[ { "title": "", "publication_date": "2017/23/06", "number": "", "url": "/2017/06/23/2013-10-01-systems-and-methods-for-fixing-software-defects-in-a-binary-or-executable-file2/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "", "publication_date": "2017/23/06", "number": "", "url": "/2017/06/23/2013-03-15-computerimplemented-method-for-facilitating-creation-of-an-advanced-digital-communications-network-and-terminal-system-and-computerreadable-medium-for/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "", "publication_date": "2017/23/06", "number": "", "url": "/2017/06/23/2013-01-30-code-signing-system-and-method/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "Methods, systems and apparatuses for multi-directional still pictures and/or multi-directional motion pictures", "publication_date": "2013/22/12", "number": "09282309", "url": "/2013/12/22/methods-systems-and-apparatuses-for-multidirectional-still-pictures-andor-multidirectional-motion-pictures/", "abstract": "The disclosure is generally directed to methods, systems and apparatuses for multi-directional still pictures and/or multi-directional motion pictures and their applications on mobile, embedded, and other computing devices and applications.", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "Integration of verification tokens with portable computing devices", "publication_date": "2013/04/11", "number": "09372971", "url": "/2013/11/04/integration-of-verification-tokens-with-portable-computing-devices/", "abstract": "Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.", "owner": "Visa International Service Association", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Cloning and recovery of data volumes", "publication_date": "2013/25/10", "number": "09218245", "url": "/2013/10/25/cloning-and-recovery-of-data-volumes/", "abstract": "Aspects of a data environment, such as the cloning, hibernation, and recovery of databases, are managed using a separate control environment. A monitoring component of the control environment can periodically communicate with the data environment to determine any necessary actions to be performed, such as to recover from faults or events for a data instance in the data environment. A workflow can be instantiated that includes tasks necessary to perform actions such as recovery, hibernation, resumption from hibernation, or backup or cloning. Tasks of the workflow can cause certain jobs to be performed by host managers in the data environment to affect calls made to the control environment.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" }, { "title": "System and method of conclusively verifying the correctness of an information system without needing to test every combination of behavior at run-time", "publication_date": "2013/24/10", "number": "09582531", "url": "/2013/10/24/system-and-method-of-conclusively-verifying-the-correctness-of-an-information-system-without-needing-to-test-every-combination-of-behavior-at-runtime2/", "abstract": "An architecture for the initial development and later adaptation of systems comprising a database, one or more client or user-interface programs whose system data, application data and rule data are stored in the database alongside the content. A framework in the database stores system, application and rule data and frameworks in the user-interface and client programs load the system, application and rule data to generate objects and, in doing so, define an application-specific system. Data integrity checks of the system data, application data and rule data using triggers and/or stored procedures ensure the correctness of the system without having to test every combination of behavior at run-time.", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "Increased parallelism performance of batch requests", "publication_date": "2013/20/09", "number": "09495411", "url": "/2013/09/20/increased-parallelism-performance-of-batch-requests/", "abstract": "A system selectively dequeues journal requests instead of dequeuing on a first come, first served basis. A database system detects that a request for access from a client is a journal batch, which includes multiple journal requests. The system queues the journal batch in a queue with other journal batches for processing. The system selectively dequeues journal requests from the journal batch queue, including selecting at least one journal request from multiple different journal batches. Thus, the journal requests do not conflict for shared resources, and the system can improve parallelism in processing the journal batches.", "owner": "salesforce.com, inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Cross domain in-browser proxy", "publication_date": "2013/12/09", "number": "09503501", "url": "/2013/09/12/cross-domain-inbrowser-proxy/", "abstract": "An in-browser proxy enables an application in a frame to make a cross domain request. The proxy executes within the browser, which has a first domain. The browser provides a frame in which a client application executes, which has a second domain. The request from the client application is a request for data access to the external domain. The proxy identifies a registration of the client application, and forwards the request to the external domain. The proxy receives a response to the request and provides the response back to the client application within the frame.", "owner": "salesforce.com, inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Multi-tenant service management in a VoIP network", "publication_date": "2013/12/08", "number": "09210276", "url": "/2013/08/12/multitenant-service-management-in-a-voip-network/", "abstract": "A system and method for aggregating services within a VoIP network. The VoIP network comprises a plurality of vendors, resellers, and users, and each reseller aggregates a plurality of services from the vendors and other resellers. Each type of service may be organized into two or more tiers, with each tier including one or more services. Each tier is presented to downstream users as a single price and is re-branded with the reseller's branding elements. Downstream users can select a desired service from a given tier, and the tier may automatically select a service that maximizes the profit for the reseller.", "owner": "AQUIFER INNOVATIONS, LLC", "owner_city": "Houston", "owner_country": "US" }, { "title": "Integration of verification tokens with mobile communication devices", "publication_date": "2013/09/08", "number": "09317848", "url": "/2013/08/09/integration-of-verification-tokens-with-mobile-communication-devices/", "abstract": "Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.", "owner": "Visa International Service Association", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Multimodal portable communication interface for accessing video content", "publication_date": "2013/19/07", "number": "09348908", "url": "/2013/07/19/multimodal-portable-communication-interface-for-accessing-video-content/", "abstract": "A portable communication device has a touch screen display that receives tactile input and a microphone that receives audio input. The portable communication device initiates a query for media based at least in part on tactile input and audio input. The touch screen display is a multi-touch screen. The portable communication device sends an initiated query and receives a text response indicative of a speech to text conversion of the query. The portable communication device then displays video in response to tactile input and audio input.", "owner": "AT&T Intellectual Property I, L.P.", "owner_city": "Atlanta", "owner_country": "US" }, { "title": "System and methods for communicating in a telecommunication network via independent key routing and proxies", "publication_date": "2013/28/05", "number": "09363177", "url": "/2013/05/28/system-and-methods-for-communicating-in-a-telecommunication-network-via-independent-key-routing-and-proxies/", "abstract": "A combination of an independent key routing (IKR) method and a data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a plurality of keys for a plurality of message types, identify a first logical scalable unit (LSU) that includes a first memory that stores a first type of data via a database API and a first key, identify a second LSU that includes a second memory that stores a second type of data relating to the subscriber via the database API and a second key of the plurality of keys, store the first communication message and the first key in the first database memory, and store the first key in the second database memory.", "owner": "Openet Telecom LTD.", "owner_city": "Dublin", "owner_country": "IE" }, { "title": "System and method for communicating in a telecommunication network via common key routing and proxies", "publication_date": "2013/28/05", "number": "09380018", "url": "/2013/05/28/system-and-method-for-communicating-in-a-telecommunication-network-via-common-key-routing-and-proxies/", "abstract": "A combination of a common key routing (CKR) method and data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor in a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a common key based on the subscriber identifiers, identify a first logical scalable unit that includes a first database memory that stores subscriber data relating to the subscriber via a database application programming interface (API) and the common key, store the first communication message in the first database memory included in the first logical scalable unit, and receive a second communication message in response to storing the first communication message in the first database memory and routing the second communication message to another component the telecommunication network.", "owner": "Openet Telecom LTD.", "owner_city": "Dublin", "owner_country": "IE" }, { "title": "Virtual persistence", "publication_date": "2013/10/05", "number": "09507607", "url": "/2013/05/10/virtual-persistence/", "abstract": "A virtual persistence platform is described that provides requirement-driven persistence store orchestration. Application developers can annotate program code with persistence properties and requirements, and a compiler component of the virtual persistence platform generates a persistence service level agreement (PSLA) that becomes attached to the application. After deployment and launch, the virtual persistence platform uses the PSLA to handle persistence commands from the application and perform persistence store orchestration.", "owner": "VMware, Inc.", "owner_city": "Palo Alto", "owner_country": "US" }, { "title": "Enhanced document and event mirroring for accessing internet content", "publication_date": "2013/07/05", "number": "09489356", "url": "/2013/05/07/enhanced-document-and-event-mirroring-for-accessing-internet-content/", "abstract": "Systems and methods for enhanced DOM and event mirroring and security in web applications provides an intermediate Master Browser between web content and client devices to improve security and other enhancements.", "owner": "DIGITAL GUARDIAN, INC.", "owner_city": "Waltham", "owner_country": "US" }, { "title": "Versioning of database partition maps", "publication_date": "2013/28/02", "number": "09558207", "url": "/2013/02/28/versioning-of-database-partition-maps2/", "abstract": "System and methods for managing versions of partition maps in a distributed data store are disclosed. A relational database may use partition maps to indicate the location of data in a particular partition, or in a replica thereof. These partition maps may be versioned using a two-stage mechanism in which partition map updates are communicated to all nodes, or to affected nodes only, and in which operation may continue without waiting for acknowledgment of their application to each node. The system may handle minor partition changes differently than major partition changes. For example, if a replica of a partition is promoted to be a primary copy due to hardware or network failures, partition map changes may only be propagated to nodes in the same replica group. For major partition changes (e.g., splits, moves, mergers, added partitions, or size change), a new partition map may be made available to all nodes.", "owner": "Amazon Technologies, Inc.", "owner_city": "Reno", "owner_country": "US" } ]