more fields of data structures associated with units of media content stored in a memory used by a software component, and the exposed fields store information about the physical properties of the memory locations of the units of media content. SyncHelper APIs are used for obtaining information from, and passing information to, hardware components, which information is used to adjust the hardware components' timing for preparing media samples of synchronously-presentable media content streams.

  • Pub Date: 2013/16/12
  • Number: 09043504
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying and processing a number of features identified in a document to determine a type of the document

A system and method for document classification are presented. An input document is received (e.g., by at least one server communicatively coupled to a network). A plurality of features are identified in the input document. The plurality of features include sequences of text extracted from the input document. A feature vector of the input document is generated based upon the sequences of text, and the feature vector of the input document is compared to each of a plurality of signature vectors to determine a primary type of the input document. The primary type of the input document is stored into a storage system in communication with the at least one server.

  • Pub Date: 2013/16/12
  • Number: 09516089
  • Owner: Locu, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Fine-grained structured data store access using federated identity management

A structured data store service, such as a database service, may implement fine-grained access to data maintained at the database service using federated identity. Fine grained access requests may be received at a database service for specified data maintained for an application provider from a client of the application provider. An access credential may be also be received. Verification of the access credential may be obtained, and the database service may evaluate the fine-grained access request according to a delegation policy corresponding to the access credential to determine whether the fine-grained request is authorized. If authorized, the fine-grained access request may be service. If not authorized, the fine-grained access request may be denied. In some embodiments, multiple application clients may have the same authorization for data, such as read authorization, while another one or more application clients may have different authorization for the data, such as write authorization.

  • Pub Date: 2013/16/12
  • Number: 09569634
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic tree determination for data processing

Data can be processed in parallel across a cluster of nodes using a parallel processing framework. Using Web services calls between components allows the number of nodes to be scaled as necessary, and allows developers to build applications on the framework using a Web services interface. A job scheduler works together with a queuing service to distribute jobs to nodes as the nodes have capacity, such that jobs can be performed in parallel as quickly as the nodes are able to process the jobs. Data can be loaded efficiently across the cluster, and levels of nodes can be determined dynamically to process queries and other requests on the system.

  • Pub Date: 2013/16/12
  • Number: 09063976
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic system configuration in a virtual environment

An example method of launching a virtual machine in a multi-tenant environment using dynamic configuration may include receiving a customer request to launch a virtual machine in the multi-tenant environment. The multi-tenant environment may include a plurality of host server computers. In response to the customer request, configuration parameters stored in association with an account of the customer may be retrieved in the multi-tenant environment. One or more parameters of a hardware and/or a software resource in the multi-tenant environment may be dynamically configured in accordance with the retrieved configuration parameters. The virtual machine may be launched on one of the plurality of host server computers, using the configured hardware and/or software resource. The configuration parameters may be associated with at least one desired performance characteristic of the virtual machine to be launched.

  • Pub Date: 2013/16/12
  • Number: 09641385
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Determining application composition and ownership

Techniques are described for automatically determining application composition and application ownership of an application that may include a plurality of files deployed to a plurality of host devices. The determination of application composition may be based on analyzing various types of metadata that may provide evidence of associations between deployed files, such as metadata describing the deployment of files to host devices, metadata describing the files tracked within a source control system, or other types of metadata. The determination of application ownership may also be based on analyzing the various types of metadata that provide evidence of associations between files and individuals or groups of individuals within an organization.

  • Pub Date: 2013/16/12
  • Number: 09575979
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Dendrimer conjugates

The present invention relates to novel therapeutic and diagnostic dendrimers. In particular, the present invention is directed to dendrimer-linker conjugates, methods of synthesizing the same, compositions comprising the conjugates, as well as systems and methods utilizing the conjugates (e.g., in diagnostic and/or therapeutic settings (e.g., for the delivery of therapeutics, imaging, and/or targeting agents (e.g., in disease (e.g., cancer) diagnosis and/or therapy, pain therapy, etc.)). Accordingly, dendrimer-linker conjugates of the present invention may further comprise one or more components for targeting, imaging, sensing, and/or providing a therapeutic or diagnostic material and/or monitoring response to therapy.

  • Pub Date: 2013/16/12
  • Number: 08980907
  • Owner: The Regents of the University of Michigan
  • Location: Ann Arbor, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic sharing of digital multimedia

Devices and methods for automatic sharing of digital multimedia include, in one embodiment, obtaining factor data affecting a decision on whether or not to enter a digital multimedia sharing mode for an event or meeting; entering the digital multimedia sharing mode based on identifying calendar entry data for the event or meeting stored in a calendar database that satisfies the factor data; storing digital photograph data produced by a camera module while in the sharing mode in a digital multimedia container designated to store digital multimedia for the event or meeting; obtaining participant data for the event or meeting from the calendar entry data; and automatically making the digital photograph data available to the one or more participants based on the participant data.

  • Pub Date: 2013/16/12
  • Number: 09350774
  • Owner: Dropbox, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Automated data classification

A system and method for data classification are presented. A plurality of training tokens are identified by at least one server communicatively coupled to a network. Each training token includes a token retrieved from a content source and a classification of the token. For each training token in the plurality of training tokens, a plurality of n-gram sequences are identified, a plurality of features for the plurality of n-gram sequences are generated, and first training data is generated using the token retrieved from the content source, the plurality of features, and the classification of the token. A first classifier is trained with the first training data, and the first classifier is stored into a storage system in communication with the at least one server.

  • Pub Date: 2013/16/12
  • Number: 09483740
  • Owner: Go Daddy Operating Company, LLC
  • Location: Scottsdale, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system and method for secure payment

Embodiments of the invention generally relate to apparatus, systems and methods for authentication, in particular, apparatus, systems and methods for authenticating an entity for computer and/or network security, secure authorization of a payment or for funds transfer and for selectively granting privileges and providing other services in response to such authentications. In addition, embodiments of the invention relate generally to apparatus, systems and methods for the communication of information between a mobile user-device and a point-of-sale device to securely provide authorization for a financial transaction.

  • Pub Date: 2013/16/12
  • Number: 09531696
  • Owner: UNIVERSAL SECURE REGISTRY, LLC
  • Location: Newton, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for monitoring oxygenation levels of compartments and tissue

A method and system for continually monitoring oxygenation levels in real-time in compartments of an animal limb, such as in a human leg or a human thigh or a forearm, can be used to assist in the diagnosis of a compartment syndrome. The method and system can include one or more near infrared compartment sensors in which each sensor can be provided with a compartment alignment mechanism and a central scan depth marker so that each sensor may be precisely positioned over a compartment of a living organism. The method and system may comprise hardware or software (or both) may adjust one or more algorithms based on whether tissue being monitored was traumatized or is healthy. The method and system can also monitor the relationship between blood pressure and oxygenation levels and activate alarms based on predetermined conditions relating to the oxygenation levels or blood pressure or both.

  • Pub Date: 2013/14/12
  • Number: 09314165
  • Owner: J&M SHULER, INC.
  • Location: Athens, US
  • Details: Visit USPTO

Visit USPTO Page


Visualization of the reach of a post by a member of an on-line social networking system

A system for visualizing the reach of a post by a member of an on-line social networking system may be designed to increase awareness of the members, as to which degree their posted updates are noticed and reacted to by other members. When a member creates a post, either through the on-line social networking website itself or through an application programming interface (API) that allows to include a share user interface (UI) control on a third web party site, the system monitors events associated with the post, collects statistics with respect to the monitored events and uses this data to generate a visualization of the reach of that post. Example visualization provides the creator of the a sense of how many other members interacted with the post.

  • Pub Date: 2013/13/12
  • Number: 08930819
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Video capture, processing and distribution system

Novel tools and techniques for implementing remote control of image and video capture devices, and/or for implementing remote control of processing and sharing functions associated with captured image and/or video data. In accordance with some techniques, a first image capture device (“ICD”) at a customer premises and/or another computer (such as a control server) can identify and/or authenticate a user. Once identified and/or authenticated, the user is provided options to remotely control one or more second ICDs over the network. The user may also be provided options for displaying, processing, creating time lapse videos of, or sharing captured image data or video data.

  • Pub Date: 2013/13/12
  • Number: 09253520
  • Owner: Biscotti Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Utilizing dynamic granularity for application controls

A user may interact with a control interface in the course of interacting with electronic content. The control interface may include any user interface utilized to adjust various aspects of an application, including, but not limited to, scroll bars, sliders, and/or navigation windows. Input at the control interface may be received from the user indicating that the user desires to manipulate the electronic content (e.g., jump to another location in a movie) or, alternatively, that the user wishes to manipulate the control interface. Upon determining that the input is intended to manipulate the control interface, the control interface may be adjusted to display a control interface view that provides finer or coarser granularity, allowing the user to interact with the control interface with more accuracy.

  • Pub Date: 2013/13/12
  • Number: 09606713
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for the collaborative collection, assignment, visualization, analysis, and modification of probable genealogical relationships based on geo-spatial and temporal proximity

System, methods, apparatus and media for the geo-spatial capture and transcription of family trees, vital records, census records, land transfer records, cemetery records, and organizational membership records; for assigning deterministic and probabilistic relationships between people in geographic proximity; and for visualizing known, probable, and potential relationships in a geo-spatial context over time. Also disclosed are systems, methods, apparatus and media for organizing and analyzing genealogical information for searching and visualizing individuals and entities and their relationships to each other within a geo-spatial and temporal context. Further disclosed are systems, methods, apparatus and media for identifying a social networking site based on geo-spatial and temporal context data relating to individuals and entities and their relationships to each other.

  • Pub Date: 2013/13/12
  • Number: 08798915
  • Owner: Ancestralhunt Partners, LLC
  • Location: Southbury, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for sub-sea cable termination

An electrical connector includes a first cable termination chamber configured to receive a first power cable having at least a first conductor sheathed at least in part by a first insulating layer and a first insulation screen layer. Also, the electrical connector includes a first non-linear resistive layer configured to be coupled to a portion of the first conductor unsheathed by at least the first insulation screen layer and configured to control a direct current electric field generated in the first cable termination chamber. In addition, the electrical connector includes a first deflector configured to be coupled to the first power cable and control an alternating current electric field generated in the first cable termination chamber.

  • Pub Date: 2013/13/12
  • Number: 09306340
  • Owner: General Electric Company
  • Location: Niskayuna, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for querying hybrid multi data sources

A system and method of querying hybrid multi data sources includes receiving a query at a hybrid multi data source running on a computer server, creating a list of data sources, filtering the list of data sources based on data source hints included in the query, filtering the list of data sources based on data source rules, forming one or more query plans for processing the query, evaluating each of the query plans, selecting a first query plan from the query plans based on results of the evaluating, and performing the first query plan. Each query plan corresponds to a data source in the filtered list of data sources. In some examples, the first query plan has a lowest cost of each of the query plans. In some examples, the first query plan is based on probabilities associated with the cost of each of the query plans.

  • Pub Date: 2013/13/12
  • Number: 09372891
  • Owner: RED HAT, INC.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for dynamic collaboration during query processing

A system and method of dynamic collaboration during query processing includes determining a load factor for a data source, receiving a query at a query assistant running on a computer server, determining a complexity of the query, adjusting the complexity by the load factor, simplifying the query by removing one or more first query elements from the query when the adjusted complexity is above a threshold, forming a query plan where the first query elements are designated for processing outside the data source, and performing the query plan by sending one or more abbreviated queries to the data source and processing the first query elements using the query assistant. The abbreviated queries are based on the query with the first query elements removed. In some examples, the query may be iteratively simplified until a second adjusted complexity of a simplified version of the query falls below the threshold.

  • Pub Date: 2013/13/12
  • Number: 09391902
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Stub domain for request servicing

Techniques for reclaiming resources from guest computing systems while those systems are waiting for responses to requests in virtualized and/or distributed computer systems are described herein. At a time after issuing a request and determining that the response will take longer than a threshold length of time, one or more computer system entities within a computer system invoke one or more computer system capabilities to at least instantiate a listener object, transfer the listener object to another system domain, suspend the guest computing system and reclaim resources from the suspended guest computing system. When the response is returned to the listener object, the guest computer system is restored and the response is forwarded to the restored guest. While the guest computing system is suspended, the reclaimed resources are made available to other computer system entities.

  • Pub Date: 2013/13/12
  • Number: 09448827
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Single sign on with multiple authentication factors

The authentication of a client to multiple server resources with a single sign-on procedure using multiple factors is disclosed. One contemplated embodiment is a method in which a login session is initiated with the authentication system of a primary one of the multiple server resources. A first set of login credentials is transmitted thereto, and validated. A token is stored on the client indicating that the initial authentication was successful, which is then used to transition to a secondary one of the multiple resources. A second set of login credentials is also transmitted, and access to the secondary one of the multiple resources is granted on the basis of a validated token and second set of login credentials.

  • Pub Date: 2013/13/12
  • Number: 09288195
  • Owner: SecureAuth Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Protein scaffolds

The invention provides protein scaffolds and methods of preparing, screening, engineering and using such protein scaffolds.

  • Pub Date: 2013/13/12
  • Number: 09176129
  • Owner: MedImmune, LLC
  • Location: Gaithersburg, US
  • Details: Visit USPTO

Visit USPTO Page


Power cut off mode for conserving power in electronic devices

External jolts, such as those occurring during shipment, may inadvertently activate an electronic device. Such inadvertent activations may result in the electronic device entering an active mode during shipment, draining battery power. This document describes a power cut off mode that prevents inadvertent device activations and minimizes current consumption during shipment or storage of a device. This conserves battery power for operational use by the user.

  • Pub Date: 2013/13/12
  • Number: 09568983
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Personal wireless navigation system

A personal wireless navigation system operable on wireless phone devices provides a platform for empowering a merchant-paid search. Performance of a navigation functionality in a personal wireless navigation system is higher and more comparable and competitive with portable navigation devices and in-car navigation systems, and the search capability is comparable and competitive with the most popular web search engines. A user interface (UI) and look and feel of the personal wireless navigation system is provided which is enhanced so that users do not simply want to use the product—they covet it. The personal wireless navigation system may be constructed such that a subset of it with fewer features and functions can be productized, marketed and deployed to users.

  • Pub Date: 2013/13/12
  • Number: 09400591
  • Owner: Telecommunication Systems, Inc.
  • Location: Annapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile presence detection

Novel tools and techniques for collecting and using presence information. In accordance with some techniques, a presence detection device (“PDD”) at a customer premises and/or another computer (such as a control server) can identify and/or authenticate a user. Once identified and/or authenticated, the user's profiles and/or media content may be sent to the PDD, and/or access to the user's profiles and/or media content may be provided to the PDD.

  • Pub Date: 2013/13/12
  • Number: 09310977
  • Owner: Biscotti Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for designing quadruple-ridged flared horn antennas

Novel methods and systems for antenna design are disclosed. A quadruple-ridged flared horn antenna can be designed based on geometry and frequency requirements. Automated optimization allows the design of antennas with decade-bandwidth. Optimized quadruple-ridged flared horn antennas can be used for radio astronomy.

  • Pub Date: 2013/13/12
  • Number: 09594857
  • Owner: California Institute of Technology
  • Location: Pasadena, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for simplifying object mapping for external interfaces

Methods and systems for simplifying object mapping for external interfaces. At least two client requests for action may be received from an external interface wherein each client request may be evaluated sequentially or concurrently in a governed and non-blocking technique. Each client request may be associated to a logical object in order to minimize a representational gap between the client request and a physical object using the logical object. Each query request may be responded to using the object relational mapping in order to simplify the external interface by minimizing the representational gap between the external interface and the physical object using the logical object.

  • Pub Date: 2013/13/12
  • Number: 08983984
  • Owner: Catavolt, Inc.
  • Location: Alpharetta, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for monitoring patient conditions

Some embodiments are directed to an apparatus for monitoring patient orientation. A reusable sensor is configured to detect inclination angles of an anterior region of the patient. An elongated disposable attachment device is configured for removable attachment to both the sensor and the patient's anterior region such that the direction of elongation of the attachment device extends along the patient's sternum. The attachment device includes a sensor attachment portion configured for removable attachment to the sensor such that the sensor is prevented from direct contact with the patient, and a patient attachment portion configured for removable attachment to the patient's anterior region.

  • Pub Date: 2013/13/12
  • Number: 09028407
  • Owner: Safer Care LLC
  • Location: Chapel Hill, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for wireless communication with machine-to-machine devices

Approaches for managing machine-to-machine (M2M) wireless devices are disclosed. M2M wireless devices may be configured to utilize service classes in order to implement network access policy control. Packets generated by an application running on the wireless device are inspected, for example using Deep Packet Inspection (DPI). Service class may be assigned based on patent contents such as payload, transport-layer criteria, or communication protocol in use. Service class assignment proceeds according to a rule set which may be remotely configurable. Packets may be buffered and their transmission may be deferred pending service class assignment. Spoofing of the intended recipient and/or the application may be performed while the packets are buffered and/or inspected.

  • Pub Date: 2013/13/12
  • Number: 09445302
  • Owner: Sierra Wireless, Inc.
  • Location: Richmond, CA
  • Details: Visit USPTO

Visit USPTO Page


Information processing apparatus, storage medium, and information processing system

An information processing apparatus which has a first and second mode in which power consumption is lower than that of the first mode is disclosed that includes an accepting unit configured to accept an operation; a display configured to transmit a notification when the apparatus switches from the second mode to the first mode; and a control unit configured to store function data representing function providing units registered; generate, in response to the notification received from the display, a first screen indicating the units and cause the display to display the first screen; store identification data identifying one of the units selected; transmit, in response to the notification received from the display, the notification to the units represented in the function data; and when a response is received from the unit identified in the identification data, cause the display to display a second screen generated by the identified unit.

  • Pub Date: 2013/13/12
  • Number: 09235793
  • Owner: RICOH COMPANY, LTD.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Granting access in view of identifier in network

Discussion of content between users of social networks is described. A request from a first user to discuss content with a recipient user in a first social network is received, wherein the recipient user has a first identifier in the first social network. A request from a second user to discuss content with the recipient user in a second social network is received, wherein the recipient user has a second identifier in the second social network. A discussion is initiated between the second user and the recipient user about the content in the second social network. The recipient user is tracked in view of the first identifier in the first social network and the second identifier in the second social network.

  • Pub Date: 2013/13/12
  • Number: 09565222
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed infrastructure

Novel tools and techniques for implementing distributed infrastructure are provided. In some techniques, a plurality of user devices, each at a customer premises, can provide video calling services over a network. In some embodiments, each of one or more user devices might be established as a distributed infrastructure element for cloud computing, cloud-based application hosting, and/or cloud-based data storage. One or more software applications, customer data, and/or media content (collectively, “hosted content”) might be provided to the one or more user devices for hosting thereon. Resource usage information and/or network connectivity information might be collected for each user device, and suitability of a user device to host the hosted content might be determined based at least in part on the collected resource usage information and/or network connectivity information. One or more courses of action may be determined, and invoked, based on performance metrics of the user devices.

  • Pub Date: 2013/13/12
  • Number: 08914837
  • Owner: Biscotti Inc.
  • Location: McKinney, US
  • Details: Visit USPTO

Visit USPTO Page


Data transmission to an untrusted entity

Techniques for transmitting data to an entity may be provided. In particular, a location of a data file (e.g., image, text, multimedia file, document, blog entry, identifying user information) can be provided to a location of a transitive file storage device for the entity to retrieve, instead of providing the data file directly to the entity. The entity can then provide the data file to users (e.g., via a hosted network page) and/or provide the data file to a service provider along with code to enable the service provider to provide the data file to users.

  • Pub Date: 2013/13/12
  • Number: 09251361
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Acoustic data transmission based on groups of audio receivers

Techniques are disclosed for acoustic data reception. Playback of modified audio content is acoustically detected by a first receiving entity and a second receiving entity operatively connected to the first receiving entity via a network. The modified audio content is generated by encoding specified data into specified audio content such that the modified audio content satisfies a predefined signal constraint characterizing imperceptibility of any differences between playback of the specified audio content and playback of the modified audio content. The specified data is collaboratively decoded based on the acoustically detected playback of the modified audio content and by the first receiving entity and the second receiving entity using the network and according to a predefined diversity scheme.

  • Pub Date: 2013/13/12
  • Number: 09318116
  • Owner: Disney Enterprises, Inc.
  • Location: Burbank, US
  • Details: Visit USPTO

Visit USPTO Page


Universal data storage system that maintains data across one or more specialized data stores

In an embodiment, a method comprises receiving an input defining organization of one or more universal data elements; generating a universal schema that defines organization of the one or more universal data elements based on the input; associating the universal schema with a specialized plug-in, wherein the specialized plug-in maps the one or more universal data elements with data elements in one or more specialized databases maintained by a specialized data store; receiving, from a computer, a request to receive data stored in the specialized data store and comprising parameters based on the universal schema; transforming the request using the specialized plug-in to produce a specialized query; sending the specialized query to the specialized data store to execute the specialized query; receiving a specialized result set from the specialized data store; sending, to the computer, a result set based on specialized result set.

  • Pub Date: 2013/12/12
  • Number: 09430539
  • Owner: Netflix, Inc.
  • Location: Los Gatos, US
  • Details: Visit USPTO

Visit USPTO Page


Transaction message collector

Various embodiments of systems and methods for a transaction message collector are described herein. The message collector receives the message from a message producer. In one aspect, the message is stored in an active message bulk storage or a new active message bulk storage. In another aspect, after the message is stored in the message collector, a confirmation is sent from the message collector to the message producer informing the message producer that the message is stored in the message collector. In yet another aspect, the active message bulk storage is forwarded to a message consumer for consumption based upon meeting at least one of plurality of time or memory based conditions. In a further aspect, after the active message bulk storage is consumed by the message consumer a result of consumption of the active message bulk storage is created and sent to the message producer.

  • Pub Date: 2013/12/12
  • Number: 09306892
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Timestamp systems and methods

According to some exemplary embodiments, a computer-implemented timestamp method includes maintaining, at a cryptographic service provider (CSP), one or more timestamp policies specifying when digital timestamps should be issued. A timestamp request is received at the CSP from a timestamp authority that manages timestamping and is accompanied by a corresponding timestamp data structure. With a computer processor, a difference is determined between a first time specified in the timestamp data structure and a second time indicated by an internal clock of the CSP. The timestamp request is rejected if the first timestamp data structure fails to comply with a predetermined timestamp policy, where the predetermined timestamp policy requires that the difference between the first time and the second time be below a predetermined threshold.

  • Pub Date: 2013/12/12
  • Number: 09225746
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to present automated suggestions in a document

A method for providing automated suggestions in a document stored on a cloud computing service includes providing collaborators with access to the document, who may each insert suggested edits into the document. The cloud computing service provides a plurality of suggestion robots for the collaborators to activate within the document, where each suggestion robot has an associated editing objective. The cloud computing service receives a request from a first collaborator to activate a first suggestion robot and activates the robot to present to the first collaborator a plurality of suggested edits of the document according to the editing objective of the robot, where the plurality of suggested edits by the first suggestion robot are displayed with any suggested edits by the one or more collaborators, and the first collaborator may accept or reject each of the plurality of suggested edits of the robot and the collaborators.

  • Pub Date: 2013/12/12
  • Number: 09372858
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Security system for data stored in the cloud

A cloud access security system provides security to data stored in the cloud. The cloud access security system maintains version service information that indicates servers that service web services calls to particular versions of a cloud application service. Upon detection of a web service call to an unknown version of the cloud application service, the cloud access security system redirects the web service call to a known good server that services web service calls that are made to a previous version of the cloud application service. The cloud access security system may employ an encryption scheme that allows for partial decryption.

  • Pub Date: 2013/12/12
  • Number: 09225720
  • Owner: Trend Micro Incorporated
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Randomization of processor subunit timing to enhance security

Technologies are generally provided for a system to enhance security and prevent side channel attacks of targeted functions. Side channel attacks assume that the targeted functions operate at same speed each time, and observe timing data of the targeted functions to glean secure information. According to some examples, an enhanced security system may alter a processing speed of one or more subunits of a processor executing the targeted function(s) to transparently change an instantaneous performance of the processor in an unpredictable manner. The performance time of the targeted function(s) may thereby be randomized. A virtual machine manager (VMM) may identify a security risk for a targeted function, and trigger one or more subunits of the processor to operate at a reduced frequency. After completion of the targeted function, the subunits may be returned to a default performance speed.

  • Pub Date: 2013/12/12
  • Number: 09419993
  • Owner: EMPIRE TECHNOLOGY DEVELOPMENT LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Image-processing system, image-processing method and program which changes the position of the viewing point in a first range and changes a size of a viewing angle in a second range

An image-processing system includes a receiver which receives an input value defining an output range, a generator which generates a three-dimensional model having a target image attached to a three-dimensional conformation, a decision part which decides a position of a viewing point and a viewing angle in accordance with the input value, and a projector which projects the three-dimensional model from the viewing point, wherein the decision part changes a range of a target image inside a viewing field by changing the viewing angle preferentially when the input value is in a first range, and changes the range of the target image inside the viewing field by changing the viewing point preferentially when the input value is in a second range which is a wider-angle side than that of the first range.

  • Pub Date: 2013/12/12
  • Number: 09392167
  • Owner: RICOH COMPANY, LTD.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Hybrid dynamic code compiling device, method, and service system thereof

An exemplary embodiment of the present disclosure illustrates a hybrid dynamic code compiling device having a parser, a native code generator, and a dynamic code rewriter, wherein the parser is coupled to the native code generator and the dynamic code rewriter. The parser receives and parses a first dynamic code to divide the first dynamic code into compilable blocks and non-compilable blocks. The native code generator generates a native code according to the compilable blocks. The dynamic code rewriter rewrites the non-compilable blocks to generate a second dynamic code, wherein the second dynamic code has function calls which communicate between the native code and the first dynamic code.

  • Pub Date: 2013/12/12
  • Number: 09182953
  • Owner: INSTITUTE FOR INFORMATION INDUSTRY
  • Location: Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


Data integration apparatus for use in sensor network

A data integration apparatus for use in a sensor network system is provided. The sensor network system includes a sensor network and an application server. The data integration apparatus receives text commands associated with access of the sensor network from the application server, and accomplishes the operations of the tabled data provided by the network node of the sensor network by using the text commands and the hardware configurations of the sensor network cooperatively.

  • Pub Date: 2013/12/12
  • Number: 09232009
  • Owner: Institute For Information Industry
  • Location: Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


Customer initiated tenant operations in a multitenant cloud environment

Customer initiated tenant operations are presented that are provided within a work center of a client cloud application. System supported tenant operations combined with automatic validations and determinations are exposed directly to the customer via the work center. Customers are able to coordinate and initiate tenant operations using a specific work center called a service control center, which is added to other work centers that build the cloud enterprise applications or products the customers are using. The enterprise application embedded service control center is connected to a central service control center, which is located in a service provider cockpit system. The central service control center enables the execution of customer specific tenant operations that are tailored to the customer's landscape and guarantees the tenant isolation.

  • Pub Date: 2013/12/12
  • Number: 09621673
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Class replacer during application installation

This disclosure describes systems, methods, and computer-readable media related to online advertisement campaign recommendations. An archive file may be received from a server. The archive file may include one or more compiled code files and a manifest file. The archive file may be unpackaged. The one or more compiled code files may be optimized based at least in part on the manifest file. The optimizing the one or more compiled code files may include identifying a first sequence of bytes and a second sequence of bytes from one or more sources; formatting the second sequence of bytes based at least in part on one or more rules; searching the one or more compiled code files to identify one or more sequence of bytes matching the first sequence of bytes; and replacing the identified one or more sequence of bytes with the formatted second sequence of bytes. The optimized compiled code files may be stored.

  • Pub Date: 2013/12/12
  • Number: 09280339
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Authentication for an API request

Technology for managing an API request is described. In an example implementation, an authentication service may receive a request to access a service. The authentication service may be configured to determine a proximity of a client device from which the request originated to the service. The authentication service may be further configured to grant the request based in part on the determined proximity of the client device to the service with respect to a policy.

  • Pub Date: 2013/12/12
  • Number: 09602482
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Application dedicated transceiver communications

Examples disclosed herein provide systems, methods, and software for application dedicated transceivers. In one example, a method for operating a wireless device includes, in a device application, initiating a request for a dedicated-transceiver. In response to the request, the method further includes, in the device operating system, requesting dedicated-transceiver information from a transceiver system on the device and, once the information is received from the transceiver system, transferring a dedicated-transceiver response to the application. The method also provides, in the device application, initiating a communication handshake with the transceiver system and, upon completion of the handshake, communicating application data to the transceiver system without the use of the operating system.

  • Pub Date: 2013/12/12
  • Number: 09496949
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Alternative view-based navigation

Techniques for event processing include receiving notification at a navigation service of a first event regarding an interaction with a user interface element of a user interface of an application. The notification includes parameter(s) a navigation point in the application. Responsive to receiving the notification, first processing is performed by the navigation service, including identifying first target code invoked for updating the user interface to include a content view associated with the navigation point, identifying alternative views associated with the navigation point and a first alternative view as a default view, and transferring control to the first target code to update the user interface whereby additional information indicating the first alternative view and the alternative views is provided to the first target code to displays data for the navigation point in accordance with the first alternative view.

  • Pub Date: 2013/12/12
  • Number: 09645707
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual machine image analysis

Techniques for analyzing virtual machine images are described. In one embodiment, a subset of settings is extracted from one or more virtual machine images, the virtual machine images store therein values of the settings. The settings are used by software executing in virtual machines of the virtual machine images, respectively. A target one of the virtual machine images is selected and target values of the settings are obtained from the target virtual machine image. Sample values of the settings are obtained from a plurality of virtual machine images. The subset formed by identifying similarities and differences of the values between the virtual machine images.

  • Pub Date: 2013/11/12
  • Number: 09207962
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for selecting musical content for playback

Techniques are described for automatically selecting musical content for playback based on an initial “seed” of music selected by a user in a way that seamlessly extends the user's listening experience. The initially selected seed music might be, for example, an album or a playlist. Music that follows the seed music is algorithmically selected to match the music selected by the user.

  • Pub Date: 2013/11/12
  • Number: 09299331
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for power awareness in mobile applications

A data processing device may comprise one or more applications. Based on communication from a particular application, the data processing device may be operable to provide, to the particular application, power consumption information of the data processing device associated with each of a plurality of application states of the particular application and/or information related to one or more power-consuming components in the data processing device. The particular application may register with the data processing device to receive a notification when a power consuming component is available for use. The particular application may also perform operations based on the provided power consumption information and/or the provided information related to the one or more power-consuming components. The plurality of application states may comprise an application idle state and one or more application active states.

  • Pub Date: 2013/11/12
  • Number: 09207981
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for combining triaxial geophone data for localizing nearby transient seismic sources

In one embodiment, a method of processing seismic data using a single triaxial geophone is disclosed, where the method comprises acts of calibrating the single triaxial geophone sensor to determine a position and an orientation relative to a surrounding environment, configuring the single triaxial geophone sensor to receive seismic data from the surrounding environment along three orthogonal axes, measuring, with the single triaxial geophone sensor, a plurality of time series of seismic data from the surrounding environment for the three orthogonal axes, storing, with a computer system coupled to the single triaxial geophone sensor, the time series of seismic data from the surrounding environment for the three orthogonal axes, and processing, with the computer system, the time series of seismic data to identify a plurality of seismic waves of different polarizations.

  • Pub Date: 2013/11/12
  • Number: 09354339
  • Owner: Raytheon BBN Technologies Corp.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Synergistic weed control from applications of aminopyralid and clopyralid

Disclosed herein are herbicidal compositions comprising a synergistically herbicidal effective amount of (a) aminopyralid, or an agriculturally acceptable salt or ester thereof, and (b) clopyralid, or an agriculturally acceptable salt or ester thereof. Also disclosed herein are methods of controlling undesirable vegetation, which comprise applying to vegetation or an area adjacent the vegetation or applying to soil or water to prevent the emergence or growth of vegetation (a) aminopyralid, or an agriculturally acceptable salt or ester thereof, and (b) clopyralid, or an agriculturally acceptable salt or ester thereof, wherein (a) and (b) are each added in an amount sufficient to produce a synergistic herbicidal effect.

  • Pub Date: 2013/11/12
  • Number: 09629364
  • Owner: Dow AgroSciences LLC
  • Location: Indianapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Sound proof helmet

Novel methods and systems for acoustic proofing are disclosed. A sound proof helmet can be designed by optimizing several layers of different materials, thickness, and physical properties. The thickness of the layers can be smaller than the wavelength of the sound waves which are meant to be reduced.

  • Pub Date: 2013/11/12
  • Number: 09348949
  • Owner: CALIFORNIA INSTITUTE OF TECHNOLOGY
  • Location: Pasadena, US
  • Details: Visit USPTO

Visit USPTO Page


Shaping the spectrum of random-phase radar waveforms

The various technologies presented herein relate to generation of a desired waveform profile in the form of a spectrum of apparently random noise (e.g., white noise or colored noise), but with precise spectral characteristics. Hence, a waveform profile that could be readily determined (e.g., by a spoofing system) is effectively obscured. Obscuration is achieved by dividing the waveform into a series of chips, each with an assigned frequency, wherein the sequence of chips are subsequently randomized. Randomization can be a function of the application of a key to the chip sequence. During processing of the echo pulse, a copy of the randomized transmitted pulse is recovered or regenerated against which the received echo is correlated. Hence, with the echo energy range-compressed in this manner, it is possible to generate a radar image with precise impulse response.

  • Pub Date: 2013/11/12
  • Number: 09645228
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Regenerative frequency multiplier

A technology is provided for generating an output frequency. An input signal with a defined frequency may be received. The input signal may be split so that a first signal with the defined frequency of the input signal is received at a frequency multiplier and a second signal with the defined frequency of the input signal is received at a frequency mixer. The first signal may be multiplied by N, wherein N is a predefined integer. The first signal may be limited to a predetermined frequency and passed to the frequency mixer. The first signal and the second signal may be mixed to produce at least two mixed signals. A first output signal and a second output signal may be generated based on the at least two mixed signals.

  • Pub Date: 2013/11/12
  • Number: 09385655
  • Owner: Raytheon Company
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


Rapid application development using a content management system

An online content management system enables rapid application development by an application developer using an application development system to create a content application configured to execute on a client device. A designated folder on the application development system is designated for sharing with the client device. Configuration data containing parameters for controlling the operation of the content application is stored in the designated folder. The content application on the client device reads the configuration data from the designated location and applies the parameters on execution and thereafter. When the configuration data is modified on the application development system, the modified data is synchronized by the content management system to the client device. The content application on the client device reads the modified configuration data and applies the modified parameters during execution.

  • Pub Date: 2013/11/12
  • Number: 09374275
  • Owner: Dropbox, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Location based mobile user selected time, location, and number limited automatic location based reserve and redeem discounts on products or services with automatic security and feedback features

Methods, systems, software, computer readable non-transitory media, applications, devices, and the like for providing location based, mobile, user selected, time, location, and number limited or unlimited electronic coupon card selection of automatic location based reserve and redeem discounts on products or services with a profile picture, tag, motion enabled watermark, or other visual, 2D or mechanism for security purposes.

  • Pub Date: 2013/11/12
  • Number: 09324091
  • Details: Visit USPTO

Visit USPTO Page


Loading a re-directed web resource on a web browser of a client device in a communications system

In an embodiment, a client device transmits a request for an initial web resource to a proxy server. The proxy server requests the initial web resource on behalf of the client device in response to the client device's request. The proxy server then executes a web resource redirection procedure (which involves one or more redirects) that is independent of interaction with the client device and results in the proxy server obtaining web resource content. The proxy server delivers the web resource content to a proxy client application on the client device along with instructions for simulating, on the client device, the web resource redirection procedure between the proxy client application and a mobile web browser on the client device. The proxy client application on the client device then simulates the web resource redirection procedure that occurred at the proxy server as instructed.

  • Pub Date: 2013/11/12
  • Number: 09344512
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Loading a re-directed web page on a web browser of a client device in a communications system

In an embodiment, a client device transmits a request for an initial web page to a proxy server. The proxy server requests the initial web page on behalf of the client device in response to the client device's request. The proxy server then executes a web page redirection procedure that is independent of interaction with the client device and results in the proxy server obtaining web page content. The proxy server delivers the web page content to a proxy client application on the client device along with instructions for simulating, on the client device, the web page redirection procedure between the proxy client application and a mobile web browser on the client device. The proxy client application on the client device then simulates the web page redirection procedure that occurred at the proxy server as instructed.

  • Pub Date: 2013/11/12
  • Number: 09374436
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Integration of devices through a social networking platform

A system and method for providing a social networking service to a plurality of devices. A social networking server for facilitating social information exchange among the plurality of devices through a socially aware network. A social profiles manager is coupled to the social networking server that creates and manages individual centric profiles of the plurality of devices. The individual centric profiles of the plurality of devices are social representation of individual devices within the socially aware network. The plurality of devices are identifiable by other participants and the social networking server through their social profiles.

  • Pub Date: 2013/11/12
  • Number: 09525753
  • Owner: Netspective Communications LLC
  • Location: Silver Spring, US
  • Details: Visit USPTO

Visit USPTO Page


Identity and access management-based access control in virtual networks

Methods and apparatus for providing identity and access management-based access control for connections between entities in virtual (overlay) network environments. At the encapsulation layer of the overlay network, an out-of-band connection creation process may be leveraged to enforce access control and thus allow or deny overlay network connections between sources and targets according to policies. For example, resources may be given identities, identified resources may assume roles, and policies may be defined for the roles that include permissions regarding establishing connections to other resources. When a given resource (the source) attempts to establish a connection to another resource (the target), role(s) may be determined, policies for the role(s) may be identified, and permission(s) checked to determine if a connection from the source to the target over the overlay network is to be allowed or denied.

  • Pub Date: 2013/11/12
  • Number: 09438506
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid asynchronous transmission process

The present invention is a hybrid asynchronous transmission process capable of reducing multiple asynchronous requests and responses to a single asynchronous request or response while reducing the amount of data being transferred. The hybrid transmission process utilizes data store, referred to as a transition state store (TSS), to locally store name/value pairs as strings in the web browser. The TSS stores both the current and future states of the webpage, based on user interaction. The utilization of the API's and data store in the transmission process allow updates to the desktop state without transmitting mass amounts of data between the server and web browser.

  • Pub Date: 2013/11/12
  • Number: 08713100
  • Details: Visit USPTO

Visit USPTO Page


Differential client-side encryption of information originating from a client

A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms. Each respective encryption algorithm may be configured to encrypt data using at least one public key. Each respective decryption algorithm may be configured to decrypt data using at least one private key. The method may include receiving encrypted data, where the encrypted data is encrypted using a first public key and a first encryption algorithm, and the encrypted data is provided over a network.

  • Pub Date: 2013/11/12
  • Number: 09009462
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Data visualization techniques

Systems and methods in accordance with various embodiments of the present invention provide for representing a plurality of data values of a hierarchical dataset as graphical elements in a configurable data visualization. A first data visualization may be displayed in a data visualization display page, along with a user interface. A selection of a rendered root node and rendered leaf nodes to be displayed in a second data visualization is received from the user interface. Based on the selection of the rendered root node and rendered leaf nodes, a number of depth levels to display is determined. Also, which of the depth levels to display are identified based on the selection of the rendered root node and rendered leaf nodes. The second data visualization is rendered based on the determined number of depth levels and the identified depth levels.

  • Pub Date: 2013/11/12
  • Number: 09454291
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Cyclin dependent kinase inhibitors and methods of use

The presently disclosed subject matter relates to methods and compositions for protecting healthy cells from damage due to DNA damaging agents. In particular, the presently disclosed subject matter relates to the protective action of selective cyclin dependent kinase 4/6 (CDK4/6) inhibitors administered to subjects that have been exposed to or that are at risk of exposure to DNA damage.

  • Pub Date: 2013/11/12
  • Number: 09616062
  • Owner: The University of North Carolina at Chapel Hill
  • Location: Chapel Hill, US
  • Details: Visit USPTO

Visit USPTO Page


Code analysis for simulation efficiency improvement

A computer program product and computer system for analyzing code to improve efficiency of simulating a hardware system. A computer identifies one or more functions calling an application programming interface of a hardware simulator simulating the hardware system. In response to determining that left hand sides of respective one or more Boolean expressions are associated with the one or more functions calling the application programming interface and right hand sides are not associated with the one or more functions calling the application programming interface, the computer identifies the respective one or more Boolean expressions as one or more improvement points in source code for verifying a hardware model of the hardware system.

  • Pub Date: 2013/11/12
  • Number: 09069574
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Backup of in-memory databases

Various embodiments of systems and methods for performing backup operation in In-memory database systems are described herein. The method includes receiving a request to create a backup of a data set from a main memory of the system. In response to the request, the data set is configured as read-only and a data structure having meta-data information identifying the blocks of data in the main memory that form the data set is invoked. A snapshot of the data structure is created and the data set is enabled for manipulation. Further, the method involves receiving a request to modify a block of data and copying the requested data block to a free memory block in the main memory. The data structure is updated by replacing the meta-data identifying the requested original data block with meta-data identifying the free memory block which holds a copy of the requested data block.

  • Pub Date: 2013/11/12
  • Number: 09251011
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Advertisement delivery management apparatus and advertisement delivery management method

An advertisement delivery management apparatus according to an embodiment of the present disclosure includes a prediction information storage unit, an acquisition unit and an allocation unit. The prediction information storage unit stores information including user attributes of a plurality of delivery target users predicted as future advertisement delivery destinations. The acquisition unit acquires a plurality of order requests designating user attributes and the numbers of deliveries. The allocation unit allocates the delivery target users to the plurality of order requests, on the basis of the user attributes and the numbers of deliveries designated by the plurality of order requests, such that the number of predetermined user attributes of the delivery target users who have not been allocated to the order requests is the maximum.

  • Pub Date: 2013/11/12
  • Number: 09524512
  • Owner: YAHOO JAPAN CORPORATION
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Virtual file system integrating multiple cloud storage services and operating method of the same

Disclosed is a virtual file system integrating and managing multiple cloud storages. A virtual file system may comprise an API database storing information on open API of the cloud storages, a storage state database storing state information of the cloud storages, a metadata database storing metadata of the cloud storages, a cloud storage allocation part receiving an user request and selecting a cloud storage appropriate for the user request among the cloud storages by referring to the storage state database and the metadata database, and an API mapping part reading out open API information of the cloud storage selected by the cloud storage allocation part from the API database, converting the user request to an open API of the selected cloud storage, and transferring the converted open API to the selected cloud storage.

  • Pub Date: 2013/10/12
  • Number: 09384209
  • Owner: POSTECH ACADEMY—INDUSTRY FOUNDATION
  • Location: Gyeongbuk, KR
  • Details: Visit USPTO

Visit USPTO Page


System and methods for optimizing energy efficiency in programmable devices

A system for optimizing energy efficiency of an embedded system. A hardware abstraction layer (HAL) is coupled to hardware of an embedded system. An energy hardware abstraction layer (eHAL) couples to the hardware and to the HAL. A hypervisor couples to the HAL and to the eHAL. One or more applications couple to the hypervisor, the HAL and the eHAL. The eHAL measures energy use of the embedded system, constructs a model of energy use of the embedded system and, using the model, determines how to one of reduce and minimize energy use of the embedded system. The hypervisor is configured to alter one or more hardware parameters to one of reduce and minimize energy use of the embedded system as the embedded system performs one or more tasks. In implementations a real time operating system (RTOS) is coupled to the one or more applications and to the hypervisor.

  • Pub Date: 2013/10/12
  • Number: 09459685
  • Owner: Arizona Board of Regents on behalf of Northern Arizona University
  • Location: Flagstaff, US
  • Details: Visit USPTO

Visit USPTO Page


Risk mitigation in data center networks

A method employing resource orchestration algorithms may find a fewest number of working data centers (DCs) to guarantee K-connect survivability using an overlay network representing a physical optical network. The overlay network may not include certain topological features of the physical optical network. A risk-based algorithm may result in fewer working DCs for K-connect survivability. A delay-based algorithm may be more suitable for delay-sensitive cloud applications.

  • Pub Date: 2013/10/12
  • Number: 09565101
  • Owner: Fujitsu Limited
  • Location: Kawasaki, JP
  • Details: Visit USPTO

Visit USPTO Page


Migrating processes between source host and destination host using a shared virtual file system

A process can be scheduled between first and second hosts that using a virtual file system that is shared between the hosts can be used. The process, running on a first hypervisor of the first host, can be scheduled to run on a second hypervisor of the second host. A file can be created that includes the data content of the process address space for the file. The file can be mapped address space of the virtual file system. Data from the physical memory of the first host can be transferred to physical memory of the second host using page fault routines.

  • Pub Date: 2013/10/12
  • Number: 09529616
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for transmitting and receiving packets

A method carried out at a network node for managing aggregated Virtual Private Network (VPN) connection. The network node establishes an aggregated VPN connection with a network element and determines a first uplink bandwidth limit and/or a first downlink bandwidth limit. The uplink bandwidth at the network node is limited to the first uplink bandwidth limit if the first uplink bandwidth limit is determined. The downlink bandwidth at the network node is limited to the first downlink bandwidth limit if the first downlink bandwidth limit is determined. The network node encapsulates first data packets in first encapsulating packets and then transmits the first encapsulating packets to the network element through the aggregated VPN connection within the first uplink bandwidth limit. The network node receives second encapsulating packets from the network element within the first downlink bandwidth limit, and then decapsulates second data packets from the second encapsulating packets.

  • Pub Date: 2013/10/12
  • Number: 09531565
  • Owner: PISMO LABS TECHNOLOGY LIMITED
  • Location: Hong Kong, HK
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing a preloader animation for image viewers

Methods and systems for providing a preloader animation for image viewers is provided. An example method includes receiving an image of an object, determining an edge gradient value for pixels of the image, and selecting pixels representative of the object that have a respective edge gradient value above a threshold. The example method also includes determining a model of the object including an approximate outline of the object and structures internal to the outline that are oriented based on the selected pixels being coupling points between the structures, and providing instructions to display the model in an incremental manner so as to render given structures of the model over time.

  • Pub Date: 2013/10/12
  • Number: 09519999
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Link-layer level link aggregation autoconfiguration

A computing device identifies a plurality of network interface controllers (NICs) that are available for link aggregation. The computing device probes a network using a plurality of protocols to detect a topology of at least one network to which the plurality of NICs are connected. The computing device automatically establishes a link aggregation configuration including one or more of the plurality of NICs based on the determined network topology.

  • Pub Date: 2013/10/12
  • Number: 09369375
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Fine art samples

Methods and systems for selecting and shipping an art sample that will degrade after a pre-defined period of time are provided. A user can request an art sample while browsing for items associated with an electronic marketplace. The art sample, which can be a lower quality replica of an original art piece, may be printed utilizing a printing technique which results in the art sample degrading after a pre-defined period of time. The art sample may then be shipped to the user to aid in determining whether to purchase the original art piece by utilizing the art sample to visualize the potential purchase in the user's own viewing space.

  • Pub Date: 2013/10/12
  • Number: 09349139
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic network configuration based on passive location analytics

Passive location estimation of mobile devices within a wireless network is provided. The passive location estimation is determined based on one or more measurements that are received from the mobile device and/or from one or more network elements. At least a portion of the passive information can be received in user plane data associated with an application executing on the mobile device. A measurement set for the mobile device can be defined and can be used to build fingerprints of geographical cellular measurements.

  • Pub Date: 2013/10/12
  • Number: 09591603
  • Owner: AT&T INTELLECTUAL PROPERTY I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Drag and drop portlet deployment

Deploying portlet(s) onto a displayed portal page by dragging and dropping portlet related artifacts from the IDE like portlet deployment descriptor node or a specific portlet node, and, responsively displaying the portlet(s), corresponding to the dropped node, in the displayed portal page. The updating of the portal page is accomplished by an internal IDE browser of a stand-alone type IDE working co-operatively with a remote portal server.

  • Pub Date: 2013/10/12
  • Number: 09575733
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Crosstalk analysis methods using superposition

System, methods and apparatus are described that facilitate communications circuit design. A first response of a channel to a first signal transmitted through the channel and a second response of the channel to a second signal transmitted through a neighboring channel are determined and a first signal analysis based on the first response and the second response is calculated. A modified second response is determined after modifying the magnitude or timing of the second response to simulate a change in a characteristic of the second signal. A second signal analysis performed using the first response and the modified second response may identify differences in the effects of the second signal and the modified second signal on the first signal. A physical relationship between a pair of connectors of a circuit may be modified based on the magnitude of a scaling factor or phase difference used to obtain the second response.

  • Pub Date: 2013/10/12
  • Number: 09337893
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling computer nodes through social media

Some embodiments are directed to a computer node that communicates a report message containing information to a social media server to cause publishing of the information to other computer nodes tracking publishing on the social media server by the computer node. The computer node receives a response message from one of the other computer nodes through the social media server, and operates based on the response message. Related embodiments are directed to another computer node that communicates with a social media server to track information published by report messages from other computer nodes, generates a response message based on the information published by one of the other computer nodes, and communicates the response message to the social media server to cause publishing of content of the response message to the other computer nodes.

  • Pub Date: 2013/10/12
  • Number: 09264323
  • Owner: CA, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud centric application trust validation

In accordance with the exemplary embodiments of the invention there is at least a method and an apparatus to perform the method of sending towards a key management device associated with an application service provider for an application, a key request for the application being booted in the cloud network; and in response to the key request, receiving an application specific key for the application, where the key is based on multiple factors associated with the application server. Further, there is at least a method and an apparatus to perform the method of receiving a key request from an application server of a cloud network for the application being booted in the cloud network; in response to the key request, authenticating the request using multiple attributes associated with the application server; and sending an application specific key for the application towards the application server.

  • Pub Date: 2013/10/12
  • Number: 09253185
  • Owner: Nokia Technologies Oy
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods of providing and receiving venue level transmissions and services

A venue-cast system and method for providing and receiving venue level transmissions and services, including discovery of a venue specific transmission by receiving an overhead signal from a non-venue network, extracting information for receiving the venue specific transmission from the overhead signal, and tuning to receive the venue specific transmission based on the extracted information. The venue level transmission may be provided and received in a manner that does not prevent an access terminal from receiving a local area or wide area transmission.

  • Pub Date: 2013/10/12
  • Number: 09497495
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for digital video stabilization via constraint-based rotation smoothing

Systems and methods for digital video stabilization via constraint-based rotation smoothing are provided. Digital video data including a set of image frames having associated time stamps and a set of camera orientation data having associated time stamps may be provided. A smoothed set of camera orientation data may be generated by minimizing a rate of rotation between successive image frames while minimizing an amount of empty regions in a resulting set of smoothed image frames reoriented based on the smoothed set of camera orientation data.

  • Pub Date: 2013/09/12
  • Number: 09071756
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Proxy for tolerating faults in high-security systems

One or more requests are received from a first system. The requests are queued in a queue. A serialization group is determined for a request and the request is associated with the determined serialization group. At least a subset of the requests from the queue is transmitted to a second system if the second system is available, including transmitting requests in a respective serialization group to the second system serially in accordance with an ordering of the requests within the respective serialization group.

  • Pub Date: 2013/09/12
  • Number: 08959180
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Pro-neurogenic compounds

This invention relates generally to stimulating neurogenesis (e.g., post-natal neurogenesis, e.g., post-natal hippocampal neurogenesis) and protection from neuron cell death.

  • Pub Date: 2013/09/12
  • Number: 09278923
  • Owner: Board of Regents of The University of Texas System
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Neighbor determination in video decoding

Video decoding innovations for multithreading implementations and graphics processor unit (“GPU”) implementations are described. For example, for multithreaded decoding, a decoder uses innovations in the areas of layered data structures, picture extent discovery, a picture command queue, and/or task scheduling for multithreading. Or, for a GPU implementation, a decoder uses innovations in the areas of inverse transforms, inverse quantization, fractional interpolation, intra prediction using waves, loop filtering using waves, memory usage and/or performance-adaptive loop filtering. Innovations are also described in the areas of error handling and recovery, determination of neighbor availability for operations such as context modeling and intra prediction, CABAC decoding, computation of collocated information for direct mode macroblocks in B slices, reduction of memory consumption, implementation of trick play modes, and picture dropping for quality adjustment.

  • Pub Date: 2013/09/12
  • Number: 09554134
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for reducing oxidative damage

The invention provides a method for reducing oxidative damage in a mammal, a removed organ, or a cell in need thereof. The method comprises administering an effective amount of an aromatic cationic peptide. The aromatic cationic peptide has (a) at least one net positive charge; (b) a minimum of three amino acids; (c) a maximum of about twenty amino acids, (d) a relationship between the minimum number of net positive charges (p) and the total number of amino acid residues (r) wherein 3 pis the largest number that is less than or equal to r+1; (e) a relationship between the minimum number of aromatic groups (a) and the total number of net positive charges (p) wherein 3a or 2a is the largest number that is less than or equal to p+1, except that when a is 1, pmay also be 1; and (f) at least one tyrosine or tryptophan amino acid.

  • Pub Date: 2013/09/12
  • Number: 09623069
  • Owner: CORNELL RESEARCH FOUNDATION, INC.
  • Location: Ithaca, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for identifying an increased risk of anthracycline-related cardiotoxicity

Methods of identifying a subject having an increased risk of developing anthracycline-related cardiotoxicity are provided. Such methods may include isolating a DNA sample from a biological specimen from the subject; genotyping the DNA sample to determine a copy number of a variant allele that increases the risk of developing chemotherapy-induced cardiotoxicity; and identifying the subject as having an increased risk of developing anthracycline-related cardiotoxicity when the copy number is at least one. In some embodiments, the methods may include optimally administering a therapeutically effective dose of a chemotherapy agent or an alternative non-cardiotoxic chemotherapeutic agent to the subject.

  • Pub Date: 2013/09/12
  • Number: 09650678
  • Owner: CITY OF HOPE
  • Location: Duarte, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing stimulation inputs to a visual prosthesis implant

Stimulation inputs are provided to a visual prosthesis implant. The images captured by a video decoder are received and digitized to provide a plurality of video frames; integrity of the video frames is checked, the checked video frames are filtered, and the filtered video frames are converted to stimulation inputs. A similar system is also disclosed.

  • Pub Date: 2013/09/12
  • Number: 09180296
  • Owner: Second Sight Medical Products, Inc.
  • Location: Sylmar, US
  • Details: Visit USPTO

Visit USPTO Page


Method and computer system for detecting crowds in a location tracking system

A method and computer system for detecting crowds in a location tracking system utilizes a grid and the pigeonhole principle to minimize an amount of hardware, memory and/or processing capability required in the location tracking system. In particular, an amount of storage required to determine whether a location update has resulted in a crowd grows only linearly, rather than quadratically, with the number of objects being tracked because a number of active grid points will be, at most, four times the number of objects being tracked. By determining whether an individual active grid point is within a crowd area, the computational time required for detecting a crowd within this crowd area is independent from the total number of objects being tracked.

  • Pub Date: 2013/09/12
  • Number: 09210542
  • Owner: NEC EUROPE LTD.
  • Location: Heidelberg, DE
  • Details: Visit USPTO

Visit USPTO Page


Managing interactive communications campaigns using a hold queue

A web-based hosted solution through which business entities create and manage communications campaigns is described. To reduce latency of customer-to-agent connections, the system implements an agent stay-on-line function by which a persistent telephony connection is established and maintained between the system infrastructure and an available agent. In this manner, the agent may handle multiple customers while avoiding an ACD hold queue. In addition, preferably a service-side hold queue also is established and maintained on the service-side of the infrastructure. This hold queue maintains calls that are waiting to be connected to available agents. It ensures that any customer abandons do not impair the connections being established and maintained to the agents.

  • Pub Date: 2013/09/12
  • Number: 09544433
  • Owner: Genesys Telecommunications Laboratories, Inc.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


Image capture and identification system and process

A digital image of the object is captured and the object is recognized from plurality of objects in a database. An information address corresponding to the object is then used to access information and initiate communication pertinent to the object.

  • Pub Date: 2013/09/12
  • Number: 09324004
  • Owner: Nant Holdings IP, LLC
  • Location: Culver City, US
  • Details: Visit USPTO

Visit USPTO Page


Hole measurement apparatuses

The present invention is directed to automated apparatuses and methods for measuring fastener hole depth, fastener length, countersink depth and/or hole diameters in a workpiece (or other object) in an automated and extremely rapid, efficient and accurate manner. The apparatuses may be operably connected with a power source and with one or a plurality of computers or other data collection devices to transmit fastener hole depth, countersink depth and/or hole diameter measurement data and/or information to them each time that a fastener hole is measured, while the apparatus is continuously measuring fastener holes (i.e., with no interruptions).

  • Pub Date: 2013/09/12
  • Number: 09157735
  • Owner: DELTA SIGMA COMPANY
  • Location: Kennesaw, US
  • Details: Visit USPTO

Visit USPTO Page


Eye gaze enabled navigation system

A navigation system is configured to generate a sequence of driving instructions for directing a driver of a vehicle from a current location to a final destination. The navigation system is configured to capture sensor data that reflects the field of view of the driver and to identify objects in that field of view. The navigation system then customizes the driving instructions to reference specific objects, thereby generating context-specific driving instructions. The navigation system is also configured to identify particular objects upon which the driver is focused, and to generate context-specific driving instructions relative to such objects of focus. The navigation system may also provide correction information to the driver upon determining that the driver has incorrectly focused on a different object than an object referenced in a context-specific driving instruction.

  • Pub Date: 2013/09/12
  • Number: 09354073
  • Owner: HARMAN INTERNATIONAL INDUSTRIES, INC.
  • Location: Stamford, US
  • Details: Visit USPTO

Visit USPTO Page


Digital signage device capable of entering diagnostic display mode

Certain aspects of the disclosure direct to a digital signage device capable of entering a diagnostic display mode. In certain embodiments, a signage device includes a display device and a signage controller in communication with the display device. The display device is configured to display media content in a display mode and display diagnostic information in a diagnostic mode. The signage controller includes a processor and a non-volatile memory storing computer executable codes. When executed at the processor, the codes are configured to display the media content on the display device in the display mode, switch from the display mode to the diagnostic mode in response to a diagnostic input command, and display the diagnostic information on the display device in the diagnostic mode. In certain embodiments, the diagnostic information includes system information and content operational and deployment information.

  • Pub Date: 2013/09/12
  • Number: 08866911
  • Owner: American Megatrends, Inc.
  • Location: Norcross, US
  • Details: Visit USPTO

Visit USPTO Page


Delivery of ethylene blocking and/or promoting agents

A composition including an ethylene blocking agent complex formed from the product of an ethylene blocking agent and a host, and at least one water-soluble polymer, wherein the ethylene blocking agent complex and the at least one water-soluble polymer are intermingled is disclosed.

  • Pub Date: 2013/09/12
  • Number: 09084417
  • Owner: Dow AgroSciences LLC
  • Location: Indianapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Customizable sign-on service

Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and other functionality to other services for use with those services' users. The access manager system may maintain various sign-on and other account information for various users, and provide single sign-on functionality for those users using that maintained information on behalf of multiple unrelated services with which those users interact. The access manager may allow a variety of types of customizations to single sign-on functionality and/or other functionality available from the access manager, such as on a per-service basis via configuration by an operator of the service, such as co-branding customizations, customizations of information to be gathered from users, customizations of authority that may be delegated to other services to act on behalf of users, etc., and with the customizations that are available being determined specifically for that service.

  • Pub Date: 2013/09/12
  • Number: 09332001
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Business event processing

Techniques for business event processing are presented. Methods and apparatuses disclosed herein may operate to receiving a request to perform an operation on a listing previously published by an online marketplace; to identify at least one additional listing having certain characteristics in common with the listing from a plurality of previously published listings including the listing; and to automatically perform the operation on the at least one additional listing. The operation may include performing an inventory check on the at least one additional listing.

  • Pub Date: 2013/09/12
  • Number: 08769538
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Application-layer traffic optimization service map updates

Using the ALTO Service, networking applications can request through the ALTO protocol information about the underlying network topology from the ISP or Content Provider. The ALTO Service provides information such as preferences of network resources with the goal of modifying network resource consumption patterns while maintaining or improving application performance. This document describes, in one example, an ALTO server that implements enhancements to the ALTO service to enable initiating incremental updates of network and cost maps to ALTO clients upon receiving status information from a content delivery network (CDN) node.

  • Pub Date: 2013/09/12
  • Number: 09621449
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for attesting to information

Systems and methods for attesting to information about a computing resource involve electronically signed documents. For a computing resource, a document containing information about the resource is generated and electronically signed. The document may be provided to one or more entities as an attestation to at least some of the information contained in the document. Attestation to information in the document may be a prerequisite for performance of one or more actions that may be taken in connection with the computing resource.

  • Pub Date: 2013/06/12
  • Number: 09443074
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to process block-level backup for selective file restoration for virtual machines

A data storage system protects virtual machines using block-level backup operations and restores the data at a file level. The system accesses the virtual machine file information from the file allocation table of the host system underlying the virtualization layer. A file index associates this virtual machine file information with the related protected blocks in a secondary storage device during the block-level backup. Using the file index, the system can identify the specific blocks in the secondary storage device associated with a selected restore file. As a result, file level granularity for restore operations is possible for virtual machine data protected by block-level backup operations without restoring more than the selected file blocks from the block-level backup data.

  • Pub Date: 2013/06/12
  • Number: 09495404
  • Owner: COMMVAULT SYSTEMS, INC.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for visualizing multiple volumetric data sets in real time

Systems and methods for visualizing multiple volumes of three-dimensional data. A graphics card is used for voxel intermixing, pixel intermixing and image intermixing, which produces a final-combined image of the three-dimensional data in real time.

  • Pub Date: 2013/06/12
  • Number: 08797319
  • Owner: Landmark Graphics Corporation
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


System for on-site management of an event

A system includes a first portable, ruggedized, and waterproof case. The first portable, ruggedized, and waterproof case includes a router and a switch. The system further includes a computing system connectable to the switch. The computing system includes a memory for storing first ticket information and a first set of instructions. The computing system further includes a first processor that, upon execution of the first set of instructions, receives a ticket identifier scanned from a ticket. The first processor also compares the ticket identifier to the stored first ticket information. Based on the comparison, the first processor further generates an indication of validity of the ticket. The first processor further transmits the indication of validity of the ticket.

  • Pub Date: 2013/06/12
  • Number: 08833642
  • Owner: Eventbrite, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System for and method for media upload multithreading for large file uploads

Exemplary embodiments provide a system and method for uploading large files to a remote server faster. The system and method divide the file into smaller file chunks and utilize parallel thread execution to prepare and upload the file chunks to the remote server. The uploading may further utilize a plurality of HTTP connections. Once all chunks have been uploaded to the remote server, the chunks may be consolidated into the original file by using content tokens and chunk numbers associated with the uploaded chunks.

  • Pub Date: 2013/06/12
  • Number: 09197702
  • Owner: Cellco Partnership
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Synergistic weed control from applications of aminocyclopyrachlor and 2,4 dichlorophenoxyacetic acid (2,4-D)

Disclosed herein are herbicidal compositions comprising a synergistically herbicidal effective amount of (a) aminocyclopyrachlor, or an agriculturally acceptable salt or ester thereof, and (b) 2,4-D, or an agriculturally acceptable salt or ester thereof. Also disclosed herein are methods of controlling undesirable vegetation, which comprise applying to vegetation or an area adjacent the vegetation or applying to soil or water to prevent the emergence or growth of vegetation (a) aminocyclopyrachlor, or an agriculturally acceptable salt or ester thereof, and (b) 2,4-D, or an agriculturally acceptable salt or ester thereof, wherein (a) and (b) are each added in an amount sufficient to produce a synergistic herbicidal effect.

  • Pub Date: 2013/06/12
  • Number: 09149037
  • Owner: Dow AgroSciences LLC
  • Location: Indianapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Substituted isoquinolinones and methods of treatment thereof

Substituted isoquinolinone compounds and pharmaceutical compositions that modulate kinase activity, including PI3 kinase activity, and compounds, pharmaceutical compositions, and methods of treatment of diseases and conditions associated with kinase activity, including PI3 kinase activity, are described herein.

  • Pub Date: 2013/06/12
  • Number: 09115141
  • Owner: Infinity Pharmaceuticals, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Sentiment classification using out of domain data

Providing sentiment classification of out of domain data are disclosed herein. In some aspects, a source domain having a trained classifier is matched to a target domain having a target classifier. The trained classifier may include identifiers that may be used to predict the sentiment of opinion data for the source domain. The target classifier may use the identifiers of the trained classifier to determine the sentiment of opinion data for the target domain.

  • Pub Date: 2013/06/12
  • Number: 08942470
  • Owner: Microsoft Corporation
  • Location: Redwood, US
  • Details: Visit USPTO

Visit USPTO Page


Providing notification of computing resource availability for on-demand allocation

Technologies are described herein for providing notifications of computing resource availability for on-demand allocation. A resource request is received from a requesting application indicating the type, size, number, and other parameters of the computing resources desired. Upon determining that the requested computing resources are not immediately available, suitable alternative resources are determined based on the parameters of the requested resources. The availability of computing resources at the service provider is monitored, and when the requested resources or suitable alternatives become available, the requesting application is sent one or more resource availability notifications describing the available resources. The requesting application may then allocate the available resources from the service provider on-demand.

  • Pub Date: 2013/06/12
  • Number: 09407569
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Printer identification and mobile printing

Techniques are provided for displaying encoded data that represent a) features and options currently supported by a printing device, b) a printer identifier for the printing device, and c) network service interface data for a network service, wherein the network service interface data allow a mobile device to send print settings selection data and electronic document identification data to the network service; and processing print data and causing a printed version of an electronic document represented by the print data to be printed by the printing device.

  • Pub Date: 2013/06/12
  • Number: 09081527
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Mobile application testing systems and methods

Approaches for application testing are provided. An approach includes recording a test case of an application running on a mobile device. The approach also includes generating an expected layout based on object data received from the mobile device during the recording. The approach additionally includes receiving playback object data based on the test case being played back on the mobile device or a different mobile device. The approach further includes comparing the playback object data to the expected layout data.

  • Pub Date: 2013/06/12
  • Number: 09459994
  • Owner: KONY, INC.
  • Location: Orlando, US
  • Details: Visit USPTO

Visit USPTO Page


Exposing method related data calls during testing in an event driven, multichannel architecture

Approaches for application testing are provided. An approach includes transmitting a command to an agent associated with an application installed on a mobile device. The approach includes receiving from the agent information about an executed step of the application on the mobile device. The approach includes comparing the information to an expected value of the step. The approach includes display an output based on the comparing.

  • Pub Date: 2013/06/12
  • Number: 09336127
  • Owner: KONY, INC.
  • Location: Orlando, US
  • Details: Visit USPTO

Visit USPTO Page


Enhanced signal integrity and communication utilizing optimized code table signaling

In various embodiments, a computer-implemented method for optimized data transfer utilizing optimized code table signaling is disclosed. In one embodiment, a computer-implemented method comprises receiving, by a processor, a digital bit stream and transforming, by the processor, the digital bit stream to an encoded digital bit stream. The encoded digital bit stream comprises at least one of a gateway channel, a composite channel, or a data channel, and any combination thereof. The computer-implemented method further comprises providing, by the processor, the encoded digital bit stream to a transmission system for transmission and establishing, by the processor, signal integrity by utilizing pre-coordinated, pre-distributed information to limit the transmission to an intended sender-receiver pair. The intended sender-receiver pair comprises the pre-coordinated, pre-distributed information.

  • Pub Date: 2013/06/12
  • Number: 09031156
  • Owner: OptCTS, Inc.
  • Location: Pacific Grove, US
  • Details: Visit USPTO

Visit USPTO Page


Efficient multi-part upload for a data warehouse

Data may be partitioned and uploaded in multiple parts in parallel to a data warehouse cluster in a data warehouse system. Data to be uploaded may be identified, and the partitions for the data may be determined at the storage client. The data may then be partitioned at the storage client. In various embodiments, no local partitions of the data may be maintained in persistent storage at the storage client. The partitioned data may then be sent in parallel to a data warehouse staging area in another network-based service that is implemented as part of a same network-based service implementing the data warehouse system. A request may then be sent to the data warehouse cluster to perform a multi-part upload from the staging area to the data warehouse cluster.

  • Pub Date: 2013/06/12
  • Number: 09426219
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Correlating videos and sentences

A method of testing a video against an aggregate query includes automatically receiving an aggregate query defining participant(s) and condition(s) on the participant(s). Candidate object(s) are detected in the frames of the video. A first lattice is constructed for each participant, the first-lattice nodes corresponding to the candidate object(s). A second lattice is constructed for each condition. An aggregate lattice is constructed using the respective first lattice(s) and the respective second lattice(s). Each aggregate-lattice node includes a scoring factor combining a first-lattice node factor and a second-lattice node factor. respective aggregate score(s) are determined of one or more path(s) through the aggregate lattice, each path including a respective plurality of the nodes in the aggregate lattice, to determine whether the video corresponds to the aggregate query. A method of providing a description of a video is also described and includes generating a candidate description with participant(s) and condition(s) selected from a linguistic model; constructing component lattices for the participant(s) or condition(s), producing an aggregate lattice having nodes combining component-lattice factors, and determining a score for the video with respect to the candidate description by determining an aggregate score for a path through the aggregate lattice. If the aggregate score does not satisfy a termination condition, participant(s) or condition(s) from the linguistic model are added to the condition, and the process is repeated. A method of testing a video against an aggregate query by mathematically optimizing a unified cost function is also described.

  • Pub Date: 2013/06/12
  • Number: 09183466
  • Owner: Purdue Research Foundation
  • Location: West Lafayette, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling in-vehicle computing system based on contextual data

Embodiments are disclosed for systems and methods for controlling operation of an in-vehicle computing system. In some embodiments, an in-vehicle computing system includes a processor, an external device interface communicatively coupleable to an extra-vehicle server, and a storage device storing instructions executable by the processor to receive information from a navigation subsystem and one or more sensors of the vehicle. The information may include user information identifying one or more occupants of the vehicle with one or more accounts of a social media network. The instructions may also be executable to send the received information to the server, receive instructions from the server, and transmit control instructions to one or more vehicle systems based on the identified action. The instructions may identify an action to be performed based on the received information.

  • Pub Date: 2013/06/12
  • Number: 09188449
  • Owner: Harman International Industries, Incorporated
  • Location: Stamford, US
  • Details: Visit USPTO

Visit USPTO Page


Client/server security by an intermediary rendering modified in-memory objects

In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.

  • Pub Date: 2013/06/12
  • Number: 09270647
  • Owner: Shape Security, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual sensor network system and method for convergence of heterogeneous sensors

A virtual sensor network system is provided that includes a virtual sensor node that stores sensor data collected from a sensor mounted within a vehicle in time synchronization therewith and provides the stored sensor data in time synchronization therewith, in addition, a master node performs a control on the virtual sensor node and executes an algorithm used in an intelligent vehicle using the sensor data. The master node receives the sensor data stored in the virtual sensor node as the virtual sensor data in time synchronization therewith, without inputting actual sensor data from the sensor mounted within the vehicle when executing the algorithm.

  • Pub Date: 2013/05/12
  • Number: 08996248
  • Owner: Research & Business Foundation Sungkyunkwan University
  • Location: Suwon, Gyeonggi-Do, KR
  • Details: Visit USPTO

Visit USPTO Page


Techniques for determining actual and/or near states of proximity between mobile devices

Techniques are provided that may be implemented in various methods, apparatuses and articles of manufacture for use by one or more electronic devices to support proximity services for a mobile device. In an example implementation, a computing device may determine whether a first mobile device and a second mobile device are each operatively provisioned to make use of a common proximity service, use a first procedure to determine whether a state of near proximity exists between at least two mobile devices, use a second procedure to determine whether a state of proximity exists between the at least two mobile devices, and initiate notification of a user and/or an application of at least one of the mobile devices in response to one or more of such determinations.

  • Pub Date: 2013/05/12
  • Number: 09496971
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Single set of credentials for accessing multiple computing resource services

A user may utilize a set of credentials to access, through a managed directory service, one or more services provided by a computing resource service provider. The managed directory service may be configured to identify one or more policies applicable to the user. These policies may define the level of access to the one or more services provided by the computing resource service provider. Based at least in part on these policies, the managed directory service may transmit a request to an identity management system to obtain a set of temporary credentials that may be used to enable the user to access the one or more services. Accordingly, the managed directory service may be configured to enable the user, based at least in part on the policies and the set of temporary credentials, to access an interface, which can be used to access the one or more services.

  • Pub Date: 2013/05/12
  • Number: 09407615
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Ontology based recommendation systems and methods

A search technology generates recommendations with minimal user data and participation, and provides better interpretation of user data, such as popularity, thus obtaining breadth and quality in recommendations. It is sensitive to the semantic content of natural language terms and lets users briefly describe the intended recipient (i.e., interests, eccentricities, previously successful gifts). Based on that input, the recommendation software system and method determines the meaning of the entered terms and creatively discover connections to gift recommendations from the vast array of possibilities. The user may then make a selection from these recommendations. The search/recommendation engine allows the user to find gifts through connections that are not limited to previously available information on the Internet. Thus, interests can be connected to buying behavior by relating terms to respective items.

  • Pub Date: 2013/05/12
  • Number: 09015185
  • Owner: Piksel, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Multiple system images for over-the-air updates

In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA update is maintained through checking a plurality of security signatures in an OTA manifest, and the integrity of the data is maintained by checking a hash value of the downloaded system image.

  • Pub Date: 2013/05/12
  • Number: 08832439
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for robust supervised machine learning

A disclosed method may include iterating a model optimization process, the iterating including one or more iterations. The method may also include updating a classification model based on the iterating, the updating performed using training data. The method may further include generating a final version of the classification model based on a final iteration. The method may also include setting a parameter (q), the parameter corresponding to a total number of observations (Q) that are to be removed from the training data by the final iteration. The method may further include determining one or more corresponding numbers of observations to remove from the training data, where the corresponding number of observations are to be removed at some of select iterations t, and the corresponding number of observations are to be removed based on the number Q and an estimate of the number of iterations remaining until the final iteration.

  • Pub Date: 2013/05/12
  • Number: 09652722
  • Owner: The Mathworks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Method for data maintenance

A method for data storage implemented in a data storage system is disclosed. Data storage nodes may be interconnected by means of a communications network. The method may include sending a request for a first data item to a plurality of storage nodes. The first data item may include a reference to a second data item stored in the storage system. The method may include receiving the first data item from at least one storage node, and sending a request for the second data item to the plurality of storage nodes based on the reference included in the first data item.

  • Pub Date: 2013/05/12
  • Number: 09305012
  • Owner: COMPUVERDE AB
  • Location: , SE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for presenting and managing storage shares

Methods and systems for managing storage shares in a virtual environment having a plurality of virtual machines are provided. The system includes a storage system for managing storage space for the storage shares and generating a quota report. The quota report shows an assigned quota for each storage share and actual storage used by each storage share. The assigned quota indicates an amount of designated storage space for each storage share. The system also includes a storage provider for obtaining the quota report from the storage system and filtering the quota report based on storage shares that are managed by the storage provider. The storage provider modifies a quota for a storage share based on a client request and notifies the storage system of the modification.

  • Pub Date: 2013/05/12
  • Number: 09507614
  • Owner: NETAPP, INC.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Knowledge based authentication using mobile devices

A technique of performing knowledge based authentication (KBA) involves collecting activity data and time data based on operation of a mobile device, the activity data identifying an activity performed by the mobile device, and the time data identifying a time of the activity. The technique further involves generating a KBA question based on the activity data and the time data. The technique further involves providing the KBA question to a user to authenticate the user. Such a technique is capable of being performed by a remote server which communicates with the mobile device over time (e.g., in response to certain events, periodically, combinations thereof, etc.). Accordingly, the remote server is able to accumulate activity and time data which is not stored permanently (or perhaps even at all) by the mobile device, and then generate KBA questions based on that data.

  • Pub Date: 2013/05/12
  • Number: 09565562
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Executing a business process in a framework

Various embodiments of systems and methods for executing a customized business process in a business process framework are described herein. A user selection of a solution type corresponding to a business process is received from a user interface. In response to the user selection, a query is executed to retrieve application types and corresponding sub-application types from a business logic stored in a database. Configurable attributes are generated based upon the application types and the corresponding sub-application types. Based upon the application types, the sub-application types and the configurable attributes, the business process is customized to create a customized business process. Based upon a configuration information, a user input to the customized business process is captured from the user interface. The user input is validated by comparing the user input with the business logic. The customized business process that is validated is further executed in the business process framework.

  • Pub Date: 2013/05/12
  • Number: 09508050
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Efficient means of broadcast and relaying information between wireless terminals

A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may receive broadcast information related to a second UE from a third UE, relay the broadcast information and identifier information to a set of UEs, determine whether each UE in the set of UEs has received the broadcast information based on whether the identifier information is received from each UE in the set of UEs, and refrain from relaying the broadcast information upon determining that each UE in the set of UEs has received the broadcast information. In another aspect, the apparatus may receive broadcast information related to a second UE and a tag associated with the broadcast information from a third UE, relay the tag without the broadcast information to a set of UEs, receive a request for broadcast information from a third UE in the set of UEs, and relay the broadcast information to the third UE. In an aspect, the first, second and third UEs may be the same UE. In another aspect, the second and third UEs but not the first UE may be the same UE.

  • Pub Date: 2013/05/12
  • Number: 09276684
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic library replacement

Provided are techniques for an OS to be modified on a running system such that running programs, including system services, so not have to be stopped and restarted for the modification to take effect. The techniques include detecting, by a processing thread, when the processing thread has entered a shared library; in response to the detecting, setting a thread flag corresponding to the thread in an operating system (OS); detecting an OS flag, set by the OS, indicating that the OS is updating the shared library; in response to detecting the OS flag, suspending processing by the processing thread and transferring control from the thread to the OS; resuming processing by the processing thread in response to detecting that the OS has completed the updating; and executing the shared library in response to the resuming.

  • Pub Date: 2013/05/12
  • Number: 09529585
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Distributing data on distributed storage systems

A method of distributing data in a distributed storage system includes receiving a file into non-transitory memory and dividing the received file into chunks using a computer processor in communication with the non-transitory memory. The method also includes distributing chunks to storage devices of the distributed storage system based on a maintenance hierarchy of the distributed storage system. The maintenance hierarchy includes maintenance units each having active and inactive states. Moreover, each storage device is associated with a maintenance unit. The chunks are distributed across multiple maintenance units to maintain accessibility of the file when a maintenance unit is in an inactive state.

  • Pub Date: 2013/05/12
  • Number: 09367562
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Discovering optimized experience configurations for a software application

Technologies are described herein for performing experiments on a software application and identifying optimized experience configurations for the software application. An application experiment system receives an experiment configuration from a developer of the software application. Based on the experiment configuration, the application experiment system determines an experiment strategy and generates a set of experience configurations for testing. Users available to participate in the experiment are identified, and the set of experience configurations are allocated to user computing devices associated with the available users to configure instances of the software application executing on the user computing devices. Experiment data related to the execution of the instances of the software application are collected and analyzed by the application experiment system to identify the optimized experience configuration for the software application.

  • Pub Date: 2013/05/12
  • Number: 09483393
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Detection of a misconfigured duplicate IP address in a distributed data center network fabric

Presented herein are techniques to detect a misconfigured duplicate Internet Protocol (IP) address in a distributed data center network fabric. A network topology is provided that includes a plurality of network elements. A network element receives a configuration message comprising an IP address from a first host associated with the first network element. The IP address is detected to already be in use by a second host associated with a second network element. A request message is provided to the second network element, the request message configured to cause the second network element to attempt to contact the second host. A reply message is received from the second network element. If the reply message indicates that the second host exists at the second network element, an indication of a misconfiguration event is generated. Otherwise, the IP address is associated with the first host.

  • Pub Date: 2013/05/12
  • Number: 09413713
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Detecting JAVA sandbox escaping attacks based on JAVA bytecode instrumentation and JAVA method hooking

By injecting bytecode into a predetermined method of a sandbox environment, an application that uses an exploit to attempt to escape from the sandbox environment may be detected without knowledge of the application or the exploit used to attempt to escape from the sandbox environment. Upon indicating that the application has escaped the sandbox, the application may be terminated or the escape may be reported, allowing further monitoring of the application.

  • Pub Date: 2013/05/12
  • Number: 09223964
  • Details: Visit USPTO

Visit USPTO Page


Data access lockdown

Data access lockdown is described, including receiving a request from a first user to disable access to all data that are access-controlled by the first user based on at least one setting. The data are shared with at least one other user. In response to the request, modifying, without further action by the first user, the at least one setting by replacing a current value indicative of at least some of the data being shared, with a lockdown value indicative of disablement of access to all the data access-controlled by the first user, so as to prevent the at least one other user from accessing any of the data.

  • Pub Date: 2013/05/12
  • Number: 09177163
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Advertisement delivery management apparatus and advertisement delivery management method

An advertisement delivery management apparatus according to an embodiment includes a predicted information storage unit, an allocating unit, and a reallocating unit. The predicted information storage unit stores information including user attributes of a plurality of delivery target users predicted as future advertisement delivery destinations. The allocating unit allocates the delivery target user to an advertisement delivery order request based on the information stored in the predicted information storage unit. The reallocating unit performs a reallocating process of exchanging the delivery target user allocated to the order request with a non-allocated user who is the delivery target user that has not been allocated to the order request.

  • Pub Date: 2013/05/12
  • Number: 09514480
  • Owner: YAHOO JAPAN CORPORATION
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for communicating notifications and textual data associated with applications

Embodiments are provided for communicating notifications and other textual data associated with applications installed on an electronic device. According to certain aspects, a user can interface with an input device to send () a wake up trigger to the electronic device. The electronic device retrieves () application notifications and converts () the application notifications to audio data. The electronic device also sends () the audio data to an audio output device for annunciation (). The user may also use the input device to send () a request to the electronic device to activate the display screen. The electronic device identifies () an application corresponding to an annunciated notification, and activates () the display screen and initiates the application.

  • Pub Date: 2013/04/12
  • Number: 09400634
  • Owner: Google Technology Holdings LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for controlling access to encrypted files

Disclosed are systems, methods and computer program products for controlling access to encrypted files. In one aspect, the system detects a request from an application to access an encrypted file. The system identifies the application that requested access to the encrypted file and one or more file access policies associated with the application. The file access policy specifies at least a file access method associated with the application. The system then controls access to the file based on the identified one or more file access policies.

  • Pub Date: 2013/04/12
  • Number: 09460305
  • Owner: AO Kaspersky Lab
  • Location: Moscow, RU
  • Details: Visit USPTO

Visit USPTO Page


Secure identification of intranet network

A method is provided for network identification based on high entropy data on a network which are not easily guessed or obtained outside the network, which can prevent an attacker from “spoofing” the network. A component in a client computer connected to a network may obtain over the network a network data block including device identification information of a device controlling the network. Upon parsing the network data block, such high entropy data as unique device identifiers may be obtained from the device identification information. Depending on availability of the unique device identifiers and authentication history of the client computer, different combinations of the unique device identifiers and/or other identification information may be used to generate a unique network identifier such as a network signature. The component may provide the network signature to applications within the client computer.

  • Pub Date: 2013/04/12
  • Number: 09143510
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Programmatically simulating system conditions

Systems and methods are provided for programmatically simulating one or more system conditions for a network resource using one or more services. In one implementation, a server receives a request to initiate a treatment. The request identifies a treatment definition. The server determines, based on the treatment definition, the one or more services and deploys the one or more services to the network resource. The one or more services simulate the one or more system conditions.

  • Pub Date: 2013/04/12
  • Number: 09077643
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for remote connection

A system and method for establishing a virtual network connection between an initiating computing device operated by an initiator and a target computing device operated by a target so that one of said computing devices is able to control the other of said computing devices. The system comprises a third party proxy to which the computing devices are connected. The third party proxy receives a request for a virtual network connection to said target computing device from said initiating computing device and requests initiator credentials for said initiating computing device and target credentials for said target computing device. Said credentials are delivered to the respective computing device. The system also comprises a core node configured to receive the credentials from the respective computing device, authenticate the received credentials, and if said credentials are authentic, establish the virtual network connection between said initiating computing device and said target computing device.

  • Pub Date: 2013/04/12
  • Number: 09185113
  • Owner: RealVNC Ltd
  • Location: Cambridge, GB
  • Details: Visit USPTO

Visit USPTO Page


Immune modulation using peptides and other compositions

The present invention generally relates to compositions and methods for topical or transdermal delivery for immune modulation. In some cases, the composition may include nitric oxide and/or peptides such as thyrotropin-releasing hormone (TRH) and/or GnRH (gonadotropin-releasing hormone). The nitric oxide and/or peptide may be present within a first phase comprising a lecithin, such as phosphatidylcholine. In certain embodiments, the lecithin is present in liposomes, micelles, or other structures containing nitric oxide, peptides, or both. The composition can take the form of a gel, a cream, a lotion, an ointment, a solution, a solid “stick,” etc., that can be rubbed or sprayed onto the skin. Other aspects of the present invention are generally directed to methods of making or using such compositions, methods of promoting such compositions, kits including such compositions, or the like.

  • Pub Date: 2013/04/12
  • Number: 09393264
  • Owner: Transdermal Biotechnology, Inc.
  • Location: Meriden, US
  • Details: Visit USPTO

Visit USPTO Page


Fault tolerance model, methods, and apparatuses and their validation techniques

A system and method for fault-tolerant release automation and validation techniques are disclosed. An example method may include receiving release procedures. The release procedures may be defined using a fault-tolerant release automation library. Then, a release program may be created using the release procedures. A release program may be a workflow or a set of nested workflows made up of fault-tolerant release automation procedures. The release program may be executed to test the release procedures. In some embodiments, validation techniques may be used in order to validate and verify that the release procedures are correct and that error detection and recovery capabilities cover all aspects of the release procedures.

  • Pub Date: 2013/04/12
  • Number: 09317254
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Extensible framework for communicating over a firewall with a software application regarding a user account

An on-premise software application (“OPA”) is communicated with according to an action received from outside a firewall. The action concerns user account information maintained by the OPA. The OPA is installed on a device located inside the firewall. The action is received from a management server located outside the firewall. The action includes a portion that adheres to a standardized format. An OPA interface request is generated based on the action. The OPA interface request includes the standardized portion. The OPA interface request is sent to an agent/OPA interface.

  • Pub Date: 2013/04/12
  • Number: 09191364
  • Owner: Okta, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic throttle of network traffic

Techniques for dynamically throttling network traffic may be provided. For example, a first threshold specific to a first client may be determined and may be dynamically adjusted over time. A volume of network traffic of the first client may be compared to the first threshold and, if is in excess, a throttling operation may be performed. The throttling operation may include throttling the network traffic of the first client, throttling the traffic of a second client, or comparing the volume of network traffic to a second threshold. If the second threshold is exceeded, a connection with the first client or the second client may be terminated.

  • Pub Date: 2013/04/12
  • Number: 09473413
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for controlling a suspended state

A device includes a proximity sensor configured to detect when an object is within a predetermined proximity range of the device, and input detection circuitry configured to detect when an input operation is performed on the device. The terminal device includes control circuitry configured to determine a proximity detection state of the device, wherein an object detection state corresponds to a proximity state in which the object is detected within the predetermined proximity range, and an object non-detection state corresponds to a proximity state in which the object is not detected within the predetermined proximity range; control a suspended state of the device, wherein the suspended state is a state of reduced processing and/or power consumption; and control the input detection circuitry such that, when the device is in the suspended state and in the object detection state, the input detection circuitry stops input operation detection processing.

  • Pub Date: 2013/04/12
  • Number: 09639261
  • Owner: Sony Mobile Communications Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Access control using impersonization

A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the customer to the first service. To process the request, the second service evaluates one or more policies to determine whether fulfillment of the request is allowed by policy associated with the customer. The one or more policies may state one or more conditions on one or more services that played a role in submission of the request. If determined that the policy allows fulfillment of the request, the second service fulfills the request.

  • Pub Date: 2013/04/12
  • Number: 09420007
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for real time delivery of context based content from the cloud to mobile

The information in the cloud is available in the form of software-as-a-service is accessible from laptops and personal computers. The system obtains information from multiple sources in the “cloud,” correlates the information, determines a subset of information based on context, and pushes the information to at least one mobile device. An engine extracts a context based subset of information and correlates the context based subset of information based on the same context or a different context. A data push engine makes the information available in real time to a user by pushing the information to the at least one mobile device like a smartphone, tablet, and/or navigation system.

  • Pub Date: 2013/03/12
  • Number: 09071649
  • Owner: Core Mobile Networks, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing and locating public or private mobile device charging stations

Systems and methods for locating and providing public mobile device charging stations are disclosed. One or more charging stations may be configured to charge a battery of a mobile device. A database may be configured to store location information of the one or more charging stations as well as mobile device location information of the one or more respective mobile devices. A server communicatively coupled with the one or more charging stations and the database, may be configured to determine a proximity of the one or more charging stations to a location of the mobile device. This determination may be based on the station location information and the mobile device location information. Based on the determined proximity, provide the station location information of the respective one or more charging stations to the mobile device.

  • Pub Date: 2013/03/12
  • Number: 09537994
  • Details: Visit USPTO

Visit USPTO Page


Sensitive data protection during user interface automation testing systems and methods

There is provided systems and method for sensitive data protection during user interface automation testing. A user may transmit sensitive data to the test website framework, where the sensitive data is encrypted as a data key. The encrypted data key is set by an administrator of the test website and given to the user. The user may enter the key, where the test website framework application utilizes a conversion kit to decrypt the encrypted data key for use in the website user interface automation test. However, the encrypted data key is pulled into a version control system and/or viewed in test results so that the sensitive data remains hidden from view. In various embodiments, the encrypted data key may be entered into a web element, such as a password field, where the password field displays only the encrypted data key during test results.

  • Pub Date: 2013/03/12
  • Number: 09152812
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Network page test system and methods

Systems and methods for testing a network page without encapsulating the network page with a test environment are presented. A script such as a test injector script may be added to a network page in development. The test injector script may identify one or more tests to run on the network page based, at least in part, on metadata included in the network page. The domain object model (DOM) of the network page may be modified to include tests to be performed on the network page.

  • Pub Date: 2013/03/12
  • Number: 09262311
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Method of supporting third-party applications in an instant messaging system and a system using the same

A mobile terminal system for providing instant messaging to a third-party application includes a mobile terminal having one or more processors and memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the mobile terminal to perform the instructions of acquiring an application ID (appid) and a software development kit (SDK) from an instant messaging open platform by the third-party application; registering the third-party application at the instant messaging open platform using the acquired appid and SDK when the third-party application initiates; providing an open application programming interface (API) to the third-party application via the instant messaging open platform; and transmitting information between the instant messaging open platform and the third-party application via the open API.

  • Pub Date: 2013/03/12
  • Number: 09197588
  • Owner: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
  • Location: Shenzhen, Guangdong Province, CN
  • Details: Visit USPTO

Visit USPTO Page


Method for transitioning radio resource control state of user equipment to idle state, system therefor, and the same user equipment

In a WCDMA mobile communication system, when the amount of packet traffic transmitted to or received from a UE decreases during a predetermined time in a CELL_DCH state in which a WCDMA packet data connection has been established, the UE transitions to a CELL_FACH state by a radio network controller (RNC). Thereafter, it is determined if there is no transmitted or received packet traffic during a certain time in the CELL_FACH state (which is an RRC state in which an RRC connection has been connected, and the dedicated physical channel has been released). When it is determined that there is no transmitted or received packet traffic during the certain time, the UE requests a network to release the RRC connection by utilizing a Signaling Connection Release Indication (SCRI) message. The invention enables a UE to check a packet transmission or reception flow, and to directly transmit the SCRI message to the network.

  • Pub Date: 2013/03/12
  • Number: 09420625
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Method for performing interactive services on mobile device, such as time or location initiated interactive services

A system for performing interactive services at a mobile device is disclosed. In some cases, the system receives an indication of an event, and provides interactive services to a user of the mobile device based on the event. In some cases, an indication of an event in invokes a script-based process that determines one or more actions to present to a user of the mobile device.

  • Pub Date: 2013/03/12
  • Number: 09313606
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Extreme visualization enabling extension for large data sets

The present disclosure describes methods, systems, and computer program products for enabling extreme visualization for large data sets stored in a database. One computer-implemented method includes receiving a request for an input schema to feed to a data specification language (DaSL) and a metadata outline of typed objects exposed by a database view identified in the request, requesting extraction of the input schema and metadata outline from the database, creating an instance of a DaSL compiler based upon the input schema, generating, by a computer, a DaSL query corresponding to objects selected from the metadata outline, requesting compilation of the DaSL query, and receiving a calculation plan and topology cursors responsive to the compilation of the DaSL query.

  • Pub Date: 2013/03/12
  • Number: 09396240
  • Owner: Business Objects Software Ltd.
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


De-populating cloud data store

Embodiments relate to systems and methods for de-populating a cloud data store. In one method, an identification of a set of cloud-populated data to be transported from a set of host storage clouds to at least one target data store is received. The method identifies a data transport pathway from the set of host storage clouds to the at least one target data store, the data transport pathway including a dedicated reverse staging connection between the set of host storage clouds and the at least one target data store. The method initiates the transport of the set of cloud-populated data to the at least one target data store in view of a set of de-population commands.

  • Pub Date: 2013/03/12
  • Number: 09063904
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions comprising free-standing two-dimensional nanocrystals

The present invention is directed to compositions comprising free standing and stacked assemblies of two dimensional crystalline solids, and methods of making the same.

  • Pub Date: 2013/03/12
  • Number: 09193595
  • Owner: Drexel University
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and methods for antibodies targeting EPO

The present invention relates to compositions and methods for the inhibition of EPO. The invention provides antibodies and antigen binding fragments thereof that bind to EPO and are able to inhibit EPO-dependent cell proliferation and/or EPO-dependent cell signaling.

  • Pub Date: 2013/03/12
  • Number: 09365646
  • Owner: NOVARTIS AG
  • Location: Basel, CH
  • Details: Visit USPTO

Visit USPTO Page


Carbon nanotube film structure and method for manufacturing the same

A method of producing a carbon nanotube film structure having a substrate and a carbon nanotube layer, comprises a placing step of placing a carbon nanotube film comprising a plurality of carbon nanotubes aligned in one direction within a film plane on the substrate; and a densifying step of applying a densifying treatment to the carbon nanotube film thereby forming the carbon nanotube layer having the weight density of the carbon nanotube to 0.1 g/cmor more. Thus, a problem of island-like shrinkage caused while a highly densified CNT layer is being manufactured is solved, and a high-quality CNT film structure wherein the aligned CNT layer having a high density and uniform thickness is deposited on the substrate.

  • Pub Date: 2013/03/12
  • Number: 09126835
  • Owner: NATIONAL INSTITUTE OF ADVANCED INDUSTRIAL SCIENCE AND TECHNOLOGY
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Achieving low grace period latencies despite energy efficiency

A technique for achieving low grace-period latencies in an energy efficient environment in which processors with Read-Copy Update (RCU) callbacks are allowed to enter low power states. In an example embodiment, for each processor that has RCU callbacks, different grace period numbers are assigned to different groups of the processor's RCU callbacks. New grace periods are periodically started and old grace periods are periodically ended. As old grace periods end, groups of RCU callbacks having corresponding assigned grace period numbers are invoked.

  • Pub Date: 2013/03/12
  • Number: 09389925
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and apparatuses for testing mobile device applications

Aspects of the present disclosure generally relate to systems and methods for facilitating optimization of mobile application testing. In one embodiment, a mobile application testing system (MATS) allows simultaneous communication to a plurality of devices regardless of device type and operating system. Accordingly, the MATS performs mobile testing without “jail-breaking” or removing various components of the user device. In one embodiment of the present disclosure, the MATS enables users to securely test mobile applications by supporting data routing behind a security firewall utilizing a transition of communications protocols. Further, various protocols provide a data tunnel allowing multiple concurrent testing sessions for multiple users via an authentication scheme. Additionally, concurrent testing sessions may include single app testing on multiple devices or a plurality of apps testing on a plurality of devices.

  • Pub Date: 2013/02/12
  • Number: 09430364
  • Owner: Mobile Labs, LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for spoken dialog service arbitration

Systems and methods for arbitrating spoken dialog services include determining a capability catalog associated with a plurality of devices accessible within an environment. The capability catalog includes a list of the plurality of devices mapped to a list of spoken dialog services provided by each of the plurality of devices. The system arbitrates between the plurality of devices and the spoken dialog services in the capability catalog to determine a selected device and a selected dialog service.

  • Pub Date: 2013/02/12
  • Number: 09396727
  • Owner: GM GLOBAL TECHNOLOGY OPERATIONS LLC
  • Location: Detroit, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing content and services on a network system

Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications.

  • Pub Date: 2013/02/12
  • Number: 08788690
  • Owner: Nomadix, Inc.
  • Location: Agoura Hills, US
  • Details: Visit USPTO

Visit USPTO Page


System and method to sort messages exchanged in a wireless personal area network according to relative orientations and positions of sending and receiving devices

Apparatus and methods are described herein for sorting messages sent and received, for example in a wireless Personal Area Network (PAN), according to whether the receiving device is within a radially defined region of space. The space may be defined by one or more parameters set by the sending device. A wireless PAN may define the range of peer-to-peer transmission and reception of radio waves between at least two wireless devices. Location and orientation information may be transmitted by a communication device and combined with user and/or software defined boundary limits to filter short range wireless messages.

  • Pub Date: 2013/02/12
  • Number: 09154604
  • Details: Visit USPTO

Visit USPTO Page


Software version management for executing replacement actions

A software version management system comprising a host driver and at least one software module. The host driver comprises migration means to start, stop and replace the software modules on a computer system in response to replacement actions. The system is characterized by the software module being a downgradable software module comprising a compatibility database specifying dependencies between different versions of the software module; the migration means further comprising i) at least a status means to retrieve temporal information from the downgradable software module; ii) at least a downgrading means responsive to a replacement action to downgrade the downgradable software module to a particular downgrade version and to the status means, the downgrading means identifying an intermediate version of the downgradable software module; the host driver comprising restarting means responsive to the report of the completion of the intermediate version to load and start the downgrade version of the software module.

  • Pub Date: 2013/02/12
  • Number: 09411576
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Software defined networking pipe for network traffic inspection

A software defined networking (SDN) computer network includes an SDN controller and an SDN switch. The SDN controller inserts flow rules in a flow table of the SDN switch to create an SDN pipe between a sender component and a security component. A broadcast function of the SDN switch to the ports that form the SDN pipe may be disabled. The SDN pipe allows outgoing packets sent by the sender component to be received by the security component. The security component inspects the outgoing packets for compliance with security policies and allows the outgoing packets to be forwarded to their destination when the outgoing packets pass inspection. The SDN controller may also insert a flow rule in the flow table of the SDN switch to bypass inspection of specified packets.

  • Pub Date: 2013/02/12
  • Number: 09264400
  • Owner: Trend Micro Incorporated
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Secure information storage and delivery system and method

A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault is associated with a service level including at least one of a data type or a data size limit associated with the secure vault, the secure vault being adapted to receive and at least one data entry and securely store the at least one data entry if the at least one of a size or a type of the at least one data entry is consistent with the service level. A mobile vault server coupled to the vault repository creates a mobile vault on a mobile device based on the secure vault and is capable of authenticating the mobile device based on user authentication information. The mobile vault server includes a mobile device handler that communicates with the mobile device. A synchronization utility determines whether the at least one data entry on the secure vault is transferable to or storable on the mobile vault based on at least one of the size or the type of the at least one data entry and transfers the at least one data entry from the secure vault to a corresponding data entry on the mobile vault if the at least one data entry on the secure vault is determined to be transferable to or storable on the mobile vault.

  • Pub Date: 2013/02/12
  • Number: 09049190
  • Owner: Intersections, Inc.
  • Location: Chantilly, US
  • Details: Visit USPTO

Visit USPTO Page


Secure cloud storage distribution and aggregation

Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application programming interface (API) is provided by a cloud storage gateway device logically interposed between third-party cloud storage platforms and users of an enterprise. The API facilitates storing of files, issuing of search requests against the files and retrieval of content of the files. A file storage policy is assigned to each user, which defines access rights, storage diversity requirements and a type of encryption to be applied to files. Responsive to receiving a request to store a file, (i) searchable encrypted data is created relating to content and/or metadata of the file based on the assigned file storage policy; and (ii) the searchable encrypted data is distributed among the third-party cloud storage platforms based on the storage diversity requirements defined by the assigned file storage policy.

  • Pub Date: 2013/02/12
  • Number: 09280678
  • Owner: Fortinet, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Privilege separation

In one implementation, an interposer library is installed on an embedded system or another type of computing system. The system may be configured to host web services or route data packets. A processor, executes processes of the system, and the interposer library intercepts data indicative of relationships of the processes. An access map is generated based on relationships of the processes of the system. The system is modified according to a set of procedures derived from the access map. The set of procedures may be derived by the processor or the access map. The set of procedures may be a minimum privilege solution that minimizes the privilege level of each process to a lowest privilege possible while maintaining the requisite functions of the process.

  • Pub Date: 2013/02/12
  • Number: 09282100
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Prioritizing online relationships

Systems and methods for generating a set of priority contacts based on their strength of relationship with a user. Contacts of users and communications from those contacts are aggregated across multiple online accounts into a single set of communications. An affinity score is calculated for each of the user's contacts based on adding up the total weight and frequency of communications with the user and a predetermined number of contacts having the highest affinity score can be identified as priority contacts. The affinity score is used to filter the news feed in a user interface display so that only communications from priority contacts are displayed in the news feed.

  • Pub Date: 2013/02/12
  • Number: 09087110
  • Owner: MYLIFE.COM, INC.
  • Location: Los Angeles, US
  • Details: Visit USPTO

Visit USPTO Page


Optimized log storage for asynchronous log updates

A log-structured data store may implement optimized log storage for asynchronous log updates. In some embodiments, log records may be received indicating updates to data stored for a storage client and indicating positions in a log record sequence. The log records themselves may not be guaranteed to be received according to the log record sequence. Received log records may be stored in a hot log portion of a block-based storage device according to an order in which they are received. Log records in the hot log portion may then be identified to be moved to a cold log portion of the block-based storage device in order to complete a next portion of the log record sequence. Log records may be modified, such as compressed, or coalesced, before being stored together in a data block of the cold log portion according to the log record sequence.

  • Pub Date: 2013/02/12
  • Number: 09223843
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Notifying a user utilizing smart alerting techniques

A configuration associated with an electronic message may be received, the electronic message containing a keyword. Historical notification information comprising information about multiple electronic messages may be accessed to determine one or more related electronic messages. A number of related electronic messages may be determined by comparing the keyword to the historical notification information. An electronic notification may be generated based at least in part on the configuration information, the electronic message, and the multiple related electronic messages.

  • Pub Date: 2013/02/12
  • Number: 09336674
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for machine learning to discover application compatibility status

A system and method is provided for discovering application compatibility status, the method being performed by one or more processors, the method comprising receiving a request for determining compatibility of a first application with a platform and organizing a plurality of data points associated with the first application into a plurality of elements. The method also comprises comparing the plurality of elements with a plurality of elements associated with one or more analyzed applications, wherein the one or more analyzed applications have been previously analyzed for compatibility with the platform. The method further comprises identifying a compatibility status of the first application with the platform based on the comparison; and providing, for display, the compatibility status of the first application.

  • Pub Date: 2013/02/12
  • Number: 09330184
  • Owner: Cltirix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for migration of virtual machines and virtual applications between cloud-computing facilities through multiplexed secure tunnels

The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and deploying a virtual machine or virtual application previously running on a first cloud-computing facility within the context of the extended internal network in the second cloud-computing facility. The currently disclosed methods and systems which provide internal-network extension and redeployment of virtual machines and virtual applications, referred to as “stretch deploy,” allow a virtual machine or virtual application formerly executing on a first cloud-computing facility to resume execution on a second cloud-computing facility, using the computational and storage facilities of the second cloud-computing facility but depending on network support from the first cloud-computing facility, without changing IP and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate. Multiplexing multiple stretch deployed L2 networks over the same secure (SSL-VPN) tunnel, terminating on organization edges.

  • Pub Date: 2013/02/12
  • Number: 09389893
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for migrating virtual machines between cloud computing facilities using multiple extended local virtual networks and static network addresses

The current document discloses methods and systems for extending an internal network within a source cloud-computing facility to a new target cloud-computing facility and redeploying a virtual machine or virtual application previously running on a target cloud-computing facility within the context of an extended internal network in the target cloud-computing facility. The currently disclosed methods and systems, which allow a virtual machine or virtual application formerly executing on a target cloud-computing facility to resume execution on a new target cloud-computing facility, using the computational and storage facilities of the new target cloud-computing facility but depending on network support from the source cloud-computing facility, without changing IP and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate.

  • Pub Date: 2013/02/12
  • Number: 09430256
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Managing firmware update attempts

Attempts to update confirmation information or firmware for a hardware device can be monitored using a secure counter that is configured to monotonically adjust a current value of the secure counter for each update or update attempt. The value of the counter can be determined every time the validity of the firmware is confirmed, and this value can be stored to a secure location. At subsequent times, such as during a boot process, the actual value of the counter can be determined and compared with the expected value. If the values do not match, such that the firmware may be in an unexpected state, an action can be taken, such as to prevent access to, or isolate, the hardware until such time as the firmware can be validated or updated to an expected state.

  • Pub Date: 2013/02/12
  • Number: 08996744
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Content preview for electronic devices

Techniques for previewing portions of the content item using an electronic device include displaying a first portion of the content item, receiving input from a user indicative of a desire to browse a second portion of the content item different than the first portion, and displaying a preview window illustrating the second portion of the content item in response to the input. The preview window may enable the user to simultaneously view the second portion illustrated therein as well as at least part of the first portion. In addition, a viewing position of the user may be maintained at a location of the first portion in the content item while the second portion is illustrated in the preview window. Accordingly, the user may not lose context of the first portion of the content item while the viewing the second portion.

  • Pub Date: 2013/02/12
  • Number: 09389757
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Advertisement delivery management apparatus and advertisement delivery management method

An advertisement delivery management apparatus according to an embodiment includes an acquisition unit, a determination unit, and an accepting unit. The acquisition unit acquires information on two or more types of delivery target user groups, each including a plurality of delivery target users predicted as future advertisement delivery destinations. The determination unit determines whether each of the delivery target user groups satisfies delivery conditions designated by an advertisement delivery order request. The accepting unit accepts the advertisement delivery order request based on the determination result of the determination unit.

  • Pub Date: 2013/02/12
  • Number: 09508088
  • Owner: YAHOO JAPAN CORPORATION
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Advanced authentication techniques

A method, system, apparatus, and computer program product are provided for facilitating advanced authentication techniques. For example, a method is provided that includes receiving at least one request to access at least one resource and receiving at least one composite authentication credential, the composite authentication credential comprising a first credential component and a second credential component. The method further includes determining whether the first credential component is valid, determining whether the second credential component is valid and, in an instance in which it is determined that the first and second credential components are valid, causing access to the at least one resource to be permitted.

  • Pub Date: 2013/02/12
  • Number: 09258301
  • Owner: AirWatch LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Video processing systems and methods

A smart camera system is disclosed. The camera can work with cloud data storage systems and compute cloud. A call center can access the cloud to provide security monitoring services.

  • Pub Date: 2013/29/11
  • Number: 09456131
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for determining a geo-location correction-offset

An approach is provided to process communication information for determining a possible correction-offset to location information of a user. A location verification platform may process and/or facilitate a processing of communication information associated with at least one user device. The location verification platform may also determine a current geo-location of the at least one user device based, at least in part, on the communication information. Further, the location verification platform may determine an accuracy of the current geo-location based, at least in part, on a comparison of the current geo-location with contextual location information associated with the current geo-location. Furthermore, the location verification platform may determine a correction-offset to the current geo-location based, at least in part, on an accuracy threshold.

  • Pub Date: 2013/29/11
  • Number: 09426769
  • Owner: HERE GLOBAL B.V.
  • Location: Veldhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to facilitate online transactions

Systems and methods are provided to facilitate online transactions via mobile communications. In one aspect, a system includes a communication interface to receive an input from a merchant; a plurality of converters to interface with a plurality of controllers for delivery of premium messages sent by the system to collect funds for purchases made by customers; and a common format processor coupled with the plurality of converters to send the premium messages. The common format processor determines a combination of one or more premium messages, in response to a first customer making a first purchase from the merchant at a first price. The total price of the one or more premium messages is based on the first price and a portion of service charges associated with the one or more premium messages, where the portion is specified by the input received via the interface.

  • Pub Date: 2013/27/11
  • Number: 09135616
  • Owner: Boku, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for multi resolution and multi temporal image search

A system for modular image mining and search, comprising a plurality of image capture devices, a search engine, an indexing engine, a database, and user interface software. A plurality of image capture devices capture images and store them to a database. The indexing engine indexes images to create image data for each image with associated metadata and stores the information to the database. The interface software is used to request search queries via a search engine. The search engine accesses the image data to find images or parts of images that satisfy the search query.

  • Pub Date: 2013/27/11
  • Number: 09529824
  • Owner: DigitalGlobe, Inc.
  • Location: Longmont, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for displaying multiple applications

Systems, methods, and computer program products for displaying multiple applications on a graphical user interface (“GUI”) are provided. An application control system (“ACS”) may determine which applications should be displayed, and ACS may determine an optimal layout for the application on the GUI. ACS may move and/or resize the applications and automatically determine an optimal layout such that the applications substantially fill a portion of the GUI. Additionally, ACS may facilitate communication between the applications using an application programming interface (“API”). An application may obtain information from any other application on the GUI by transmitting requests via the API.

  • Pub Date: 2013/27/11
  • Number: 09495881
  • Owner: Edsense, L.L.C.
  • Location: Superior, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for conditionally updating an item with attribute granularity

A system that implements a scaleable data storage service may maintain tables in a non-relational data store on behalf of clients. Each table may include multiple items. Each item may include one or more attributes, each containing a name-value pair. Attribute values may be scalars or sets of numbers or strings. The system may provide an API usable to request that values of one or more of an item's attributes be updated. An update request may be conditional on expected values of one or more item attributes (e.g., the same or different item attributes). In response to a request to update the values of one or more item attributes, the previous values and/or updated values may be optionally returned for the updated item attributes or for all attributes of an item targeted by an update request. Items stored in tables may be indexed using a simple or composite primary key.

  • Pub Date: 2013/27/11
  • Number: 09507818
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for cleaning noisy genetic data from target individuals using genetic data from genetically related individuals

A system and method for determining the genetic data for one or a small set of cells, or from fragmentary DNA, where a limited quantity of genetic data is available, are disclosed. Genetic data for the target individual is acquired and amplified using known methods, and poorly measured base pairs, missing alleles and missing regions are reconstructed using expected similarities between the target genome and the genome of genetically related subjects. In accordance with one embodiment of the invention incomplete genetic data is acquired from embryonic cells, fetal cells, or cell-free fetal DNA isolated from the mother's blood, and the incomplete genetic data is reconstructed using the more complete genetic data from a larger sample diploid cells from one or both parents, with or without genetic data from haploid cells from one or both parents, and/or genetic data taken from other related individuals.

  • Pub Date: 2013/27/11
  • Number: 09430611
  • Owner: Natera, Inc.
  • Location: San Carlos, US
  • Details: Visit USPTO

Visit USPTO Page


Smart hierarchical cache using HTML5 storage APIs

A method of caching resources corresponding to a webpage on a client is disclosed. A hierarchy of a plurality of storage mechanisms available on the client is determined based at least in part on performance of the plurality of storage mechanisms. The hierarchy comprises a plurality of levels to which each storage mechanism may be assigned. A request to cache a first resource corresponding to a webpage is received. One of the plurality of storage mechanisms for caching the first resource is selected based at least in part on the hierarchy. The first resource is stored in the selected storage mechanism of the hierarchy.

  • Pub Date: 2013/27/11
  • Number: 09531829
  • Owner: Instart Logic, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Self-single sign-on

Techniques are described for providing sign-on within a trusted environment across multiple application servers. For example, a method can be provided for a single sign-on within a trusted environment across application servers. The method comprises, by a first application operating within the trusted environment, connecting to a first application server via a first access channel, and retrieving an authentication token from the first application server via the first access channel. The method further comprises, by a second application operating within the trusted environment, connecting to a second application server via a second access channel, and authenticating with the second application server with the authentication token.

  • Pub Date: 2013/27/11
  • Number: 09124575
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Sampling based runtime optimizer for efficient debugging of applications

A method of reproducing runtime environment for debugging an application is disclosed. The method includes accessing an optimizer file from a non-volatile storage medium. The optimizer file includes a runtime environment, application definition information, and a log. The log includes summaries of a plurality of events, the plurality of actions, and a time mark of occurrence for each of the plurality of actions. A runtime environment for debugging the application is then defined and the application runtime is set up using the application definition information in the optimizer file. Further, the method includes running the application and attaching an optimizer, then triggering each of the plurality of actions to occur at each time mark of occurrence associated with the each of the plurality of actions, and analyzing each of the plurality of actions and the plurality of events associated with the each of the plurality of actions, the analyzing includes comparing the events produced by running the application with the plurality of events in the optimizer file. If a fault is produced by the triggering, a debugger is invoked to analyze the fault.

  • Pub Date: 2013/27/11
  • Number: 09146831
  • Owner: Oracle America, Inc.
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for measuring carcinoembryonic antigen

Disclosed herein are methods of accurately measuring carcinoembryonic antigen in a biological sample and methods of identifying and treating a mucinous cyst in a subject.

  • Pub Date: 2013/27/11
  • Number: 09341628
  • Owner: INTERPACE DIAGNOSTICS CORPORATION
  • Location: Parsippany, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for distributed load balancing

Load balancing includes receiving, from a client, a connection request to establish a connection with a server; determining load balancing state information based at least in part on the connection request; synchronizing the determined load balancing state information across a plurality of service engines, including to invoke an atomic read-miss-create (RMC) function on a distributed data store service; and distributing the connection to a selected server among a plurality of servers according to a result of the RMC function.

  • Pub Date: 2013/27/11
  • Number: 09407692
  • Owner: Avi Networks
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for communicating financial news

A system and software-implemented method for reporting financial market news and events. Machine-readable extracted data is reformulated in content and format to provide a more efficient display and understanding of the relevance of news and events to the end user. Audio and/or graphic indicators are added to further promote efficient understanding of the delivered news or event message.

  • Pub Date: 2013/27/11
  • Number: 09135662
  • Owner: Algo Innovations, LLC
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for processing digital service signal

A digital service signal apparatus is disclosed. The digital service signal apparatus includes a receiving module receiving signaling information having channel information for an application from the digital service signal, a generating module generating a request using the channel information, a sending module sending the generated request, a downloading module downloading the application, an executing module configured to execute the API related to the application and a registering module configured to register the specific key set according to the mode number.

  • Pub Date: 2013/27/11
  • Number: 09319743
  • Owner: LG ELECTRONICS INC.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Irrigation system with ET based seasonal watering adjustment and soil moisture sensor shutoff

An irrigation system includes at least one environmental sensor, such as a solar radiation sensor that is installed on an irrigation site, and a soil moisture sensor that is also installed on the irrigation site. Programming allows an estimated ET value to be calculated based at least in part on the output signal of the environmental sensor. A pre-programmed watering schedule is automatically modified based on the estimated ET value to thereby conserve water while maintaining the health of plants on the irrigation site. The system automatically inhibits irrigation when an output signal of the soil moisture sensor indicates an amount of moisture in the soil is above a predetermined threshold.

  • Pub Date: 2013/27/11
  • Number: 08924032
  • Owner: Hunter Industries, Inc.
  • Location: San Marcos, US
  • Details: Visit USPTO

Visit USPTO Page


IPA as a therapeutic agent and a biomarker for disease risk for Huntington's disease

Indole-3-propionic acid as a marker and for treatment for Huntington Disease.

  • Pub Date: 2013/27/11
  • Number: 09603837
  • Owner: IXCELA, INC.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Internet data mining method and system

A method for automatically acquiring a set of data opens a searchable Internet database; initiates an automated timed search of each one of a plurality of records, each record in the plurality of record includes common criteria with the other records; retrieves information associated with the searched record; and provides the retrieved information in a desired format.

  • Pub Date: 2013/27/11
  • Number: 09122728
  • Details: Visit USPTO

Visit USPTO Page


Hydroxytyrosol and oleuropein compositions for induction of DNA damage, cell death and LSD1 inhibition

Compositions comprising hydroxytyrosol-containing formulations and treatment regiments comprising hydroxytyrosol and/or oleuropein and chemotherapeutic agents are disclosed. Compositions and/or regiments may optionally include the administration of vitamins, minerals, and anti-oxidants. Methods for using these compositions and treatment regimens for treating subjects for diseases, such as a malignancy, and for inducing or enhancing angiogenesis, treating or preventing oxidative stress, for treating or preventing high glucose-induced dysfunction, treating or preventing chemotherapy-induced dysfunction, and for improving cell viability are provided. Various methods for use of the hydroxytyrosol compositions for inhibition of lysine specific demethylase 1 (LSD1) in various cancers are also provided.

  • Pub Date: 2013/27/11
  • Number: 09144555
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical, self-describing function objects

A self-describing function object may be dynamically created based on a set of user provided parameters. In an implementation, a device may receive a request to create the function object based on one or more parameters and determine a number of ordered and hierarchical operations that correspond to the function object. The device may determine textual descriptions corresponding to what is performed by at least one of the ordered and hierarchical operations. The device may output documentation of the ordered and hierarchical operations included in the function object, the documentation including the textual descriptions arranged based on the determined order of the plurality of ordered and hierarchical operations.

  • Pub Date: 2013/27/11
  • Number: 09348584
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Feedback service

Concepts and technologies are disclosed herein for providing and interacting with a feedback service. A processor such as a computing system or a server computer can execute a feedback service. The feedback service can detect activity associated with an item at a user device. The item can be an item for sale and the activity can relate to a purchase of the item. The feedback service can generate a social networking post relating to the item. The social networking post can include a visual representation of the item and a solicitation for feedback from a social network. The feedback service can provide feedback relating to the social networking post. The feedback can include an opinion relating to the item and demographic information relating to an entity that provided the opinion. The feedback service can provide the feedback to the user device and/or other entities.

  • Pub Date: 2013/27/11
  • Number: 09595055
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Direct interaction between a user and a communication network

A mechanism is provided for direct interaction between an individual and a communication network. Captured data is received of the individual in an environment to be analyzed by a network management computer. The data is captured by network sensors. The network management computer determines that the individual is a subscriber to services of the communication network by identifying the subscriber from the data that has been captured. The subscriber is registered with a network carrier that operates and provides the services on the communication network. The data is obtained without assistance from a subscriber owned device providing the data. The data is analyzed to interpret commands when presented by the subscriber via the network sensors. The commands include gesture commands from the subscriber. An action is performed for the subscriber based on the commands.

  • Pub Date: 2013/27/11
  • Number: 09451434
  • Owner: AT&T INTELLECTUAL PROPERTY I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Data storage based on content popularity

Methods, systems, and software for operating a data storage system of a content delivery node are provided herein. In one example, a method of operating a data storage system of a content delivery node is presented. The method includes receiving content data into a storage system, storing the content data in a first storage space, determining popular content data within the content data based on at least user requests for the content data, and storing the popular content data in a second storage space.

  • Pub Date: 2013/27/11
  • Number: 09491253
  • Owner: Fastly, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Customization of an immersive environment

A computing device includes an immersive environment module for facilitating simultaneous display of a plurality of applications on a display device without relying on system chrome. At least a first of the applications is displayed in a primary region of the display. The computing device also includes a UI management component for enabling a user selection of an application for simultaneous display on the display device with at least one other application. Processing logic is configured to determine a size in at least one direction of content of a user-selected application as it is displayed on a non-primary region of the display device simultaneous with display of content of the first application on the primary region of the display device. The determination is based at least in part on one or more pre-defined size requirements specified by the selected application.

  • Pub Date: 2013/27/11
  • Number: 09430130
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Cross-enterprise workflow

Example systems, methods and storage media to provide a cross-enterprise workflow among clinical systems are disclosed. An example cross-enterprise enabled clinical information system includes a workflow manager to coordinate user workflows with respect to the system and associated content. The system includes an image services manager configured to manage images and associated services for the system and associated content. The workflow manager and image services manager are configured for cross-enterprise content sharing such that the system is to locally authenticate a user at the system and the system is to locally authorize a remote request for access to content at the system from a remote user that has been authenticated remotely. The system is arranged to provide content in response to the remote request after the remote authentication has been received and the system has verified the remote user's authorization for access.

  • Pub Date: 2013/27/11
  • Number: 09276938
  • Owner: General Electric Company
  • Location: Schenectady, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for processing an interactive service

A method of processing a digital service signal and an apparatus thereof are disclosed. The present invention includes executing a primary application for the digital service signal, wherein the primary application is a triggered application or a non-triggered application, transmitting messages of interactive services for a secondary application associated with the primary application, wherein the interactive services includes a first mode related to the triggered application or a second mode related to the non-triggered application, receiving a request for descriptions identifying the interactive services, transmitting the descriptions having service id information identifying each of the interactive services and service type information indicating a type of the each of the interactive services, and providing the interactive services by transmitting information for the interactive services.

  • Pub Date: 2013/27/11
  • Number: 09516384
  • Owner: LG ELECTRONICS INC.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Adapting legacy endpoints to modern APIs

Example methods and systems are directed to adapting legacy endpoints to modern application protocol interfaces (APIs). A legacy endpoint may provide a powerful and complex API. A modern application may desire access to the legacy endpoint. One or more layers may be added between the modern application and the legacy endpoint. Each layer may provide a different API. These layers of APIs may transform the interface from a powerful and complex interface to a more limited but simpler and easier to use interface. In some example embodiments, a proxy layer, an adapter layer, a facade layer, and a service layer may be used.

  • Pub Date: 2013/27/11
  • Number: 09380103
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Wearable transdermal electrical stimulation devices and methods of using them

Described herein are devices, systems, and methods for transdermal electrical stimulation. Devices described herein can include self-contained, lightweight, and wearable components. The devices include a primary unit including a first transdermal electrode and a secondary unit including a second transdermal electrode. The device can be capable of wireless communication. The primary unit and secondary unit are placed at two locations on the skin of a user, for example on the head or neck of a user. The first and second transdermal electrodes are electrically connected. Electrical stimulation is driven between the two electrodes. The electrical stimulation induces a cognitive effect in a user of the device.

  • Pub Date: 2013/26/11
  • Number: 08903494
  • Owner: thync, inc.
  • Location: Los Gatos, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for authorizing and monetizing a telephone call

A system and method of authorizing and monetizing a telephone communication such as a voice call is disclosed. The calling party may be in a controlled environment such as a prison or hospital; the called party is using a mobile telephone device. The call is facilitated by a service provider such as a connect service provider. The call is monetized by a message service charge billed to an account associated with the mobile telephone device. The call is facilitated as a voice call if there is authorization both for a charge for message service to the mobile telephone device and for the call from the calling party. The system is implemented with a system may use a message service communication protocol for the message and billing charge. computer-based system in operation with the interactive voice response system. Revenue from monetization of the call may be shared between service providers.

  • Pub Date: 2013/26/11
  • Number: 09037110
  • Owner: Securus Technologies, Inc.
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


System and apparatus for accessing a multiphysics modeling system via a design system user interface

Systems and methods for controlling settings of a design system include receiving, via a communications interface, identifying data associated with a multiphysics modeling system. Instructions are transmitted via the communication interface or another interface. The instructions include model settings related to a multiphysics model at least partially residing in the multiphysics modeling system. Model results are received that are at least partially derived from the transmitted model settings. At least a portion of the received model results are displayed in a graphical user interface associated with the design system.

  • Pub Date: 2013/26/11
  • Number: 08949089
  • Owner: Comsol AB
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Smoothed activity signals for suggestion ranking

Relevant geospatial data is provided to a portable device. In particular, several activity detection results collected over a period of time, spanning several time intervals, are received, where each activity detection result provides an estimate of the portable device activity, and where the activity detection results indicate at least two different activities. A single predominant activity of the portable device is determined using the activity detection results. Based on the predominant activity, geospatial data is selected and then provided to the portable device.

  • Pub Date: 2013/26/11
  • Number: 09532176
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Smart caregiver platform methods, apparatuses and media

A SCGP may provide a smart location guide (e.g., via GPS) to help keep the user from wandering off and getting lost. The SCGP may help the user travel independently via bus, car, and on foot. The SCGP may also notify the caregiver if the user wanders off or gets lost and may generate reports (e.g., via text, charts, graphs) showing the caregiver situations in which the user is likely to wander off or get lost. The SCGP may facilitate staying in touch with the user by allowing the caregiver to send the user reminders and important information, and to share pictures, videos, text messages, and voice messages with the user.

  • Pub Date: 2013/26/11
  • Number: 09142116
  • Details: Visit USPTO

Visit USPTO Page


Smart building manager

A building manager includes a communications interface configured to receive information from a smart energy grid. The building manager further includes an integrated control layer configured to receive inputs from and to provide outputs to a plurality of building subsystems. The integrated control layer includes a plurality of control algorithm modules configured to process the inputs and to determine the outputs. The building manager further includes a fault detection and diagnostics layer configured to use statistical analysis on the inputs received from the integrated control layer to detect and diagnose faults. The building manager yet further includes a demand response layer configured to process the information received from the smart energy grid to determine adjustments to the plurality of control algorithms of the integrated control layer.

  • Pub Date: 2013/26/11
  • Number: 09429927
  • Owner: Johnson Controls Technology Company
  • Location: Plymouth, US
  • Details: Visit USPTO

Visit USPTO Page


Secure input to a computing device

A computing device senses speech or other user input. One or more physical variable pertaining to a user of the computing device are also sensed, and respective signals are analyzed or compared to the user input. The analysis determines if the user input is likely that of an authorized user, and assigns a confidence metric to that determination. The computing device may then perform actions corresponding to the speech or user input content in accordance with the determination.

  • Pub Date: 2013/26/11
  • Number: 09257133
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Pump compatibility test

A testing device (), an infusion pump or another medical device function testing method, to an anesthesia apparatus or respirator (AB) and to a computer program product are provided for testing the function of an infusion pump (G). The testing device () is preferably implemented on the anesthesia apparatus or respirator (AB) and comprises a memory (MEM), a test module (T) and a controller (C). The test module (T) sends a test command () to the infusion pump (FG), which sends a response () back to the controller (C) after execution of the command. The control (C) can then compare the response () received with a reference response (′) for agreement in order to send a successful function test result.

  • Pub Date: 2013/26/11
  • Number: 09623176
  • Owner: Drägerwerk AG & Co. KGaA
  • Location: Lübeck, DE
  • Details: Visit USPTO

Visit USPTO Page


Pre-identifying probable malicious rootkit behavior using behavioral contracts

The various aspects provide for a computing device and methods implemented by the device to ensure that an application executing on the device and seeking root access will not cause malicious behavior while after receiving root access. Before giving the application root access, the computing device may identify operations the application intends to execute while having root access, determine whether executing the operations will cause malicious behavior by simulating execution of the operations, and pre-approve those operations after determining that executing those operations will not result in malicious behavior. Further, after giving the application root access, the computing device may only allow the application to perform pre-approved operations by quickly checking the application's pending operations against the pre-approved operations before allowing the application to perform those operations. Thus, the various aspects may ensure that an application receives root access without compromising the performance or security integrity of the computing device.

  • Pub Date: 2013/26/11
  • Number: 09323929
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


N-phase phase and polarity encoded serial interface

System, methods and apparatus are described that facilitate transmission of data, particularly between two devices within an electronic apparatus. Information is transmitted in N-phase polarity encoded symbols. Data is encoded in multi-bit symbols, and the multi-bit symbols are transmitted on a plurality of connectors. The multi-bit symbols may be transmitted by mapping the symbols to a sequence of states of the plurality of connectors, and driving the connectors in accordance with the sequence of states. The timing of the sequence of states is determinable at a receiver at each transition between sequential states. The state of each connector may be defined by polarity and direction of rotation of a multi-phase signal transmitted on the each connector.

  • Pub Date: 2013/26/11
  • Number: 09231790
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Lightweight directory access protocol (LDAP) join search mechanism

Complex search tasks are performed relative to an LDAP directory with a minimal quantity of LDAP search operations. Search tasks that follow relationships between LDAP entries can be performed, even under circumstances in which those relationships are not represented by the hierarchical structure of the LDAP directory. A client application can specify an LDAP control that the client application sends to the LDAP server along with the LDAP search operation. The LDAP server's receipt of the LDAP control can cause the LDAP server to modify the behavior of the search operation so that the LDAP server follows potentially non-hierarchical specified relationships between the LDAP entries in determining the set of entries to return as results of the search operation. As a result, the LDAP server can return a complete set of related result entries to the client application in response to a single LDAP search operation directed by the application.

  • Pub Date: 2013/26/11
  • Number: 09608958
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent data source selection in application development

A method, system, and computer program product for amorphous data preparation for intelligent data source selection in application development are provided in the illustrative embodiments. A set of keywords is selected from a code portion of a source code. Using a subset of the set of keywords, an expected circumstance is determined, the expected circumstance being a circumstance relevant to a purpose of the source code. From a set of data sources, a data source is identified, wherein the data source provides information usable in the expected circumstance. A manner of accessing the information from the data source is identified. Pseudo-code is constructed to implement the manner of accessing the information from the data source. A weight is assigned to the data source based upon a type of input used for selecting the pseudo-code, wherein the selecting uses the pseudo-code in the source code.

  • Pub Date: 2013/26/11
  • Number: 09195440
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying and providing physical social actions to a social networking system

Physical social actions are conveniently detected, characterized, and provided to a social networking system. This improves the user experience of the social networking system by more thoroughly recording the social actions of users occurring outside a social graph. This has the effect of extending an open social graph, which typically refers to social actions taken outside the social networking system but within a computer network, to physical social actions. By providing characterized physical social actions to the social networking system, the open social graph is extended to include physical social actions.

  • Pub Date: 2013/26/11
  • Number: 09621602
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Extended trusted security zone radio modem

A cellular wireless modem. The cellular wireless modem comprises a cellular radio transceiver, a short range communication interface, a processor, wherein the processor comprises a trusted security zone, a memory, wherein the memory stores an input forwarding application, and a trusted security zone extension application stored in the memory. When executed by the processor, the extension application provisions the input forwarding application to an intelligent appliance via the short range communication interface, receives input from the input forwarding application executing on the intelligent appliance via the short range communication interface, and transmits a message based on the input via the cellular radio transceiver.

  • Pub Date: 2013/26/11
  • Number: 09210576
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Engine health monitoring and power allocation control for a turbine engine using electric generators

A control for a turbine engine using electrical machines monitors engine health and allocates power extraction between the electrical machines.

  • Pub Date: 2013/26/11
  • Number: 09593591
  • Owner: Rolls-Royce North American Technologies, Inc.
  • Location: Indianapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Enforcing policy-based application and access control in an information management system

A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

  • Pub Date: 2013/26/11
  • Number: 08959580
  • Owner: NextLabs, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Cross-platform application framework

One set of instructions is generated in part by compiling application-specific source code. When natively executed on a platform provided by a device, the set of instructions provides an application. Another set of instructions is generated in part by compiling the same business logic source code. When natively executed on another platform provided by another device, the other set of instructions provides the same application. The business logic source code is substantially free of code specific to any platform. Moreover, the business logic source code defines substantially all application-specific functionality of the application.

  • Pub Date: 2013/26/11
  • Number: 09218175
  • Owner: ZIH CORP.
  • Location: Lincolnshire, US
  • Details: Visit USPTO

Visit USPTO Page


Content filtering for personal productivity applications

A set of context profiles containing profile content rules for filtering which content within a set of personal productivity applications (such as e-mail, chat, calendar, and contacts applications) is accessible by a user. Content rules support filtering content by, for example, content originator, and/or subject matter. The context profiles are centrally maintained for control of integrated, non-integrated, and/or independently administered personal productivity applications.

  • Pub Date: 2013/26/11
  • Number: 09213772
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Conducting transactions between a vendor and a customer using text messages

The illustrative embodiments described herein provide systems and methods for conducting transactions with a customer using text messages. In one embodiment, a method includes receiving a first text message from a mobile communication device associated with a customer. The first text message includes a request from the customer to receive one or more text messages from a vendor. The method also includes adding the customer to a set of consenting customers in a customer database in response to receiving the first text message. The set of consenting customer including customers that consent to receiving text messages from the vendor. The method also includes sending a second text message to the mobile communication device. The second text message is associated with a service offered by the vendor.

  • Pub Date: 2013/26/11
  • Number: 08839311
  • Owner: West Corporation
  • Location: Omaha, US
  • Details: Visit USPTO

Visit USPTO Page


Compact microbeam radiation therapy systems and methods for cancer treatment and research

The present subject matter relates to compact, non-synchrotron microbeam radiation therapy (MRT) systems and methods for cancer research and treatment based on a carbon nanotube distributed x-ray source array technology. The systems and methods can deliver microscopically discrete x-ray radiation at peak dose rate of 10 Gy per second or higher. The x-ray radiation can be provided by a spatially distributed x-ray source array. The technology can be used, for example and without limitation, for human cancer treatment, for intra-operative radiation therapy, and for pre-clinical cancer research on animal cancer models.

  • Pub Date: 2013/26/11
  • Number: 08995608
  • Owner: The University of North Carolina at Chapel Hill
  • Location: Chapel Hill, US
  • Details: Visit USPTO

Visit USPTO Page


Automated apparent responses

Software at a massively multiplayer online (MMO) game website receives a request for assistance with a game task from a first player of a MMO game. The software transmits the request to a second player of the MMO game who is associated with the first player through a relationship recognized by the MMO game. The software determines whether the second player responds to the request within a time period. The time period depends on one or more factors related to game mechanics and to user data for the first player. Then if the second player does not respond within the time period and the game task is a game task whose completion can be assigned without the assistance of another player, the software assigns completion of the game task to the first player and transmits an automated apparent response to the first player.

  • Pub Date: 2013/26/11
  • Number: 09272212
  • Owner: Zynga Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and/or methods for intelligently detecting API key domains

Certain example embodiments described herein relate to an application programming interface (API) management system and/or method that automatically detects API domains, e.g., by analyzing consumer registration and runtime data, while also allowing API providers to provide approval for proposed detected domains and/or continued governance. The technology set forth herein not only provides an automatic detection mechanism, but also provides the capability of full management/control, while also allowing API producers to dynamically expand or otherwise modify their API domain offerings based on usage, etc. This dynamic process can be fully or partially automated and is efficient.

  • Pub Date: 2013/25/11
  • Number: 08793359
  • Owner: Software AG
  • Location: Darmstadt, DE
  • Details: Visit USPTO

Visit USPTO Page


System, method, apparatus, and computer program product for determining a configuration of a converged infrastructure

A system, method, apparatus, and computer program product for determining a configuration of a converged infrastructure are disclosed. A method may include performing a scan of network addresses for components of the converged infrastructure. The method may further include capturing fingerprints of components discovered by the scan. The method may additionally include identifying the components discovered by the scan based at least in part on a comparison between each captured fingerprint and one or more known component fingerprints in a fingerprint library, which may include a set of known component fingerprints and associated component identities. The method may further include accessing at least one identified component. The method may also include determining a component configuration of each of at least one accessed component.

  • Pub Date: 2013/25/11
  • Number: 09485145
  • Owner: VCE Company, LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program product for server side processing in a mobile device environment

Described herein are systems, methods, computer program products, and combinations and sub-combinations thereof, for enabling web content (as well as other objects) to be loaded on mobile devices (as well as other types of devices), and for users of mobile devices to operate with such web content on their mobile devices in an interactive manner while in an off-line mode.

  • Pub Date: 2013/25/11
  • Number: 09456048
  • Owner: IANYWHERE SOLUTIONS, INC.
  • Location: Dublin, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and apparatus for controlling multiple applications and services on a digital electronic device

A services and application controller (“SAC”) is provided for digital electronic devices. The SAC includes four interfaces which respectively interact with four different environments, namely an application interface that interacts with application environments and applications, an extension interface that interacts with engines and enablers, a platform interface that interacts with device platform environments, and a service and network interface that interacts with services and service infrastructures and with networks. The SAC provides a set of core functions and abstracts the environments from each other, which enable interactions between these environments without requiring that the environments be aware of specific aspects of the other environments for the interactions.

  • Pub Date: 2013/25/11
  • Number: 09348409
  • Owner: ECRIO, INC.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of measuring a social networker's influence on social networking websites

The present disclosure relates generally to a computer application software program for mobile phones, and more specifically to an application program related to social networking websites wherein an individual's influence on social networking websites can be quantified based on his/her quantitative and qualitative activity postings. A social networker may register any one or more social networking websites for which he/she is a participant and the system and method discussed herein will measure all activity postings, responses, replies, discussions, third party use of the original activity postings and the like, to generate weighted scores that are aggregated for an impact score that is reflective of the social networkers respective influence.

  • Pub Date: 2013/25/11
  • Number: 09262722
  • Details: Visit USPTO

Visit USPTO Page


System and method for implementing a scalable data storage service

A system that implements a scalable data storage service may maintain tables in a non-relational data store on behalf of clients. The system may provide a Web services interface through which service requests are received, and an API usable to request that a table be created, deleted, or described; that an item be stored, retrieved, deleted, or its attributes modified; or that a table be queried (or scanned) with filtered items and/or their attributes returned. An asynchronous workflow may be invoked to create or delete a table. Items stored in tables may be partitioned and indexed using a simple or composite primary key. The system may not impose pre-defined limits on table size, and may employ a flexible schema. The service may provide a best-effort or committed throughput model. The system may automatically scale and/or re-partition tables in response to detecting workload changes, node failures, or other conditions or anomalies.

  • Pub Date: 2013/25/11
  • Number: 08918435
  • Owner: Amazon Technology, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for generating, accessing, and updating geofeeds

A system and method for generating a geofeed is provided. A geofeed includes a collection of content, aggregated from various content providers, that is relevant to one or more geographically definable locations. The generated content may include, for example, video, audio, images, text, hyperlinks, and/or other content that may be relevant to a geographically definable location. The content providers may include, for example, social media platforms, online knowledge databases, individual content creators, and/or other providers that can distribute content that may be relevant to a geographically definable location. The geographically definable location may be specified by a boundary, geo coordinates, an address, a place name, a point of interest, a zip code, and/or other information that can spatially identify an area. The geofeed may be presented via an interface that spatially arranges the content according to a geo-location related to the content and/or for integration with other data collection systems.

  • Pub Date: 2013/25/11
  • Number: 09055074
  • Owner: GEOFEEDIA, INC.
  • Location: Naples, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for data loss prevention across heterogeneous communications platforms

In one embodiment, a method includes activating a cross-platform DLP policy for enforcement against a plurality of users on each of a plurality of heterogeneous communications platforms. The method further includes monitoring communications of the plurality of users on each of the plurality of communications platforms for violations of the cross-platform DLP policy. The method also includes, responsive to a detected violation of the cross-platform DLP policy by at least one user on at least one communications platform, dynamically acquiring context information for the detected violation using information associated with the detected violation. In addition, the method includes publishing violation information to one or more designated users. The violation information includes at least a portion of the information associated with the detected violation and at least a portion of the context information.

  • Pub Date: 2013/25/11
  • Number: 09578060
  • Owner: Dell Software Inc.
  • Location: Aliso Viejo, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for a security asset manager

Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.

  • Pub Date: 2013/25/11
  • Number: 09191409
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Stateful reference monitor

A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The reference monitor maintains an updateable storage area whose contents can be used to affect access decisions, and access decisions can be based on arbitrary properties of the request.

  • Pub Date: 2013/25/11
  • Number: 09141812
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and articles of manufacture for hosting a safety critical application on an uncontrolled data processing device

Methods and articles of manufacture for hosting a safety critical application on an uncontrolled data processing device are provided. Various combinations of installation, functional, host integrity, coexistence, interoperability, power management, and environment checks are performed at various times to determine if the safety critical application operates properly on the device. The operation of the SCA on the UDPD may be controlled accordingly.

  • Pub Date: 2013/25/11
  • Number: 09058431
  • Owner: Abbott Diabetes Care Inc.
  • Location: Alameda, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to reduce signaling power

System, methods and apparatus are described that reduce the power consumed by a multi-level encoded communications link. In one example, different logic states of a 4-level pulse amplitude modulation encoded transmission consume greater power than other logic states. The fraction of primary bits in a first logic state in multi-bit data symbols may determine whether the primary bits are inverted prior to transmission. The fraction of secondary bits in the first logic state in the multi-bit data symbols may determine whether the secondary bits are inverted prior to transmission. The primary bits may be swapped with the secondary bits is more secondary bits are in the first logic state than primary bits in the first logic state.

  • Pub Date: 2013/25/11
  • Number: 09172567
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Locating user device using beacon signal

A misplaced user device deactivates processors and other resources so as to conserve residual battery power, while a radio frequency (RF) circuit remains active. The RF circuit transmits a beacon signal at time intervals to aid a user in locating and recovery of the misplaced user device by way of another user device operating in search mode. Information regarding the identity or other characteristics of the misplaced user device may be encoded in the beacon signal to assist in the search. The misplaced user device may modify the beacon signaling RF power, time intervals, information, or other parameters in response to an acknowledgement signal received from the searching user device.

  • Pub Date: 2013/25/11
  • Number: 09532312
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid application message passing

In general, techniques for passing data from a native component to a web component of a hybrid application without reflowing the top-level document are described. The native component is located within a user space of a computing device and intercepts a request for a resource issued by the web component of the application. The native component provides access to an interface not otherwise accessible by the web component. If the request for the resource is a request for data through the interface, the native component enqueues the request in a request pool, receives the data responsive to the request through the interface, forms a response to the request using the data, dequeues the request after receiving the data, and sending, the response to the web component. If not, the native component grants permission to the web component to issue the request to a remote server.

  • Pub Date: 2013/25/11
  • Number: 09215189
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Fluid circuit for bale ejection

A hydraulic circuit mechanically link to a tailgate of an agriculture harvester. The hydraulic circuit of the present invention can be used to facilitate the transition of hydraulic states from a quick speed to a slow speed, when opening and closing the tailgate. The hydraulic circuit comprises a restrictive orifice and a fluid stop valve that, when opened, diverts the path of pressurized fluid away from a hydraulic actuator during the actuator's extension. The diversion of pressurized fluid away from the hydraulic cylinder or through the restrictive orifice substantially reduces the speed at which the panel opens or closes.

  • Pub Date: 2013/25/11
  • Number: 09107348
  • Owner: CNH Industrial America LLC
  • Location: New Holland, US
  • Details: Visit USPTO

Visit USPTO Page


Failover and recovery for replicated data instances

Replicated instances in a database environment provide for automatic failover and recovery. A monitoring component can periodically communicate with a primary and a secondary replica for an instance, with each capable of residing in a separate data zone or geographic location to provide a level of reliability and availability. A database running on the primary instance can have information synchronously replicated to the secondary replica at a block level, such that the primary and secondary replicas are in sync. In the event that the monitoring component is not able to communicate with one of the replicas, the monitoring component can attempt to determine whether those replicas can communicate with each other, as well as whether the replicas have the same data generation version. Depending on the state information, the monitoring component can automatically perform a recovery operation, such as to failover to the secondary replica or perform secondary replica recovery.

  • Pub Date: 2013/25/11
  • Number: 09298728
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Enabling synchronization with a difference unaware data source

A system and a method are disclosed for updating a master data list with data from a difference unaware information repository and a difference aware information repository. A master synchronization engine may synchronize to the difference unaware information repository and the difference aware information repository via connectors coupled to each information repository. The difference unaware information repository exports all the data stored within the repository to its respective connector. The connector determines the changes made to the data since the last synchronization and the changes are forwarded to the master synchronization engine. The difference aware information repository is capable of determining the changes made to the stored data since the last synchronization and forwards the changes to its connector. Each connector forwards the changes to the data in their respective information repositories to a database which updates the master data list.

  • Pub Date: 2013/25/11
  • Number: 09298762
  • Owner: Plaxo, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Digital security bubble

A digital security bubble encapsulation is disclosed. A first key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a second key. The second key is encrypted using the first key. The encrypted message, the encrypted second key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.

  • Pub Date: 2013/25/11
  • Number: 08954726
  • Owner: Wickr Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Customer-directed networking limits in distributed systems

Methods and apparatus for supporting customer-directed networking limits in distributed systems are disclosed. A client request is received via a programmatic interface, indicating a particular lower resource usage limit to be imposed on at least one category of network traffic at a particular instance of a network-accessible service. Resource usage metrics for one or more categories of network traffic at the particular instance are obtained. In response to a determination that resource usage at the particular instance has reached a threshold level, one or more responsive actions are initiated.

  • Pub Date: 2013/25/11
  • Number: 09647904
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Collaborative use and management of modular applications

A method for providing applications for use within collaborative documents includes storing, on a cloud computing service, a collaborative document accessible by a plurality of collaborators and a plurality of modular applications for a document editing application used by the plurality of collaborators to view the collaborative document, where the plurality of modular applications are usable within the collaborative document. The cloud computing service receives a request from a first collaborator in the plurality of collaborators to activate the use of a first modular application in the plurality of modular applications within the collaborative document, and activates the use of the first modular application within the collaborative document, where the first modular application executes on the cloud computing service and each of the plurality of collaborators may use the first modular application within the collaborative document.

  • Pub Date: 2013/25/11
  • Number: 09336209
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Assay for B-galactosidase activity

The invention is directed to an assay for acid β-galactosidase activity. The invention may include combining in oil a sample droplet with a 4-methylumbelliferyl-B-galactose to yield a reaction droplet; splitting the reaction droplet to yield a first daughter droplet and a second daughter droplet; combining the first daughter droplet with a stop buffer droplet to yield a first stopped reaction droplet; incubating the second daughter droplet; combining the second daughter droplet with a stop buffer droplet to yield a second stopped reaction droplet; and measuring 4-methylumbelliferone released in the first and second stopped reaction droplets.

  • Pub Date: 2013/25/11
  • Number: 09012165
  • Owner: Advanced Liquid Logic, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing interactive communications campaigns with call pacing

A Web-based hosted system through which business entities create and manage communications campaigns. The system carries out a communications campaign on behalf of a client. A campaign is a series of calls to a contact list using one or more sub-campaigns. A sub-campaign associates a list of contacts, a script, and a timeframe. An agent typically is a contact center operator. A skill group is a set of agents that are trained to handle a given script. Call pacing enhancements are implemented to allow simultaneous progress on multiple sub-campaigns under a skill group. The techniques enable control over the pacing of individual sub-campaigns when multiple sub-campaigns are running under a single skill group. The service also provides a framework by which a set of “pluggable” pacing models are provisioned and managed, preferably on a per-model basis.

  • Pub Date: 2013/23/11
  • Number: 09071688
  • Owner: SOUNDBITE COMMUNICATIONS, INC.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Managing interactive communications campaigns with customer recovery

A campaign strategy manager (CSM) component for a hosted communications campaign system allows users to define more granular and specific campaign strategies, including pass escalation for alternative channels (e.g., text and email) and/or based upon attempt results, contact attributes and response group data. The campaign strategy manager allows users to define pass strategies statically and dynamically, to manage lists across multiple campaigns, and to view results in real-time. A defined strategy is a static strategy created by a user for a particular campaign that, once created, typically is not modified. A dynamic strategy is one where, during the course of a day (e.g., as a sub-campaign is running), a user may alter the defined strategy, preferably just for that day (or portion thereof). The CSM may be used to implement a recovery strategy using a dialer pass.

  • Pub Date: 2013/23/11
  • Number: 09344570
  • Owner: SOUNDBITE COMMUNICATIONS, INC.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying video files of a video file storage system having relevance to a first file

Methods and systems for providing related video files in a video file storage system are disclosed. One method includes identifying a plurality of video files within the video file storage system, wherein the plurality of video files each have a relationship with the first file, wherein the video file storage system provides a platform for storing and sharing videos, and each video file includes a video and associated information. The method further includes generating, by a system server, a list of inquiries based on the plurality of video files, providing, by the system server, the list of inquiries to at least one creator of the first file, receiving from the at least one creator at least one response to the list of inquiries, selecting a subset of the plurality of video files based on the at least one response, and storing information related to the selected subset of the plurality of video files for access if the first file is selected.

  • Pub Date: 2013/23/11
  • Number: 09141629
  • Owner: Python4Fun, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Identification of files of a collaborative file storage system having relevance to a first file

Methods and systems for providing related files in a collaborative file storage system are disclosed. One method includes identifying a plurality of files within the collaborative file storage system, wherein the plurality of files each have a relationship with the first file, and wherein the collaborative file storage system allows sharing of the plurality of files between multiple users through a network. The method further includes generating, by a system server, a list of inquiries based on the plurality of files, providing, by the system server, the list of inquiries to at least one collaborator of the first file, receiving from the at least one collaborator at least one response to the list of inquiries, selecting a subset of the plurality of files based on the at least one response, and storing information related to the selected subset of the plurality of files for access if the first file is selected.

  • Pub Date: 2013/23/11
  • Number: 09110908
  • Owner: Python4Fun, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Video content protection

A method includes receiving, by a client device associated with a particular user, product details for video content including a purchase option identifier (ID) for the video content from a video service provider. The method includes requesting, by the client device based on a single sign on (SSO) protected call, a playback uniform resource locator (URL) for the video content from an orchestration layer associated with the video service provider. The method also includes receiving the playback URL, an entitlement ID associated with the particular user for the video content, and the encrypted content. The method includes obtaining a digital rights management (DRM) license for the encrypted content based on the entitlement ID, and decrypting and playing the video content based on DRM rules associated with the video content.

  • Pub Date: 2013/22/11
  • Number: 09258584
  • Owner: VERIZON PATENT AND LICENSING INC.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Unified services platform using a telephone number as a common subscriber identifier

A system and method for enabling the telephone number as a platform for the association of IP-enabled services with legacy telephone service. A unified services enabler platform may be utilized to associate a customer and their telephone number with a variety of services and applications from multiple different ecosystems. The customer can continue to use their existing telephone service and in addition can utilize new IP-enabled features that are associated with their telephone number as the common ID.

  • Pub Date: 2013/22/11
  • Number: 09210254
  • Owner: SHANGO CORP, LLC
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Therapeutic applications targeting SARM1

The present disclosure provides methods for reducing axonal and/or synaptic degradation in neurons by modulating sterile α/Armadillo/Toll-Interleukin receptor homology domain protein (SARM) activity and/or expression.

  • Pub Date: 2013/22/11
  • Number: 09486521
  • Owner: University of Miami
  • Location: Miami, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for negotiated takeover of storage objects

A system and method of negotiated takeover of storage objects includes one or more processors, a storage controller, and memory coupled to the one or more processors. The memory stores a data structure that includes information about a plurality of storage objects manageable by the storage controller. The storage controller is configured to assume, one by one, current ownership of a first subset of the storage objects and assume, concurrently, current ownership of a second subset of the storage objects. The first subset of storage objects and the second subset of storage objects are currently owned by a second storage server coupled to the storage server. In some embodiments, current ownership of the first subset of storage objects is transferred by iteratively detecting a particular storage object from the first subset of the storage objects whose current ownership can be assumed and bringing the particular storage object online.

  • Pub Date: 2013/22/11
  • Number: 09424301
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for deploying virtual servers in a hosting system

Some embodiments provide a method that, at a particular node of a hosting system that includes several nodes for hosting virtual machines, retrieves data representing a particular computer system from a storage. The data includes several sections and checksums for the sections. The method validates the sections by using the checksums. The method copies the sections of data onto a disk volume of the node that is allocated for a virtual machine in order to deploy the particular computer system. The method configures the particular computer system to operate as the virtual machine by configuring information specific to the particular instantiation of the particular computer system.

  • Pub Date: 2013/22/11
  • Number: 09507542
  • Owner: GOGRID, LLC
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Runtime memory throttling

A system that implements a memory management policy at runtime when receiving a syntax tree in response to initiating the compiling of software code identifies a plurality of calls within the syntax tree and modifies each the plurality of calls with a corresponding memory-modified call to create a plurality of memory-modified calls. Each memory-modified call is linked with a memory management class and the modifying occurs during the compiling of the software code. Following modification of each of the plurality of calls, the system compiles the plurality of memory-modified calls to generate a bytecode.

  • Pub Date: 2013/22/11
  • Number: 09213530
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Pose tracking pipeline

A method of tracking a subject includes receiving from a source a depth image of a scene including the subject. The depth image includes a depth for each of a plurality of pixels. The method further includes identifying pixels of the depth image that image the subject and deriving from the identified pixels of the depth image one or more machine readable data structures representing the subject as a model including a plurality of shapes.

  • Pub Date: 2013/22/11
  • Number: 08860663
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Peptide compositions and methods for treating patients

The present invention is directed to peptide compositions and methods of using the peptide compositions to treat prediabetes, diabetes, obesity, high blood pressure and metabolic syndrome.

  • Pub Date: 2013/22/11
  • Number: 09062093
  • Owner: THE REGENTS OF THE UNIVERSITY OF MICHIGAN
  • Location: Ann Arbor, US
  • Details: Visit USPTO

Visit USPTO Page


Mitigation of radio frequency interference (RFI) in global positioning system (GPS) signals

A technology is provided for reducing pulsed radio frequency interference. The GPS signal may be received at a GPS device. The GPS device may include a GPS receiver. The GPS signal may include a plurality of sign and magnitude bits. Pulsed RFI may be detected in the GPS signal based on samples of the magnitude bits in the GPS signal. The pulsed RFI received at the GPS receiver may be reduced by communicating a blank signal when the samples of the magnitude bits indicate the pulsed RFI.

  • Pub Date: 2013/22/11
  • Number: 09632183
  • Owner: Raytheon Company
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for enhanced application signaling from a wireless communications device

Methods and apparatus for signaling adjustments include identifying, by a user equipment (UE), a change in a reachability state of the UE based at least in part on one or more channel metrics determined by a modem in the UE. Further, the methods and apparatus include adjusting a transmission of connectivity signals (e.g., keep-alive signals) to a server from an application on the UE, the adjusting being based at least in part on an indication of the change in the reachability state provided to the application via an interface in communication with the modem (e.g., modem application programming interface or API). Additionally, the methods and apparatus can include transmitting an indication of the change in the reachability state to the server. Moreover, the methods and apparatus may accommodate signaling adjustments for one or more applications on the UE and one or more servers in a wireless communication system.

  • Pub Date: 2013/22/11
  • Number: 09510217
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for determining malicious program

Various embodiments provide methods, apparatus, and computer readable medium for determining a malicious program. In an exemplary method, a specific application programming interface (API) within an application program can be obtained. Call logic for calling the specific API can be determined. The call logic can include a triggering event to trigger the specific API to be called, a feedback path provided after the specific API is called, or a combination thereof. Whether the application program is a malicious program can be determined according to the call logic.

  • Pub Date: 2013/22/11
  • Number: 09158918
  • Owner: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
  • Location: Shenzhen, CN
  • Details: Visit USPTO

Visit USPTO Page


Managing information and content sharing in a virtual collaboration session

Systems and methods for managing information and content sharing in a virtual collaboration session. In some embodiments, a method may include creating a virtual collaboration workspace for a plurality of participants, where each of the participants operates a device configured to access the workspace, the workspace including a public portion and a plurality of private portions, the public portion accessible to each of the participants and each of the plurality of private portions accessible to a corresponding participant to the exclusion of at least another participant. The method may also include providing, to a given one of the participants, a representation of the public portion and a representation of the given participant's corresponding private portion, where the representation of the public portion and the representation of the given participant's corresponding private portion are renderable concurrently in a single window of a graphical user interface displayable by the given participant's device.

  • Pub Date: 2013/22/11
  • Number: 09398059
  • Owner: DELL PRODUCTS, L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated profile creation for a social network environment

In an example, a system and method is disclosed for providing a user matching system. To ease creation of a profile, a node may be enabled to connect to a third-party social media site where the node already has an established profile. The established profile is imported, wherein common fields are directly mapped, inferred fields may be deterministically inferred, and other fields such as “likes” may be assigned relative weights based on recentness, subjective user rankings, or correlation to other “likes.” The node may also be enabled to permanently log in to the matching system via credentials for the third-party social media site.

  • Pub Date: 2013/22/11
  • Number: 09094396
  • Owner: MATCH.COM, L.L.C.
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying social profiles in a social network having relevance to a first file

Methods and systems for providing related social profiles in a social network are disclosed. One method identifying a plurality of social profiles within the social network, wherein the plurality of social profiles each have a relationship with the first file, wherein the social network allows uploading and sharing of social profiles of users, and wherein each social profile includes a representation of a user. The method further includes generating, by a system server, a list of inquiries based on the plurality of social profiles, providing, by the system server, the list of inquiries to at least one author of the first file, receiving from the at least one author at least one response to the list of inquiries, selecting a subset of the plurality of social profiles based on the at least one response, and storing information related to the selected subset of the plurality of social profiles for access if the first file is selected.

  • Pub Date: 2013/22/11
  • Number: 09077775
  • Owner: Python4Fun, Inc.
  • Location: San Mateo, unknown
  • Details: Visit USPTO

Visit USPTO Page


Domain name spinning from geographic location data

Systems and methods of the present invention provide for displaying, suggesting and registering available domain names on a client computer based on selected geographical locations from online mapping service software or a geo-location software. Any combination of an online mapping software and a domain name registration software may receive a selection of one or more geographical locations within a displayed geographical area. Alternatively, a location of a client computer may be detected using the geo-location software. One or more available domain names may be parse for keywords related to the selected geographical area, and one or more available domain names may be suggested based on the selected keywords.

  • Pub Date: 2013/22/11
  • Number: 09451050
  • Owner: Go Daddy Operating Company, LLC
  • Location: Scottsdale, US
  • Details: Visit USPTO

Visit USPTO Page


Devices and methods for weighting of local costs for unit selection text-to-speech synthesis

A device may determine a representation of text that includes a first linguistic term associated with a first set of speech sounds and a second linguistic term associated with a second set of speech sounds. The device may determine a plurality of joins between the first set and the second set. A given join may be indicative of concatenating a first speech sound from the first set with a second speech sound from the second set. A given local cost of the given join may correspond to a weighted sum of individual cost. A given individual cost may be weighted based on a variability of the given individual cost in the plurality of joins. The device may provide a sequence of speech sounds indicative of a pronunciation of the text based on a minimization of a sum of local costs of adjacent speech sounds in the sequence.

  • Pub Date: 2013/22/11
  • Number: 09460705
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Deduplication in an extent-based architecture

It is determined that a first data block contains the same data as a second data block. The first data block is associated with a first extent and the second data block is associated with a second extent. In response to determining that the first data block contains the same data as the second data block, the second data block is associated with the first extent and the first data block is disassociated with the second extent.

  • Pub Date: 2013/22/11
  • Number: 09043287
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Compounds for the treatment of autism in a baby child

The invention relates to a compound which inhibits the importation of chloride into neurons or a compound which improve the outflow of chloride from neurons for use in the treatment of autism in a baby or a fetus in need thereof.

  • Pub Date: 2013/22/11
  • Number: 09592214
  • Owner: CHU DE BREST
  • Location: Brest, FR
  • Details: Visit USPTO

Visit USPTO Page


Collaborative management of shared resources

Collaborative management of shared resources is implemented by a storage server receiving, from a first resource manager, notification of a violation for a service provided by the storage server or device coupled to the storage server. The storage server further receives, from each of a plurality of resource managers, an estimated cost of taking a corrective action to mitigate the violation and selects a corrective action proposed by one of the plurality of resource managers based upon the estimated cost. The storage server directs the resource manager that proposed the selected corrective action to perform the selected corrective action.

  • Pub Date: 2013/22/11
  • Number: 09049204
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Boolean logic in a state machine lattice

Disclosed are methods and devices, among which is a device that includes a finite state machine lattice. The lattice may includes a programmable Boolean logic cell that may be programmed to perform various logic functions on a data stream. The programmability includes an inversion of a first input to the Boolean logic cell, an inversion of a last output of the Boolean logic cell, and a selection of an AND gate or an OR gate as a final output of the Boolean logic cell. The Boolean logic cell also includes end of data circuitry configured to cause the Boolean logic cell to only output after an end of data signifying the end of a data stream is received at the Boolean logic cell.

  • Pub Date: 2013/22/11
  • Number: 09118327
  • Owner: Micron Technology, Inc.
  • Location: Boise, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for receiving and processing detected events

Techniques for receiving and processing detected events are provided. A bit array may be received from a device. Each bit value in the bit array may indicate whether a user initiated event relating to interaction with a website was detected by the device. Data regarding a start time associated with the bit array may be received. Each bit value in the bit array is associated with a time increment after the start time.

  • Pub Date: 2013/21/11
  • Number: 09407711
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection

According to one embodiment, a computerized method comprises receiving an encrypted object and conducting a first static scanning operation on the encrypted object to decrypt the encrypted object in real-time. Thereafter, a second static scanning operation is conducted on the decrypted object to determine whether the decrypted object is suspected of including malware. Based on the results of the second static scanning operation, the decrypted object may be classified to identify a suspected presence of malware.

  • Pub Date: 2013/21/11
  • Number: 09189627
  • Owner: FireEye, Inc.
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


System and processor implemented method for improved image quality and enhancement

System and method for image improvement comprising providing a plurality of frames; determining the value of each pixel within each frame to form a first array of pixel values; selecting pixel locations within a frame; summing the intensity values of those pixels; multiplying the pixels in the first array by the summation of intensity values for selected pixel locations to produce a first product array for each frame; summing the first product arrays; determining the average of first product arrays; determining the average value of each pixel for the plurality of frames to form an a second array of averaged pixel values; determining the average of the summation of intensity values for the selected pixel locations; multiplying the array of average pixel values and the average of the summation of intensity values to form a second product array; subtracting the second product array from the average of first product arrays.

  • Pub Date: 2013/21/11
  • Number: 09064315
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Payment application download to mobile phone and phone personalization

A method and system of personalizing a mobile phone over a wireless network is provided. The method is fast, reliable, and eliminates the need for an uninterrupted online connection to a host server in order to achieve successful download of user information. With the method and system, a mobile phone can be personalized for various purposes, such as for conducting financial transactions.

  • Pub Date: 2013/21/11
  • Number: 09307341
  • Owner: III Holdings 1, LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile phone as a one-way recorded transmitter over a cellular network

Agencies oftentimes desire to monitor personnel in the field during the course of their duties. To provide flexible monitoring capabilities to agencies, a common mobile device such as a mobile phone is converted for use as a radio-based listening system to collect and transmit audio data. Phone features and accessories are leveraged to collect additional data for transmission. Collected data is streamed or otherwise transmitted to monitoring devices at the agency or in the field for operational oversight and recordation.

  • Pub Date: 2013/21/11
  • Number: 08934847
  • Owner: World Emergency Network—Nevada Ltd.
  • Location: Carson City, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and articles of manufacture for hosting a safety critical application on an uncontrolled data processing device

Methods and articles of manufacture for hosting a safety critical application on an uncontrolled data processing device are provided. Various combinations of installation, functional, host integrity, coexistence, interoperability, power management, and environment checks are performed at various times to determine if the safety critical application operates properly on the device. The operation of the SCA on the UDPD may be controlled accordingly.

  • Pub Date: 2013/21/11
  • Number: 09015700
  • Owner: Abbott Diabetes Care Inc.
  • Location: Alameda, US
  • Details: Visit USPTO

Visit USPTO Page


Method of designing fin field effect transistor (FinFET)-based circuit and system for implementing the same

A method of designing a fin field effect transistor (FinFET)-based circuit includes designing, using a processor, a first circuit schematic design based on a performance specification, the first circuit schematic design is free of artificial elements, wherein the artificial elements are used to simulate electrical performance of the FinFET-based circuit. The method further includes modifying, using the processor, at least one device within the first circuit schematic design to form a second circuit schematic design taking the artificial elements into consideration. The method further includes performing a pre-layout simulation using the second circuit schematic and taking the artificial elements into consideration. The method further includes generating a layout, wherein the layout does not take the artificial elements into consideration, and performing a post-layout simulation, wherein the post-layout simulation does not take the artificial elements into consideration.

  • Pub Date: 2013/21/11
  • Number: 09122833
  • Owner: TAIWAN SEMICONDUCTOR MANUFACTURING COMPANY, LTD.
  • Location: , TW
  • Details: Visit USPTO

Visit USPTO Page


Method and system for electronic content storage and retrieval using galois fields and information entropy on cloud computing networks

A method and system for electronic content storage and retrieval using Galois Fields and information entropy on cloud computing networks. Electronic content is divided into plural portions and stored in plural cloud storage objects based on determined information entropy of the electronic content thereby reducing location guessing of the electronic content using information gain and mutual information. Storage locations for the plural cloud storage objects are selected using a Galois field. The plural cloud storage objects are distributed across the cloud network. The Galois filed and information entropy providing various levels of security and privacy for the electronic content.

  • Pub Date: 2013/21/11
  • Number: 09137250
  • Details: Visit USPTO

Visit USPTO Page


Measuring deletion of cookies included in browsers used by online system users

An online system determines a frequency with which its users delete information stored in a browser on client devices associated with each user. When a user accesses the online system, the online system determines a user identifier associated with the user and determines if one or more conditions are satisfied based on information received from a browser used to access the online system. If a condition is satisfied, the online system communicates an instruction to the browser to communicate information associated with a third party and the user identifier to the third party. Information previously stored in the browser and associated with the user identifier is compared to information associated with the user identifier received from the browser. Deletion of information stored in the browser is determined when stored information associated with the user identifier differs from received information associated with the user identifier.

  • Pub Date: 2013/21/11
  • Number: 09565090
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Gamification provider abstraction layer

A system that manages a gamification provider abstraction layer can select a gamification provider. The system receives a common gamification request message from a client and creates a provider-specific request message based on the received common gamification request message and the selected gamification provider. The system then transmits the provider-specific request message to the selected gamification provider.

  • Pub Date: 2013/21/11
  • Number: 09526984
  • Owner: ORACLE INTERNATIONAL CORPORATION
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Controlled recorded 3-way calling

Agencies issue recording devices to personnel for administrating and monitoring controlled calls during the course of their duties. To provide flexible capabilities to agencies, a virtual number is provisioned and configured to enable an operator to administrate controlled calls without dedicated recording devices. Using the virtual number, the operator may setup a controlled call between a victim and a baddie. The victim is contacted via the virtual number by the operator and optionally informed about the controlled call process. In turn, the baddie is contacted using number information of the victim's phone and connected with the victim. Call audio between the victim and baddie is transmitted to the operator. When necessary, the operator may terminate the call remotely from the telephonic device the operator used to setup the call.

  • Pub Date: 2013/21/11
  • Number: 08731171
  • Owner: World Emergency Network—Nevada, Ltd.
  • Location: Carson City, US
  • Details: Visit USPTO

Visit USPTO Page


Attaching multiple phone lines to a single mobile or landline phone

Agencies issue multiple devices to personnel for maintaining distinct identities over the course of assigned investigations. To provide flexible capabilities to agencies, a phone is converted for use with multiple attached telephone numbers. Accordingly, a single phone may be used to manage multiple identities over the course of one or more investigations. Using a multiple attached number, a given device can place and receive calls over the network to and from contacts. In addition to providing multiple attached numbers, calls using the multiple attached numbers may be monitored live and recorded to establish evidence.

  • Pub Date: 2013/21/11
  • Number: 09031218
  • Owner: World Emergency Network—Nevada Ltd.
  • Location: Carson City, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for ascribing social attributes to content

Techniques for ascribing social attributes to content items and for selecting content to display in a content feed are described. According to various embodiments, accessing one or more content items accessible via a network are accessed, each of the content items having received one or more social activity signals. Thereafter, members of an online social network service that submitted the social activity signals may be identified. Member profile data identifying member profile attributes of the members cemented the social activity signals may then be accessed. Thereafter, social attribute information may be generated and associated with each of the content items, the social attribute information identifying the member profile attributes of the members that submitted the social activity signals associated with each of the content items.

  • Pub Date: 2013/20/11
  • Number: 09229900
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System for interactive help

Method and system for the provision of interactive assistance over a network for a user to complete a desired computing task on a user computing device. Task-guide