API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

Streamdata.io

Streamdata is a software vendor making real-time data accessible to all by operating a proxy turning request / response APIs into feeds of real-time events.

Uptrends

Uptrends is the ultimate monitoring tool to stay in control of the uptime, performance, and functionality of your websites, APIs, and servers.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

Transmitters for optical narrowcasting

Systems and methods for optical narrowcasting are provided for transmitting various types of content. Optical narrowcasting content indicative of the presence of additional information along with identifying information may be transmitted. The additional information (which may include meaningful amounts of advertising information, media, or any other content) may also be transmitted as optical narrowcasting content. Elements of an optical narrowcasting system may include optical transmitters and optical receivers which can be configured to be operative at distances ranging from, e.g., 400 meters to 1200 meters. Moreover, the elements can be implemented on a miniaturized scale in conjunction with small, user devices such as smartphones, thereby also realizing optical ad-hoc networking, as well as interoperability with other types of data networks. Optically narrowcast content can be used to augment a real-world experience, enhance and/or spawn new forms of social-media and media content.

  • Pub Date: 2016/30/12
  • Number: 09654222
  • Owner: SureFire LLC
  • Location: Fountain Valley, US
  • Details: Visit USPTO

Visit USPTO Page


Tracing and asynchronous communication network and routing method

A system and method for asynchronous conversation routing and tracing that allows a client and agent to connect and reconnect to one another over a discontinuous engagement. The system and method facilitate this by allowing multiple methods of communication between the client and agent, including live communications and out-of-band communications. All communications between a client and agent are tied to a client case accessible by the agent, and the client case can include context and environmental data to further assist the agent or to route a customer service call to an appropriate agent. At any time, the client or agent can send out-of-band messages to one another to advance the customer service process, or the client or agent can seek to re-establish live communication with each other. This provides the client with a consistent point of contact not easily supportable with phone based call centers where support is single-threaded.

  • Pub Date: 2016/22/12
  • Number: 09641684
  • Owner: Verint Americas Inc.
  • Location: Alpharetta, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for generating wireless electromagnetic transmissions modulated with software defined complex waveforms

An air interface array system and method for generating electromagnetic transmissions is provided. The system includes partition elements separately and operationally connected to horizontal and vertical circuit boards. In transmission, a radio frequency input is provided to each board. Each circuit board has a phase selector that generates a symbol with one of four phases relative to a plane of the partition elements such an output signal is produced. A time delay selector delays the output signal in order to focus the transmitted beam to be an input signal to an amplifier. The amplified signal drives radio frequency ports to produce horizontally and vertically polarized radiated signal vectors. The signal vectors are combined to form a radio frequency modulation symbol vector. Multiple symbol vectors form a transmitted modulation waveform.

  • Pub Date: 2016/16/12
  • Number: 09602143
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for improving contact lens comfort

Dry eye treatment apparatus and methods are described herein which generally comprise a patch or strip affixed to the skin of the upper and/or lower eyelids to deliver heat or other forms of energy, pressure, drugs, moisture, etc. (alone or in combination) to the one or more meibomian glands contained within the underlying skin. The treatment strip or strips include one or more strips configured to adhere to an underlying region of skin in proximity to one or both eyes of a subject such that the one or more strips allow for the subject to blink naturally without restriction from the one or more patches. Moreover, the one or more strips may be configured to emit energy to the underlying region of skin and where the one or more strips are shaped to follow a location of one or more meibomian glands contained within the underlying region of skin.

  • Pub Date: 2016/05/12
  • Number: 09642743
  • Owner: Sight Sciences, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Determining influence in a social networking system

An influence metric describing the influence of a social networking system object on social networking system users is determined based on affinities between the users and the object. For example, affinities between the associated users and the object are combined to determine the influence metric. Content may be selected for presentation to users based in part on influence metrics of the content. Additionally, influence metrics of objects associated with a user may be combined to determine the relevance of objects associated with the user, which may also be used to select content for presentation to the user.

  • Pub Date: 2016/30/11
  • Number: 09659308
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for facilitating the operation of an on-site energy storage system to co-optimize battery dispatch

Various embodiments are provided for facilitating the operation and control of a fleet of on-site energy assets and optimizing energy dispatch across the fleet, thereby facilitating the use of the on-site energy assets instead of grid-supplied electric consumption. An example system may comprise a central platform and a plurality of on-site gateway devices configured to perform on-site asset control. An example method may comprise receiving a service availability call, performing fleet-level optimization, generating a set of site-level schedules, and causing, as a function of the site-level schedules, real-time on-site asset control. Other embodiments provide for determining a location of each grid-connected energy consumer at which to reduce grid-supplied energy consumption, determining an amount of a reduction of grid-supplied energy consumption, and transmitting a signal to each corresponding gateway device located at the determined location, the signal comprising data indicative of instructions for performing on-site energy dispatch.

  • Pub Date: 2016/23/11
  • Number: 09645596
  • Owner: Advanced Microgrid Solutions, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Merging active group calls

A method for merging active group calls includes receiving, at a first Push to Talk (PTT) server, a request to merge a first and a second active group call. A first and a second group of PTT clients participate in the first and the second active group call, respectively. The first PTT server may send a first invite message to a first group PTT server which hosts the first group call. In response to the first invite message, the first PTT server may receive a first response message. The first PTT server may send a second invite message to a second group PTT server which hosts the second group call. In response to the second invite message, the first PTT server may receive a second response message. The first PTT server may host a merged PTT group call which includes the first and the second group of PTT clients.

  • Pub Date: 2016/18/11
  • Number: 09628965
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system, and method for protecting against keylogging malware and anti-phishing

An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.

  • Pub Date: 2016/18/11
  • Number: 09659174
  • Owner: Trusted Knight Corporation
  • Location: Annapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for the network steganographic assessment of a test subject

To date, there is no method to test the network steganographic effectiveness of network security hardware or software using a plurality of attack techniques. The invention specified herein represents such a method. The present invention enables an operator to test network security products in their ability to perform in areas including but not limited to detecting steganograms, preventing steganograms, normalizing packets transmitting covert data, steganographic operation without negatively impacting the performance/reliability of a network, and other activities related to network steganography. Assertions made by network security manufacturers with regard to their network firewall and security appliances must be supported by empirical evidence. The invention described herein provides quantitative and qualitative data to support or refute manufacturer assertions that their network security hardware or software can effectively perform as claimed as it relates to network steganography.

  • Pub Date: 2016/16/11
  • Number: 09626522
  • Details: Visit USPTO

Visit USPTO Page


Pairable secure-access facilities

Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.

  • Pub Date: 2016/15/11
  • Number: 09652918
  • Owner: EBAY INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for quantum ready computations on the cloud

The present disclosure provides methods, systems, and media for allowing access to quantum computers in a distributed computing environment (e.g., the cloud). Such methods and systems may provide optimization and computational services on the cloud. Methods and systems of the present disclosure may enable quantum computing to be relatively and readily scaled across various types of quantum computers and users at various locations, in some cases without the need for users to have a deep understanding of the resources, implementation or the knowledge that may be required for solving optimization problems using a quantum computer. Systems provided herein may include user interfaces that enable users to perform data analysis in a distributed computing environment while taking advantage of quantum technology in the backend.

  • Pub Date: 2016/11/11
  • Number: 09660859
  • Owner: 1QB INFORMATION TECHNOLOGIES INC.
  • Location: Vancouver, BC, CA
  • Details: Visit USPTO

Visit USPTO Page


Robust geolocation system implementation for serving targeted advertisement and personalized content

A system receives geographic information from devices to determine and deliver relevant advertisements or personalized content for consumers. This ties a user's real-world location, with virtual leads (e.g., advertisements). The system uses geographical information gathered by mobile devices and saves the geographical information to consumer profiles. For example, the system can use different wireless radios present on mobile devices to gather different types of geographical information. Some radios include cellular, Bluetooth, global positioning system (or GPS), Wi-Fi, near field communications (or NFC), and other radios.

  • Pub Date: 2016/09/11
  • Number: 09648581
  • Owner: RadiumOne, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for messaging, calling, digital multimedia capture and payment transactions

Provided are methods and systems for providing compensation for using a mobile payment service. The method may commence with receiving payment information associated with a user. The method may include generating a unique code encoding the payment information and providing the generated unique code to the user. The method may continue with receiving a deposit amount associated with a purchase related to the user. The purchase may be made via the mobile payment service. The method may further include receiving a notification about a further purchase of the user via the mobile payment service. The notification may include at least the unique code and a product barcode. The product barcode may be associated with the further purchase. The method may further include providing a compensation from the deposit amount to the user. The compensation may be associated with a payment amount associated with the further purchase.

  • Pub Date: 2016/07/11
  • Number: 09652758
  • Details: Visit USPTO

Visit USPTO Page


Remote controlled studio camera system

A system for remotely controlling a camera is disclosed. The system includes five major subsystems; a first subsystem collocated with the camera; a second subsystem which serves as a gateway between the camera and the third subsystem; a third subsystem to remotely monitor the studio and control the camera; a fourth subsystem located at the destination of the video stream; and a fifth subsystem to receive and re-transmit a video control stream. This system allows the camera to be monitored and controlled by one location, while the primary video stream is transmitted to a different location. In some embodiments, the control video stream is a lower bandwidth signal than the primary video stream. Furthermore, the fifth subsystem is capable of receiving and re-transmitting control video streams from a plurality of cameras simultaneously. The second subsystem allows remote access to the first subsystem, such as via the third subsystem, based on approved credentials.

  • Pub Date: 2016/01/11
  • Number: 09661209
  • Owner: VideoLink LLC
  • Location: Newton, US
  • Details: Visit USPTO

Visit USPTO Page


Network security threat detection by user/user-entity behavioral analysis

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.

  • Pub Date: 2016/26/10
  • Number: 09609009
  • Owner: Splunk Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic generation of customized content for display on a network device

Methods and apparatuses are described for dynamically generating customized content for display on a network device. A server computing device receives a plurality of data elements from a network device upon initiation of an interaction between the network device and a tag in proximity to the network device. The server generates a content payload using at least a portion of the received data elements, where the content payload comprises source code defining content for display, a style of the content for display, and a layout of the content for display. The generating step includes querying a content repository based upon the received data elements to retrieve portions of the source code and aggregating the retrieved portions of the source code to form the content payload. The server computing device receives a request for the content payload, and transmits the content payload for generation of a graphical display.

  • Pub Date: 2016/26/10
  • Number: 09591451
  • Owner: Blue Bite LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Virtualization-enabled satellite platforms

Systems, methods, and software described herein provide enhancements for deploying applications in satellites. In one example, a satellite may receive software applications capable of execution as virtual nodes on the satellite, and receive a resource schedule associated with the software applications. The satellite may further execute the software applications on the satellite based on the resource schedule, wherein the resource schedule allocates processing resources and user sensor resources to the software applications.

  • Pub Date: 2016/19/10
  • Number: 09641238
  • Owner: Vector Launch Inc.
  • Location: Tucson, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing additional functionality to existing software in an integrated manner

An improved system and method are disclosed for improving functionality in software applications. In one example, the method includes a computing entity having a network interface, a processor, and a memory configured to store a plurality of instructions. The instructions include instructions for a superblock application having instructions for a function block included therein. The function block is configured to provide functions that are accessible to the superblock application via an application programming interface (API). The functions are provided within the superblock application itself and are accessible within the superblock application without switching context to another application on the computing entity.

  • Pub Date: 2016/19/10
  • Number: 09578092
  • Owner: DAMAKA, INC.
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Proxy based data transfer utilizing direct memory access

A method for transferring data utilizing direct memory access. The method includes a computer processor establishing a networking connection, using a proxy, between at least a first computing entity and a second computing entity. The method further includes determining a shared memory space for the established networking connection between at least the first computing entity and the second computing entity. The method further includes allocating the shared memory space from heap memory. The method further includes transmitting data over the established networking connection between at least the first computing entity and the second computing entity utilizing a direct memory access protocol and the allocated shared memory space.

  • Pub Date: 2016/19/10
  • Number: 09632974
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for invoking chatbots in a channel based communication system

Disclosed systems and methods join a user to pre-existing primary communication channels based upon the information obtained from a user profile. Each channel hosts a different plurality of users and facilitates electronic communication between a corresponding enterprise data source and a remote user device associated with the user. The user is joined to one or more sub-channels associated within a primary channel. A message posted by the user is received and comprises a key identifying a sub-channel, an API token identifying the user, and a first communication. In response, an automated human interface module (bot), which includes a node graph to direct one or more states of a conversation, posts a responsive message including the key, the API token, and a second communication. The API token and key route the responsive message to the user device thereby initiating a secure conversation between the user device and an enterprise data source.

  • Pub Date: 2016/14/10
  • Number: 09647968
  • Owner: Pypestream Inc
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Creation of virtual machine placeholders in a data storage system

The data storage system according to certain aspects can manage the archiving of virtual machines to (and restoring of virtual machines from) secondary storage. The system may archive virtual machines (VMs) that are determined to have a low level of utilization. The system may create a virtual machine placeholder for an archived VM, which may be a “light” or minimal version of the VM that acts like the actual VM. By using a VM placeholder, a VM may appear to be active and selectable by the user. When the user selects the VM, the VM placeholder can interact with the user in similar manner as the VM. Accessing the VM placeholder may trigger restore of the archived VM from secondary storage. The restore of the archived VM may be “seamless” to the user since the VM remains available while it is being restored.

  • Pub Date: 2016/14/10
  • Number: 09652283
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Enhanced policy editor with completion support and on demand validation

In an approach to providing completion support and on demand validation in a web tool that operates on live resources, one or more computer processors create one or more lists of content, where the one or more lists of content include one or more references to one or more runtime objects. The one or more computer processors parse the one or more lists of content. The one or more computer processors populate one or more lists of one or more choices with the parsed one or more lists of content. The one or more computer processors create one or more callbacks for one or more runtime objects referenced by the one or more lists of one or more choices.

  • Pub Date: 2016/07/10
  • Number: 09600516
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Learning new words

Systems and methods are disclosed for a server learning new words generated by user client devices in a crowdsourced manner while maintaining local differential privacy of client devices. A client device can determine that a word typed on the client device is a new word that is not contained in a dictionary or asset catalog on the client device. New words can be grouped in classifications such as entertainment, health, finance, etc. A differential privacy system on the client device can comprise a privacy budget for each classification of new words. If there is privacy budget available for the classification, then one or more new terms in a classification can be sent to new term learning server, and the privacy budget for the classification reduced. The privacy budget can be periodically replenished.

  • Pub Date: 2016/24/09
  • Number: 09645998
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


N-[2-(3-amino-2,5-dimethyl-1,1-dioxido-5,6-dihydro-2H-1,2,4-thiadiazin-5-yl)-1,3-thiazol-4-yl] amides

  • Pub Date: 2016/22/09
  • Number: 09611264
  • Owner: Pfizer Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Triggering application action using non-standard controls

A lock button of a mobile device with an iOS operating system, to be used by a user to effect an action when the mobile device is in the locked state, is enabled for other functions by executing an application on the mobile device. When the mobile device is in a locked state, the application is in a dormant mode. The OS of the mobile device monitors for a change of location of the device and/or for the receipt of a short range wireless data signal. Upon detecting either, the operating system communicates this to the application which in response enters a background mode and monitors the on/off state of a screen of the mobile device. If the screen state changes at least twice within a predetermined period of time, the application effects an action, such as sending a panic signal.

  • Pub Date: 2016/21/09
  • Number: 09661480
  • Owner: Cambridge Mobile Telematics
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for sharing position data between first and second devices

A system for exchanging GPS or other position data between wireless devices for purposes of group activities, child location monitoring, work group coordination, dispatching of employees etc. Cell phones and other wireless devices with GPS receivers have loaded therein a Buddy Watch application and a TalkControl application. The Buddy Watch application communicates with the GPS receiver and other wireless devices operated by buddies registered in the users phone as part of buddy groups or individually. GPS position data and historical GPS position data can be exchanged between cell phones of buddies and instant buddies such as tow truck drivers via a buddy watch server. Emergency monitoring services can be set up with notifications to programmable individuals in case an individual does not respond. Positions and tracks can be displayed. TalkControl simplifies and automates the process of joining talk groups for walkie talkie services such as that provided by Nextel.

  • Pub Date: 2016/20/09
  • Number: 09654921
  • Owner: X One, Inc.
  • Location: Union City, US
  • Details: Visit USPTO

Visit USPTO Page


Asset tags

A method and apparatus for scanning, by an asset tag manager during a scanning window, for wireless broadcasts from beacon devices. The method further filters the wireless broadcasts to generate a subset of the wireless broadcasts. The method continues by identifying, within the subset of the wireless broadcasts, a first wireless broadcast with a first data packet in view of an indication that a first beacon device is within a specified distance from the asset tag manager. The method proceeds by parsing the first data packet to locate a first beacon identifier associated with a first beacon device. The method also creates a second data packet with the first beacon identifier and an asset tag identifier associated with the asset. The method transmits a second wireless broadcast comprising the second data packet, the second wireless broadcast to be received by a hub.

  • Pub Date: 2016/20/09
  • Number: 09622025
  • Owner: Enovate Medical, LLC
  • Location: Murfreesboro, US
  • Details: Visit USPTO

Visit USPTO Page


Channel based communication and transaction system

System and methods are provided for receiving identification information from remote user devices associated with users. The identification information serves to obtain corresponding stored user profiles. Users are engaged with pre-existing primary communication channels for each user based upon their profiles. Each such primary channel facilitates electronic communication between a corresponding enterprise data source and users. For each respective primary channel in a subset of the primary channels of a first user, a corresponding plurality of sub-channels is generated based upon their profile. A sub-channel enables secure bidirectional communication between (i) the remote user device associated with a first user and (ii) the enterprise data source associated with the primary channel to which the sub-channel is associated.

  • Pub Date: 2016/19/09
  • Number: 09641470
  • Owner: Pypestream Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for enhanced customer experience workflow

A system for enhanced customer experience workflows, comprising a workflow integration server configured to receive at least a plurality of customer interaction information, and configured to produce at least a plurality of interaction workflow events based at least in part on at least a portion of the customer interaction information, and configured to transmit at least a portion of the interaction workflow events via a network; wherein at least a portion of the customer interaction information is received from a customer interaction system, and at least a portion of the interaction workflow events are produced automatically, and at least a portion of the customer interaction information is received while an interaction is in progress, and at least a portion of the workflow events are produced and transmitted while the interaction is in progress.

  • Pub Date: 2016/18/09
  • Number: 09582779
  • Owner: Virtual Hold Technology, LLC
  • Location: Akron, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for routing media

A video streaming system comprises one or more servers, each of the one or more servers including one or more processors and a memory. The one or more servers receive signaling from a client device via a packet-based telecommunication network. In response to the received signaling, the one or more servers transmit to the client device, via the packet-based telecommunication network, one or more files in a format compatible with a media player on the client device, the one or more files including (i) an indication of one or more segments of video content, (ii) one or more URLs identifying one or more resources of a content distribution network available to facilitate streaming of the one or more segments and one or more advertisements to the client device, (iii) information instructing the client device how to communicate with the one or more resources to cause the one or more segments of the video content and the one or more advertisements to be streamed to the client device in a predetermined sequence, and (iv) an identifier uniquely associated with the client device and a viewing session for the video content.

  • Pub Date: 2016/16/09
  • Number: 09591360
  • Owner: SITO Mobile R&D IP, LLC
  • Location: Jersey City, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and method for assuring security governance in managed computer systems

An agile governance system provides recommendations for infrastructure change requests concerning a cloud-based computer environment in accordance with security policies regarding data to be used in connection with applications impacted by the requests. The nature and character of the data is determined using an interactive dialog with a requesting entity. Possible responses provided by the requesting entity are mapped to security policy requirements, which, in turn, are used to determine infrastructure stack requirements. Where pre-approved solutions that satisfy the security needs for the requested infrastructure change exist, they are recommended; otherwise, the requesting entity is presented with the recommendation for the requested infrastructure change along with a list of required approvals and approvers.

  • Pub Date: 2016/14/09
  • Number: 09578066
  • Owner: HYTRUST, INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Probability-based usage of multiple estimators of a physiological signal

A physiological signal such as a heart rate acquired from a monitoring device is processed to reduce interference, ambiguity, or artifacts arising during various activities. For example, the system can process a physiological signal to account for motion artifacts in the physiological signal and, thus, reduce the impact of movement on the physiological signal. Additionally, or alternatively, the system can process a physiological signal based on one or more measurement contexts associated with a wearable device. In general, the physiological signal processed as described herein can be useful as a reliable, continuous indication of a physiological parameter and, thus, can serve as the basis for other physiological assessments (e.g., heart rate variability) derived from the physiological parameter.

  • Pub Date: 2016/14/09
  • Number: 09596997
  • Owner: Whoop, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Online logo tool

An online tool allows a user, such as an online merchant, to access a page of a service provider, select a format, customize funding sources and designs, and copy and paste the code to the merchant page to quickly and easily create a customized funding source graphic.

  • Pub Date: 2016/14/09
  • Number: 09588650
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


User customization of cards

Each card uses one or more APIs to actively pull content or have content pushed from apps resident in memories of the device and other content supplied from computing devices external to the device. Each card is particularized to a specific category of information to showcase content on a display screen of the device from the apps and the other content, which is all aggregated on a corresponding card for that category of information. A configuration screen is also presented to allow the user of the device to customize their own user experience on the device by selecting as potential content sources from the apps and the external computing devices to supply an extracted newest version of content to be displayed on the one or more cards to personalize content and provide better engagement with the user of the device.

  • Pub Date: 2016/13/09
  • Number: 09654598
  • Owner: Le Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Dual-party session key derivation

A session key is negotiated to secure a user session executed in a host computer. An electronic hardware security module (HSM) located in the host computer generates a first session key. A smart card generates a second session key that matches the first session key. An encrypted copy of the second session key is communicated to an electronic host application module installed in the host computer. The electronic host application module decrypts the encrypted session key to obtain a copy of the session key such that the first and second session keys possessed by the smart card, the host application module and the HSM match one another.

  • Pub Date: 2016/09/09
  • Number: 09647842
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Messaging device

A portable messaging device is provided that can display visual messages and communicate with additional messaging devices via a local area network. The portable messaging device can include a display panel having an LED array, and a control unit. Lateral side walls, and the inner surface of the display panel can define at least part of a recessed opening configured to receive an electronic device such as a smartphone. The control unit can receive input via a user interface of the portable messaging device and, responsive to the input, provide a visual message to the LED array for display from the outer surface of the display panel.

  • Pub Date: 2016/07/09
  • Number: 09584641
  • Details: Visit USPTO

Visit USPTO Page


Data transmission using dynamically rendered message content prestidigitation

A communication method and system according to the present invention generates a unique cryptographically secure URI in response to receiving a user post. The user post and URI are stored temporarily. The URI is sent to an intended recipient. In response to a first instance of accessing the URI, the content is retrieved and sent to the intended recipient. The original uploaded content and URI are then deleted. In response to subsequent instances of accessing the URI, random content determined in part by a current environmental state of the communication, is returned. Recent subsequent instances can return thematically similar content.

  • Pub Date: 2016/02/09
  • Number: 09635027
  • Owner: Blink.Cloud LLC
  • Location: Alexandria, US
  • Details: Visit USPTO

Visit USPTO Page


Solar module support structure

Described herein are solar energy collection systems, devices, and methods for harvesting solar energy. In some embodiments, the devices, systems, and methods described herein comprise a bifacial photovoltaic module, a reflector, a rod and a support structure.

  • Pub Date: 2016/01/09
  • Number: 09654053
  • Owner: SUN ENERGY, INC.
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time adaptive operations performance management system using event clusters and trained models

Embodiments are directed to managing operations. If Operations events are provided, event clusters may be associated with one or more Operations events, such that the Operations events may be associated with the event clusters based on characteristics of the Operations events. Metrics including resolution metrics, root cause analysis, notes, and other remediation information may be associated with the event clusters. Then a modeling engine may be employed to train models based on the Operations events, the event clusters, and the resolution metrics, such that the trained model may be trained to correlate and predict the resolution metrics from real-time Operations events. If real-time Operations events may be provided, the trained models may be employed to predict the resolution metrics that are associated with the real-time Operations events. If model performance degrades beyond accuracy requirements, new observations may be added to the training set and the model re-trained.

  • Pub Date: 2016/01/09
  • Number: 09582781
  • Owner: PagerDuty, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for object tracking with wireless beacons

An object tracking system can include beacons and tracking module. The object tracking method can include determining the location of a mobile device and determining the location of an object beacon.

  • Pub Date: 2016/31/08
  • Number: 09622208
  • Owner: Estimote, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Lockdown apparatus for initiation of lockdown procedures at a facility during an emergency including subsequent lockdown status communications

Some embodiments are directed to a lockdown apparatus for facilitating initiation of lockdown procedures at a facility. The lockdown apparatus can include a manually operated actuator disposed at the facility and configured to transmit a lockdown initiation signal upon being manually actuated. The actuator can be configured to be recognizably distinguishable from a fire alarm actuator. The lockdown apparatus can also include a lockdown communicator configured to produce a lockdown communication for communicating initiation of lockdown procedures to the facility occupants and individuals not disposed proximate the facility upon transmission of the lockdown initiation signal, the lockdown communication being recognizably distinguishable from the fire alarm communication. The lockdown communicator can include an annunciator that communicates an audible annunciation to facility occupants upon transmission of the lockdown initiation signal, and that ceases to communicate the audible annunciation subsequent to a predetermined number of alarm cycles.

  • Pub Date: 2016/31/08
  • Number: 09589452
  • Owner: EMERGENCY ALERT SOLUTIONS GROUP, LLC
  • Location: Great Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Configuring new nodes for using a storage system managed by a unified storage manager

Systems and methods for configuring new nodes for using a storage system managed by a unified storage manager (USM) are disclosed. An example method may comprise detecting, by a processing device executing a unified storage manager (USM), a connection of a machine to the USM, invoking a provisioning component of the USM to initiate a provisioning process for the machine, utilizing, via the provisioning process, an external provisioning service to cause a bootstrapping process to execute on the machine, the bootstrapping process to install an operating system (OS) on the machine and to execute a kickstart file on the machine, responsive to execution of the kickstart file, performing a handshake process with the machine to establish a communication channel between the USM and the machine, and receiving, via the established communication channel, an availability status of the machine as a storage node for storage services managed by the USM.

  • Pub Date: 2016/31/08
  • Number: 09596135
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Lockdown apparatus for initiation of lockdown procedures at a facility during an emergency including subsequent lockdown status communications

Some embodiments are directed to a lockdown apparatus for facilitating initiation of lockdown procedures at a facility. The lockdown apparatus can include a manually operated actuator disposed at the facility and configured to transmit a lockdown initiation signal upon being manually actuated. The actuator can be configured to be recognizably distinguishable from a fire alarm actuator. The lockdown apparatus can also include a lockdown communicator configured to produce a lockdown communication for communicating initiation of lockdown procedures to the facility occupants and individuals not disposed proximate the facility upon transmission of the lockdown initiation signal, the lockdown communication being recognizably distinguishable from the fire alarm communication. The lockdown communicator can include an annunciator that communicates an audible annunciation to facility occupants upon transmission of the lockdown initiation signal, and that ceases to communicate the audible annunciation subsequent to a predetermined number of alarm cycles.

  • Pub Date: 2016/30/08
  • Number: 09589451
  • Owner: EMERGENCY ALERT SOLUTIONS GROUP, LLC
  • Location: Great Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Machine or group of machines for monitoring location of a vehicle or freight carried by a vehicle

A machine or group of machines for monitoring location of at least one of a vehicle or freight carried by the vehicle includes a server comprising a central processing unit, a memory, a clock, and a server communication transceiver that receives location information of a mobile device, the mobile device comprising a GPS receiver, a microprocessor and a wireless communication transceiver coupled to the GPS receiver, the mobile device comprising the GPS receiver programmed to receive data sent by a plurality of GPS satellites, calculate location information of the mobile device comprising the GPS receiver and transmit the location information.

  • Pub Date: 2016/29/08
  • Number: 09607283
  • Owner: MacroPoint LLC.
  • Location: Cleveland, US
  • Details: Visit USPTO

Visit USPTO Page


Lockdown apparatus for initiation of lockdown procedures at a facility during an emergency including a drill mode

Some embodiments are directed to a lockdown apparatus for facilitating initiation of lockdown procedures at a facility. The lockdown apparatus can include a manually operated actuator disposed at the facility and configured to transmit a lockdown initiation signal upon being manually actuated. The actuator can be configured to be recognizably distinguishable from a fire alarm actuator. The lockdown apparatus can also include a lockdown communicator configured to produce a lockdown communication for communicating initiation of lockdown procedures to the facility occupants and individuals not disposed proximate the facility upon transmission of the lockdown initiation signal, the lockdown communication being recognizably distinguishable from the fire alarm communication. The lockdown communicator can include an annunciator that communicates an audible annunciation to facility occupants upon transmission of the lockdown initiation signal, and that ceases to communicate the audible annunciation subsequent to a predetermined number of alarm cycles.

  • Pub Date: 2016/29/08
  • Number: 09589450
  • Owner: EMERGENCY ALERT SOLUTIONS GROUP, LLC
  • Location: Great Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring and capturing early diagnostic data

A deviance monitoring module is provided for examining various parameters of an operating system for deviance from a baseline behavior at specified intervals. A range of acceptable deviance values from a baseline behavior is set for parameters of an operating system. The parameters of the operating system are then monitored at specified intervals for deviance from the baseline behavior. In response to detecting that the deviance exceeds a predetermined threshold, the method triggers diagnostic data gathering on the parameters of the operating system according to an embodiment.

  • Pub Date: 2016/26/08
  • Number: 09619376
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing remote direct memory access (RDMA) with cache aligned operations

A system for optimizing remote direct memory accesses (RDMA) is provided. The system includes a first computing device and a second computing device disposed in signal communication with the first computing device. The first and second computing devices are respectively configured to exchange RDMA credentials during a setup of a communication link between the first and second computing devices. The exchanged RDMA credentials include cache line size information of the first computing device by which a cache aligned RDMA write operation is executable on a cache of the first computing device in accordance with the cache line size information by the second computing device.

  • Pub Date: 2016/25/08
  • Number: 09560137
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for shipping management in a network of moving things

Systems and methods for shipping management in a network of moving things. As non-limiting examples, various aspects of this disclosure provide systems and methods for integrating sensors, mobile access points, and/or the network of moving things with shipping container management systems (e.g., port management systems, train management systems, trucking management systems, etc.).

  • Pub Date: 2016/24/08
  • Number: 09648446
  • Owner: VENIAM, INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic availability-based integration of external functionality

A system includes a user interface allowing a developer to select a function to supplement functionality of an application under development. A data store holds identifiers for functions representing external functionality available from third party applications. A code generation module provides a software object to the developer for incorporation into a state of the application. The state includes a user interface element associated with an entity. When the state is instantiated, an action query is transmitted to a search system with the unique identifier of the selected function and information about the entity. The user interface element is selectively visually adapted in response to the search system response. In response to user selection of the user interface element, a search result, the search system is displayed, including (i) an identifier of a target application and (ii) an access mechanism for a specified state of the target application, is displayed.

  • Pub Date: 2016/24/08
  • Number: 09626158
  • Owner: Quixey, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Using anchors to correct GPS data in a network of moving things

Systems and methods are described that use anchors to correct satellite-based geographic positioning data in a network of moving things. A plurality of anchor nodes using low-cost, non-differential GPS capable receiver may be used to correct positioning information of a plurality of other nodes of a network of moving things. Nodes in the network may share correction information produced by the anchor nodes with neighboring nodes, enabling other nodes of the network to correct positioning information produced by their own receivers of satellite-based geo-positioning information.

  • Pub Date: 2016/23/08
  • Number: 09596570
  • Owner: Veniam, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Suggesting friends for playing a game

Exemplary methods, apparatuses, and systems provide a suggested list of people for a user of a social network system to play a game with. A social networking system receives a trigger for providing the user access from a user device to the game over a network. The social networking system identifies a pool of people who have a personal connection with the user and who have not played the game before. From the pool of people, a suggested list of people is selected based on closeness to the user. The suggested list is sent to the user device for the user device for the user to selectively invite one or more of the people to play the game.

  • Pub Date: 2016/23/08
  • Number: 09630114
  • Owner: FACEBOOK, INC.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Framework for graphics animation and compositing operations

A graphics animation and compositing operations framework has a layer tree for interfacing with the application and a render tree for interfacing with a render engine. Layers in the layer tree can be content, windows, views, video, images, text, media or other type of objects for an application's user interface. The application commits state changes of the layers of the layer tree. The application does not need to include explicit code for animating the changes to the layers. Instead, after a synchronization threshold has been met, an animation is determined for animating the change in state by the framework which can define a set of predetermined animations based on motion, visibility and transition. The determined animation is explicitly applied to the affected layers in the render tree. A render engine renders from the render tree into a frame buffer, synchronized with the display. Portions of the render tree changing relative to prior versions can be tracked to improve resource management.

  • Pub Date: 2016/19/08
  • Number: 09576388
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Secure storage for shared documents

Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption and a public key. Instruction set information that references at least a seed file that may be installed on the network computer may be generated. An encryption key based on the instruction set information may be generated. Header information that includes the instruction set may be generated. And, the header information may be encrypted using the public key. A secure bundle that includes the public key, the encrypted header information, and the encrypted data may be generated and provided to the user that provided the data and the public key or the application that provided the data and the public key. Decrypting the data included in the secure bundle the above actions are generally performed in reverse.

  • Pub Date: 2016/17/08
  • Number: 09647836
  • Owner: Centri Technology, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Beacon deployment for use with location based services (LBS)

An infrastructure of Bluetooth and/or Wi-Fi enabled RF tags or beacons deployed within a structure, an urban environment, a residence, buildings, real estate property, in a parking area, etc. The deployed beacons can be integrated with sensors to initiate or trigger an application. The infrastructure being used to recognize a presence of a user within the area to trigger activities, initiate Location Based Services (LBS), provide navigation, provide mapping, convey of information, initiate a link to a server or software, provide support during an emergency, provide assist to E-911 services, trigger an automation function, provide real estate information, and the like.

  • Pub Date: 2016/16/08
  • Number: 09538332
  • Details: Visit USPTO

Visit USPTO Page


Environment-aware security tokens

The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.

  • Pub Date: 2016/15/08
  • Number: 09608980
  • Owner: Document Dynamics, LLC
  • Location: Jewett City, US
  • Details: Visit USPTO

Visit USPTO Page


Method for operating electronic device for RF signal transmission and electronic device for the same

A method for operating an electronic device for transmission of a radio frequency (RF) signal includes selecting output power of a power amplifier (PA) required upon transmission of a signal with a second frequency through an antenna, determining a first PA operation voltage corresponding to the selected output power using first information stored in a memory of the electronic device and second information regarding a PA operation voltage corresponding to first output power of the PA at the second frequency, supplying the determined first PA operation voltage to the PA, and supplying input power corresponding to the selected output power at the second frequency to the PA. Other various embodiments are possible.

  • Pub Date: 2016/12/08
  • Number: 09660672
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for accessing an enterprise resource planning system via a mobile device

A method and apparatus for accessing an enterprise resource planning system via a mobile device is described. In one embodiment, the method includes parsing data from a host application access application into at least one object in an application-specific format, converting the data into an intermediate format that is compatible with a mobile device and communicating the converted data to the mobile device.

  • Pub Date: 2016/12/08
  • Number: 09661096
  • Owner: SYNACTIVE, INC.
  • Location: Foster City, US
  • Details: Visit USPTO

Visit USPTO Page


Method and means of CAD system personalization to provide a confidence level indicator for CAD system recommendations

A method and means to utilize machine learning to train a device to generate a confidence level indicator (CLI). The device is a CAD system that has been initially trained using initial machine learning to recommend classifications for image features presented to the device. Probabilistic classification is utilized to incorporate intermediate values given by a human operator to better indicate a level of confidence of the CAD system's recommendations as to what classes should be associated with certain image features.

  • Pub Date: 2016/11/08
  • Number: 09536054
  • Owner: ClearView Diagnostics Inc.
  • Location: Piscataway, US
  • Details: Visit USPTO

Visit USPTO Page


Using an enhanced data agent to restore backed up data across autonomous storage management systems

An exemplary system preserves the autonomy of two or more distinct storage management systems all the while enabling backed up data to be restored from a first storage management system (the “local system”) to a specially-configured client in a second storage management system (the “remote system”). For example, backed up data in the local system (e.g., a secondary copy of production data) may be transferred, in a restore operation, from secondary storage in the local storage management system, which originated the data, to a client of the remote storage management system (the “remote client”). As a specially-configured “restore-only client,” the remote client is limited to receiving backed up data from the local storage management system, via restore operation(s) managed by the local storage manager. The remote client remains a full-fledged client in its home system, the remote storage management system.

  • Pub Date: 2016/09/08
  • Number: 09645762
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of generating and using a bitmap index

Systems and methods of generating and using a bitmap index are disclosed. The bitmap index stores bit strings. In a particular implementation, each bit string in the bitmap index corresponds to an attribute of an audience. Each location in each bit string corresponds to the same audience member. The bitmap index supports parallelized and distributed execution of queries with respect to data indexed by the bitmap index. For example, the described bitmap index can be used to index advertising data, healthcare data, financial data, etc.

  • Pub Date: 2016/08/08
  • Number: 09626687
  • Owner: UMBEL CORPORATION
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing offers using a mobile device

A wireless device is enabled to provide offers. The wireless device receives card data for a financial account card and stores the card data in a memory associated with the wireless device. Responsive to using the card data in a transaction at a first merchant location, the wireless device receives transaction line-item data from a computing system associated with the first merchant location. The wireless device determines merchant information for a second merchant location and determines an offer associated with the second merchant location based on the line-item data and the merchant information for the second merchant. The wireless device presents the offer when the wireless device is near the second merchant location.

  • Pub Date: 2016/08/08
  • Number: 09558504
  • Owner: Capital One Financial Corporation
  • Location: McLean, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for enabling additional devices to check in to bluetooth low energy (BLE) beacons

Systems and methods are provided for checking many users in to a location using a Bluetooth® low energy (BLE) beacon. The provided systems and methods may allow a BLE beacon to facilitate a check in with a remote server that processes check ins and then disconnect from the device used to check in. The device may be assigned a unique identifier that may be broadcast from the device during the check in so that the BLE beacon can quickly scan for the identifier and connect with the device based on the identifier to provide content and other information to the device.

  • Pub Date: 2016/05/08
  • Number: 09571957
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Conversational agent with a particular style of expression

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for handing off a user conversation between computer-implemented agents. One of the methods includes receiving, by a computer-implemented agent specific to a user device, a digital representation of speech encoding an utterance, determining, by the computer-implemented agent, that the utterance specifies a requirement to establish a communication with another computer-implemented agent, and establishing, by the computer-implemented agent, a communication between the other computer-implemented agent and the user device.

  • Pub Date: 2016/04/08
  • Number: 09640180
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile device and method attributing media services network usage to requesting application

A wireless end-user device has a wireless modem, a network stack configurable to receive and transmit data via the modem and a wireless network, and two Application Programming Interfaces (APIs) available to device applications. The first API allows applications to open and use data flows via the network stack. The second API allows applications to make data transfer requests for media objects associated with network resource identifiers. The second API prompts a media service manager to manage network data transfers for the media object via the network stack. A service classification agent associates wireless network data usage for the media object network data transfers with the device application making the request.

  • Pub Date: 2016/03/08
  • Number: 09647918
  • Owner: Headwater Research LLC
  • Location: Tyler, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for data transfer and campaign management

An online and offline communication processing and tracking using data processing and data/voice networks is described. A phone address from a phone address number pool is automatically assigned to a first entity. A call quality rating is determined and recorded. A call from a caller directed to the phone address is received at a call bridging system coupled to at least one network, wherein the call is associated with call signaling information. Based at least in part on the call quality associated with the caller call, the caller call is assigned to a first location in a call queue. An outbound call is generated from the call bridging system and the inbound and the outbound calls are bridged. One or more parameters of the bridged call are compared to the call quality rating. An indication is recorded regarding the successful bridging of the calls in association with an entity identifier.

  • Pub Date: 2016/02/08
  • Number: 09621729
  • Owner: Invoca, Inc.
  • Location: Santa Barbara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for vector processing on behalf of image aperture aim

Provided is a system and method for aiming an image capturing mobile data processing system, performing a shoot action (e.g. shooting a picture), and subsequently processing a virtual vector determined between the image capturing mobile data processing system and a particular user carried mobile data processing system subject of the aim. Aiming information may include location information, directional and posture information, distance information, target size, and/or other shooting data to further qualify the shoot action. Permissions and configurations can govern data pulled or pushed. Wave forms which are not controllably aimed by nature can be accurately aimed.

  • Pub Date: 2016/01/08
  • Number: 09584993
  • Details: Visit USPTO

Visit USPTO Page


Treating damaged dermal or mucosal tissue with a whole, leech saliva extract

Methods are provided for isolating and using a whole-saliva leech extract. The methods can include feeding a phagostimulatory agent to a leech; inducing a regurgitation in the leech, the inducing including placing the leech in an environment having a temperature of less than about 0° C.; and, collecting an unrefined, whole saliva in the regurgitation of the cooled leech. The methods can include revitalizing the leech by warming it at a temperature ranging from about 5° C. to about 40° C. Stable, lyophilized, whole-saliva extracts of a leech are also provided, the extract having a stable activity when stored for use at a temperature below about −20° C., the extract maintaining at least 70% of the activity for at least 6 months. The extracts can be used to treat solid tumors, treat liquid tumors, treat diabetes, treat a viral disease, treat a parasitic disease, treat an antibacterial disease, or serve as an anti-oxidant.

  • Pub Date: 2016/28/07
  • Number: 09480720
  • Owner: BIOPEP SOLUTIONS, INC.
  • Location: Richmond, BC, CA
  • Details: Visit USPTO

Visit USPTO Page


Pharmaceutical compositions and methods

This invention relates the use of cortisol blockers (e.g., glucocorticoid receptor [GR] antagonists) for the treating or preventing viral infections, treating or preventing treatment resistant prostate cancer, treating or preventing neoplasia, and treating or preventing infection related to acute or chronic injury or disease.

  • Pub Date: 2016/28/07
  • Number: 09598459
  • Owner: Pop Test Oncology LLC
  • Location: Cliffside Park, US
  • Details: Visit USPTO

Visit USPTO Page


Maintaining or refraining from entering a sleep mode based on received conditions by application specific sensors

A data processing device may receive, from an application running on the data processing device, an indication that one or more sensors may be associated with a user input for the application. Based on sensing information collected from the one or more sensors, a characteristic of the user input may be determined by the data processing device. The data processing device may refrain from entering a sleep mode if the characteristic of the user input matches a specific characteristic condition specified by the application. The data processing device may allow entering the sleep mode if the characteristic of the user input does not match the specific characteristic condition for a specific timeout period specified by the application. The data processing device may receive the indication, information on the specific characteristic condition and/or information on the specific timeout period via invoking, by the application, one or more application programming interfaces (APIs).

  • Pub Date: 2016/28/07
  • Number: 09632570
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Risk-based test coverage and prioritization

A processor receives a rule containing a first set of code statements. The processor compares the first set of code statements of the rule to a second set of code statements of a plurality of code statements of source code. The processor responds to a match of the first set of code statements of the rule and the second set of code statements of the plurality of code statements of the source code, by applying a weight modifier to the rule, which adds a weighted value to the rule, and the processor, in response to a second matching of the first set of code statements of the rule to the second set of code statements of the plurality of code statements of the source code, applies the weight modifier to the rule, which includes a weighted value, and the weight modifier adjusts the weighted value of the rule.

  • Pub Date: 2016/27/07
  • Number: 09558104
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Notifying original state listeners of events in a domain model

Notifying original state listeners within a domain model. Identifying listener registration information pertaining to a listener. Monitoring a hierarchical relationship tree for an observable event, whereby the hierarchical relationship tree includes model objects, and whereby an observable event includes one or more of a change to a model object, an error condition associated with a model object, and the hierarchical relationship tree returning to an original state. Determining that a first observable event to the hierarchical relationship tree has occurred. Transmitting a notification to the listener detailing the occurrence of the first observable event. Determining that a second observable event to the hierarchical relationship tree has occurred. Determining that a third observable event to the hierarchical relationship tree has occurred, whereby the third observable event includes the hierarchical relationship tree returning to an original state. Transmitting a notification to the listener detailing the occurrence of the third observable event.

  • Pub Date: 2016/26/07
  • Number: 09584394
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring and responding to operational conditions of a logical partition from a separate logical partition

Communicating with a logical partition of a computing system based on a separate logical partition in which each of one or more computing systems includes a central electronics complex (CEC) capable of concurrently operating multiple logical partitions, each CEC includes a support element (SE), in which the SE includes access to memory locations of each of the multiple logical partitions within memory of the CEC, and the SE has a mapping of the memory locations for each of the multiple logical partitions. A request to retrieve data from the memory of a logical partition with an operational condition is detected. The request is transferred to an SE interface which enables remote access to the logical partition with the operational condition, and in response to receiving the data, the data that includes the operations status from the memory location of the logical partition is displayed.

  • Pub Date: 2016/26/07
  • Number: 09582352
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Segmented networks that implement scanning

Systems for providing scanning within distributed services are provided herein. In some embodiments, a system includes a plurality of segmented environments that each includes an enforcement point that has an active probe device, and a plurality of workloads that each implements at least one service. The system also has a data center server coupled with the plurality of segmented environments over a network. The data center server has a security controller configured to provide a security policy to each of the plurality of segmented environments and an active probe controller configured to cause the active probe device of the plurality of segmented environments to execute a scan.

  • Pub Date: 2016/25/07
  • Number: 09609026
  • Owner: vArmour Networks, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for maintaining release consistency in shared memory programming

A method and system for maintaining release consistency in shared memory programming on a computing device having multiple processing units includes, in response to a page fault, initiating a transfer, from one processing unit to another, of data associated with more than one but less than all of the pages of shared memory.

  • Pub Date: 2016/25/07
  • Number: 09552303
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and techniques for predictive data analytics

Systems and techniques for predictive data analytics are described. In a method for selecting a predictive model for a prediction problem, the suitabilities of predictive modeling procedures for the prediction problem may be determined based on characteristics of the prediction problem and/or on attributes of the respective modeling procedures. A subset of the predictive modeling procedures may be selected based on the determined suitabilities of the selected modeling procedures for the prediction problem. A resource allocation schedule allocating computational resources for execution of the selected modeling procedures may be generated, based on the determined suitabilities of the selected modeling procedures for the prediction problem. Results of the execution of the selected modeling procedures in accordance with the resource allocation schedule may be obtained. A predictive model for the prediction problem may be selected based on those results.

  • Pub Date: 2016/22/07
  • Number: 09659254
  • Owner: DataRobot, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Conversational agent with a particular spoken style of speech

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for handing off a user conversation between computer-implemented agents. One of the methods includes receiving, by a computer-implemented agent specific to a user device, a digital representation of speech encoding an utterance, determining, by the computer-implemented agent, that the utterance specifies a requirement to establish a communication with another computer-implemented agent, and establishing, by the computer-implemented agent, a communication between the other computer-implemented agent and the user device.

  • Pub Date: 2016/22/07
  • Number: 09601115
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions of carboxymethylcellulose and polyethylene oxide ionically cross-linked using polyhydroxyl organic anions

Ionically cross-linked compositions containing carboxypolysaccharides, polyalkylene oxides, polyhydroxyl organic anions, optionally divalent cations, and aqueous media are provided. Methods for manufacturing ionically cross-linked compositions of carboxypolysaccharides, polyalkylene oxides, polyhydroxyl organic anions, optionally divalent cations, and aqueous media are also provided. Such compositions can be used by placing then in proximity to a tissue in need of lubrication or for prevention of adhesions and adhesion reformation.

  • Pub Date: 2016/21/07
  • Number: 09636434
  • Owner: FZIOMED, Inc.
  • Location: San Luis Obispo, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing and executing sensitive logic semantics

Obfuscating denotational logic in a source program. A non-rule-based object oriented source program is received. The source program is transformed into a rule-based source program that includes an object model and a ruleset. Attribute domains of the rule-based source program are characterized by a structure of their values in which the structure of the values is nominal, ordered, interval, or ratio. A minimum cardinality is calculated for each domain attribute. First domain attributes are randomly mapped to second domain attributes, each second domain attribute having the same value structure and a same or higher cardinality as the corresponding first domain attribute. For each randomly mapped pair a domain range of the first domain attribute is mapped to a domain range of the second domain attribute. In the rule-based source program first domain input fields and values are replaced with the respective second domain input fields and values.

  • Pub Date: 2016/20/07
  • Number: 09626492
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Network-based malware detection

In an embodiment, a system, device and method for detecting a malicious attack is described. Herein, the system includes a security network device that conducts an analysis on received network traffic to detect a suspicious object associated with the network traffic and determine an identifier associated with a source of the suspicious object. Both information associated with the suspicious object and ancillary data, including information that identifies a return path for analysis results to a customer, are uploaded to a detection cloud. The detection cloud includes provisioning logic and one or more virtual machines that are provisioned by the provisioning logic in accordance with at least a portion of the ancillary data. The provisioning logic to customize functionality of the detection cloud for a specific customer.

  • Pub Date: 2016/18/07
  • Number: 09661009
  • Owner: FireEye, Inc.
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


Assigning communication paths among computing devices utilizing a multi-path communication protocol

A method for routing communication paths among computing devices. The method includes a one or more computer processors identifying a computing entity and a data storage entity that transfer data. The method further includes determining a plurality of communication ports that the data storage entity utilizes to transfer data to the computing entity. The method further includes identifying a plurality of computing resources respectively associated with the determined plurality of communication ports that the data storage entity utilizes to transfer the data to the computing entity. The method further includes generating a list of tuples for the data storage entity based, at least in part, on the identified plurality of computing resources and the determined plurality of communication ports.

  • Pub Date: 2016/14/07
  • Number: 09531626
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Gaming, system, method and device including a symbol changing or augmenting feature

Gaming systems, devices and methods are set forth which provide for the selection and application of modifiers to game outcomes. The modifiers confer different functionalities to base game symbols or an augmenting functionality to alter or provide an outcome. Different sets of modifiers may be accessed randomly or under different conditions and events.

  • Pub Date: 2016/13/07
  • Number: 09600958
  • Details: Visit USPTO

Visit USPTO Page


Remote processing of mobile applications

In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile associated with a requested resource, wherein the profile comprises at least one profile criterion. The method also includes evaluating the profile criterion based, at least in part, on status information associated with the client device to determine any processing restrictions associated with the requested resource. The method also includes, responsive to receiving an indication that the resource is subject to a server-device processing restriction, requesting access to the resource from a remote server and receiving an instance of a user interface for interacting with the resource.

  • Pub Date: 2016/12/07
  • Number: 09591001
  • Owner: AirWatch LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Codeless QR code

A service provider receives, from a user, picture information captured by a user device from a picture mark associated with a product or service of a merchant. It determines a matching picture image by comparing the picture information with picture images in a server, previously registered by the merchant. It also determines, out of attributes previously registered by the merchant, a matching attribute set uniquely associated with the matching picture image. The attributes may be web links, mobile APPs, or any media files that the merchant desires to communicate to users about its products or services. The service provider then communicates to the user the matching attribute set to be loaded on the user device and direct the user to the web links, mobile APPs, or media files that the merchant predetermined.

  • Pub Date: 2016/11/07
  • Number: 09547786
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system, and method for protecting against keylogging malware

An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.

  • Pub Date: 2016/11/07
  • Number: 09503473
  • Owner: Trusted Knight Corporation
  • Location: Annapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Advanced persistent threat detection

A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic at a gateway is used to trigger a query of an originating endpoint, which can use internal logs to identify a local process that is sourcing the network traffic. In another aspect, an endpoint is configured to periodically generate and transmit a secure heartbeat, so that an interruption of the heartbeat can be used to signal the possible presence of malware. In another aspect, other information such as local and global reputation information is used to provide context for more accurate malware detection.

  • Pub Date: 2016/11/07
  • Number: 09654489
  • Owner: Sophos Limited
  • Location: Abingdon, GB
  • Details: Visit USPTO

Visit USPTO Page


Voice command-driven database

A voice command-driven system and computer-implemented method are disclosed for selecting a data item in a list of text-based data items stored in a database using a simple affirmative voice command input without utilizing a connection to a network. The text-based data items in the list are converted to speech using an embedded text-to-speech engine and an audio output of a first converted data item is provided. A listening state is entered into for a predefined pause time to await receipt of the simple affirmative voice command input. If the simple affirmative voice command input is received during the predefined pause time, the first converted data item is selected for processing. If the simple affirmative voice command input is not received during the predefined pause time, an audio output of a next converted data item in the list is provided.

  • Pub Date: 2016/07/07
  • Number: 09619202
  • Owner: Intelligently Interactive, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic modeling of geospatial words in social media

Dynamically modelling geospatial words in social media, in one aspect, generates a word set based on frequencies of words occurring in GPS annotated text data generated by a GPS-enabled device containing latitude and longitude coordinates. Locations are partitioned by mapping GPS coordinates in the GPS annotated text data to a set of discrete non-overlapped locations. A text stream contained in the GPS annotated text data is segmented into time windows. Footprints of locations in time windows are generated. Geospatial weights associated with words in the word set may be generated based on localness of words determined based on the footprints. Words in a text message are extracted and scores are determined for the set of discrete non-overlapped locations associated with the words.

  • Pub Date: 2016/06/07
  • Number: 09569551
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for displaying recorded and live video feeds

A computing system device with processor(s) and memory displays a video monitoring user interface on the display. The video monitoring user interface includes a first region for displaying a live video feed and/or a recorded video feed from the video camera and a second region for displaying a event timeline. The event timeline includes a plurality of equally spaced time indicators each indicating a specific time and a current video feed indicator indicating the temporal position of the video feed displayed in the first region. The temporal position includes a past time corresponding to the previously recorded video feed from the video camera and a current time corresponding to the live video feed from the video camera. The current video feed indicator is movable relative to the equally spaced time indicators to facilitate a change in the temporal position of the video feed displayed in the first region.

  • Pub Date: 2016/05/07
  • Number: 09602860
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for detecting and presenting a new event in a video feed

The application is directed to a video monitoring user interface that includes a first region for displaying a live or recorded video feed from a video camera and a second region for displaying an event timeline. The event timeline includes equally spaced time indicators each indicating a specific time, and a moveable current video feed indicator indicating the temporal position of the video feed displayed in the first region. The temporal position includes a past time corresponding to the previously recorded video feed and a current time corresponding to the live video feed. The event timeline is displayed with event indicators corresponding to different types of events previously detected during a period of time associated with the event timeline. When a new event is detected, a new event indicator is displayed on the event timeline with the graphic display characteristic corresponding to the event type of the new event.

  • Pub Date: 2016/05/07
  • Number: 09609380
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile media communications system

A media communications system enabling mobile and desktop devices to communicate with websites relevant to a query that is shallow parsed, associated to predetermined categories, and regenerated as a conflated query array that includes extracted entities, associated categories, a location, and a geo-limit parameter. The media communications system further enables real-time messaging between the mobile and desktop devices and the websites, as well as generation of well-formed websites, media, and multimedia, with pre-rendered embedded content, and enables to concurrently and automatically demographically and geographically distributed push notifications to the websites and devices, and embeds relevancy-amplified, geotargeted media and multimedia communications, which media are selected by real-time machine-learned, high-probability consumer interest weighting and relevancy functions that are continuously updated in response to monitored consumer actions. The system further enables geographically regional and inter-regional systems management to enable automated replication and regional and demographic testing of the geotargeted and relevant communications.

  • Pub Date: 2016/01/07
  • Number: 09571969
  • Owner: Deep Rock Ventures, Inc.
  • Location: Thousand Oaks, US
  • Details: Visit USPTO

Visit USPTO Page


Federated namespace management

Described are techniques for managing a federated namespace of a data storage system federation. A node identifier is assigned to a node. The node identifier uniquely identifies the node in the data storage system federation and is included in a federated node identifier namespace. A portion of a federated target port identifier namespace may be associated with the node identifier. The portion may include target port identifiers reserved from the federated target port identifier namespace for the node. Data storage management information for the data storage system federation may be updated to indicate that the node identifier is allocated from the federated node identifier namespace and that the portion of the federated target port identifier namespace is assigned to the node identifier.

  • Pub Date: 2016/01/07
  • Number: 09661078
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Benzoxazepin oxazolidinone compounds and methods of use

  • Pub Date: 2016/01/07
  • Number: 09650393
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for halftone frequency detection

Embodiments of the present disclosure disclose methods and systems for halftone frequency detection in a halftone image. The method includes receiving a first window, a second window, and the halftone image having a predetermined resolution; assigning an active value to a max variable and a min variable associated with each pixel within a first pixel neighborhood defined by the first window based on a pixel intensity value being compared with a three-way threshold set determined based on values a plurality of predetermined statistical parameters; estimating a first frequency estimate and the second frequency estimate based on a number of pixels having active values in the max variable and the min variable respectively within a second pixel neighborhood defined by the second window; and determining the halftone frequency based on the first frequency estimate value, the second frequency estimate value, and the predetermined resolution.

  • Pub Date: 2016/30/06
  • Number: 09628635
  • Owner: XEROX CORPORATION
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for securing communication

A method for generating one or more secrets for use by members. The method includes sending a first request for connection with a second member, and sending a second request to connection with a third member. The method further includes receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member and receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member. The method further includes generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, extracting a secret from the message digest, and storing the secret in a secrets repository on the first member.

  • Pub Date: 2016/29/06
  • Number: 09654451
  • Owner: PACID TECHNOLOGIES, LLC
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for authenticating users

A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials). The secret is stored in a directory such that it is retrievable when the unique user input is received via a user interface of a device on which the security application executes or is coupled with. Responsive to receiving an identifier associated with the secret, the security application prompts, e.g., via a user interface of the mobile phone, entry of the unique user input; and, subsequently, verifies the unique user input. Following such verification, the security application provides the secret for use in encoding a communication with a remote computer-based station. Entry of the user credentials may be required prior to the security application generating the secret, and may be responsive to receipt of an invitation (e.g., from the remote computer-based station) to generate it.

  • Pub Date: 2016/28/06
  • Number: 09577993
  • Owner: PACID TECHNOLOGIES, LLC
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Service orchestration to support a cloud-based, multi-party video conferencing service in a virtual overlay network environment

Concepts and technologies disclosed herein are directed to service orchestration to support cloud-based, multi-party video conferencing service in a virtual overlay network environment. According to one aspect of the concepts and technologies disclosed herein, a video conferencing service orchestrator can receive, from a user device, a service request for the cloud-based, multi-party video conferencing service orchestrated by the video conferencing service orchestrator. In response to the service request, the video conferencing service orchestrator can provide, to the user device, virtual network layer system software and a virtual machine container for installation on the user device. The virtual network layer system software can implement a network function to provide an interface between the user device and a service controller during a video conference. A conference image particular to the type of video conference can be installed on the virtual machine container to implement the video conference for the user device.

  • Pub Date: 2016/28/06
  • Number: 09621853
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for collecting and disseminating information over a computer network

The apparatus comprises at least one database for storing digital information associated with at least a first user and a second user, at least one links module for the first user and for the second user, at least one manipulations module and at least one display device for respectively displaying at least said linked digital information wherein said linked digital information associated with said first user is automatically updated on at least said display device of said second user when that information is manipulated, and wherein said linked digital information associated with said second user is automatically updated on at least said display device of said first user when that information is manipulated.

  • Pub Date: 2016/28/06
  • Number: 09519911
  • Owner: mBLAST, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Suspending and resuming transactions through wireless beacon communications

There are provided systems and methods for suspending and resuming transactions through wireless beacon communications. A merchant may set up a wireless beacon with employee devices. The beacons may connect to a user's device and assist the employee with determining and suspending a transaction for the user. Based on the connections between the user's device and a wireless beacon attached to an employee device, the employee device may receive an identifier for the user. The identifier may also be received from a previous check-in by the user. The employee or a user may scan one or more items that the user may wish to purchase. A transaction may be generated using the scan and may be associated with the user's identifier. Later the transaction may be recalled using the user's identifier or a transaction code identifying the transaction. Payment information for the user may also be associated with the transaction.

  • Pub Date: 2016/27/06
  • Number: 09639834
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-electrode system with vibrating electrodes

A multi-electrode system includes a fiber holder that holds at least one optical fiber, a plurality of electrodes arranged to generate a heated field to heat the at least one optical fiber, and a vibration mechanism that causes at least one of the electrodes from the plurality of electrodes to vibrate. The electrodes can be disposed in at least a partial vacuum. The system can be used for processing many types of fibers, such processing including, as examples, stripping, splicing, annealing, tapering, and so on. Corresponding fiber processing methods are also provided.

  • Pub Date: 2016/27/06
  • Number: 09632252
  • Owner: 3SAE Technologies, Inc.
  • Location: Franklin, US
  • Details: Visit USPTO

Visit USPTO Page


Adapting legacy endpoints to modern APIs

Example methods and systems are directed to adapting legacy endpoints to modern application protocol interfaces (APIs). A legacy endpoint may provide a powerful and complex API. A modern application may desire access to the legacy endpoint. One or more layers may be added between the modern application and the legacy endpoint. Each layer may provide a different API. These layers of APIs may transform the interface from a powerful and complex interface to a more limited but simpler and easier to use interface. In some example embodiments, a proxy layer, an adapter layer, a facade layer, and a service layer may be used.

  • Pub Date: 2016/27/06
  • Number: 09576314
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing mobility in a network of moving things

Systems and methods for managing mobility in a network of moving things. As non-limiting examples, various aspects of this disclosure provide systems and methods for managing mobility in a network in which at least a portion of the network access points are moving.

  • Pub Date: 2016/24/06
  • Number: 09591676
  • Owner: VENIAM, INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic language selection for interactive voice response system

An interactive voice response (IVR) system performs automatic language selection without requiring the caller to provide a manual language selection input. The IVR system receives an incoming call along with appropriate caller identification. The IVR system sends a request for the caller's language preference information either to the caller's device or to a service provider that hosts the caller's account. After receiving the caller's language preference information, the IVR system selects a language for the caller and provides an IVR menu tree using the selected language. The selected language is persisted as the caller's preferred language at either the IVR system or at a service provider for future use.

  • Pub Date: 2016/24/06
  • Number: 09654631
  • Owner: RINGCENTRAL, INC.
  • Location: Belmont, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for receiving and processing detected events

Techniques for receiving and processing detected events are provided. A bit array may be received from a device. Each bit value in the bit array may indicate whether a user initiated event relating to interaction with a website was detected by the device. Data regarding a start time associated with the bit array may be received. Each bit value in the bit array is associated with a time increment after the start time.

  • Pub Date: 2016/23/06
  • Number: 09648117
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile device security

Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user's location based on a location of a mobile device. A transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers. In some implementations, a transaction initiated earlier is completed when the mobile device arrives at the merchant. Additionally, a parent-child or similar relationship may be established between multiple devices. Security on the mobile device based may be provided by biometric identification and calculation of variance from regular movement patterns. Advertisements may be sent to the mobile device based on bids from merchants near to the mobile device. Promotions may be sent to the mobile device when more than a threshold number of mobile devices are located at the same merchant.

  • Pub Date: 2016/23/06
  • Number: 09609577
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Secure telecommunications

The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences. In particular, a call initiator generates a meeting identifier and a first meeting key, which are encrypted using a first encryption key and distributed to one or more participants of the call. The one or more participants decrypt the meeting identifier and the first meeting key, and use that information to participate in the encrypted call. Further, participants respond to the encrypted communication data by encrypting their reply data with the first meeting key. The call initiator decrypts the reply data using the first meeting key.

  • Pub Date: 2016/22/06
  • Number: 09596079
  • Owner: Wickr Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Secure file transfer

The present disclosure describes techniques for storing encrypted files in a secure file repository and transferring those encrypted files to one or more recipients. A user selects a file to upload to a secure file repository. A secure collaboration app on the user's device generates a first encryption key that is used to encrypt the file. The encrypted file is then uploaded to the secure file repository, which provides the secure collaboration app with a random file name and a location of the encrypted file. The secure collaboration app updates locally stored metadata of the first encrypted file. To securely transfer the file, the user generates a second encryption key, encrypts the metadata with the second encryption key, and transmits the encrypted metadata to one or more receivers. The one or more receivers decrypt the encrypted metadata and use the decrypted metadata to retrieve the file and decrypt it.

  • Pub Date: 2016/22/06
  • Number: 09602477
  • Owner: Wickr Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Pest occurrence risk assessment and prediction in neighboring fields, crops and soils using crowd-sourced occurrence data

A pest and disease modeling framework for precision agriculture applies weather information, pest biological characteristics, and crop management data to anonymous crowd-sourced observations of pest presence for a reporting field. A risk assessment profile of pest occurrence for targeted fields in proximity to reporting fields is modeled to generate field-specific measures for pest management of pest infestation. The pest and disease modeling framework matches and filters weather and crop information in infested and pest-free fields based on the anonymous, crowd-sourced reporting of an existing pest presence, by evaluating similarities in pest-relevant data. Fields that are similar to infested fields have the highest risk of infestation, and the modeling framework provides output data in the form of a prediction of pest occurrence based on the risk assessment profile.

  • Pub Date: 2016/21/06
  • Number: 09563852
  • Owner: ITERIS, INC.
  • Location: Santa Ana, US
  • Details: Visit USPTO

Visit USPTO Page


Remote controlled vehicle with a head-mounted display apparatus

In some embodiments, extemporaneous control of remote objects can be made more natural using the invention, enabling a participant to pivot, tip and aim a head-mounted display apparatus to control a remote-controlled toy or full-sized vehicle, for example, hands-free. If the vehicle is outfitted with a camera, then the participant may see the remote location from first-person proprioceptive perspective.

  • Pub Date: 2016/20/06
  • Number: 09563202
  • Owner: MONKEYmedia, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Remote controlled vehicle with a handheld display device

In some embodiments, extemporaneous control of remote objects can be made more natural using the invention, enabling a participant to pivot, tip and aim a handheld display device to control a remote-controlled toy or full-sized vehicle, for example. If the vehicle is outfitted with a camera, then the participant may see the remote location from first-person proprioceptive perspective.

  • Pub Date: 2016/20/06
  • Number: 09579586
  • Owner: MONKEYmedia, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Managing software deployment

The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. The method further includes determining a security risk associated with the instance of software installed. The method further includes identifying a software management policy for the instance of software based upon the fingerprint, security risk, and designated purpose of the computing device. In one embodiment, the method further includes in response to identifying the software management policy, enforcing, by one or more computer processors, the software management policy on the instance of software installed on the computing device.

  • Pub Date: 2016/20/06
  • Number: 09542539
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Head-mounted display apparatus for navigating a virtual environment

In some embodiments, a head-mounted apparatus with a visual display and one or more sensors may make navigation of virtual environments more natural. The invention enables a participant to pivot, tip and aim the apparatus to orient and move through virtual space hands-free.

  • Pub Date: 2016/20/06
  • Number: 09612627
  • Owner: MONKEYmedia, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic master data management

A computer-implemented method includes, in a master data management system, receiving a persistent modification request affecting a master data attribute, determining that no preexisting master record exists in the master data management system for the master data attribute, and, responsive to determining that no preexisting master record exists for the master data attribute, adding a new master data attribute and associated new ownership information for the master data attribute to the master data management system, based on the persistent modification request. A corresponding computer program product and computer system are also disclosed.

  • Pub Date: 2016/20/06
  • Number: 09582660
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Social network interaction via games

Techniques for enabling members to learn about and interact with their social network via games are described. According to various embodiments, it is determined that a content item or entity associated with an online social network service is relevant to a member of the online social network service. An online game including a game question and a correct game answer is generated based on the content item or entity. The game question is then displayed to the member, and a member response to the displayed game question is received. Thereafter, a game result is displayed, and the member is enabled to interact with the content item or entity.

  • Pub Date: 2016/17/06
  • Number: 09558613
  • Owner: LinkedIn Corporation
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Voice over internet protocol credentials

A computer-implemented method to provide voice-over-internet protocol (VoIP) credentials to a device may include receiving, at a system, first credentials from a device. The method may also include authenticating the device using the first credentials and after authenticating the device, obtaining, at the system, a device identifier for the device based on the first credentials. The method may further include establishing a connection between the system and a VoIP system configured to provide VoIP services and after establishing the connection, providing, from the system, the device identifier to the VoIP system. The method may also include receiving, at the system, VoIP credentials for the device. In some embodiments, the VoIP credentials may be configured to authenticate the device with the VoIP system such that the device is able to receive the VoIP services from the VoIP system. The method may further include providing the VoIP credentials to the device.

  • Pub Date: 2016/16/06
  • Number: 09614973
  • Owner: Sorenson IP Holdings, LLC
  • Location: Salt Lake City, US
  • Details: Visit USPTO

Visit USPTO Page


Extended correlation methods in a content transformation engine

A second stage data feed is constructed in a neutral format from source data in a non-syndication format. A content transformation agent is customized for a first source data repository, and the first stage data feed is constructed in the neutral format by dynamically selecting and transforming within the first source data repository selected data primitives of the source data into the first stage data feed in the neutral format. The first stage data feed includes the selected data primitives stored originally in the first source data repository. The first stage data feed is sent to an aggregation agent that generates a second stage data feed as a union of selected data primitives from the first stage data feed. The second stage data feed is generated by detecting relationships among the selected data primitives. The second stage data feed includes related selected data primitives from the first stage data feed.

  • Pub Date: 2016/16/06
  • Number: 09646052
  • Owner: Boomerang Technology Holdings, LLC
  • Location: Irving, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for telephone number provisioning and telephony management

Systems, methods, and computer-readable media are provided for telephone number provisioning. A user interface configured to provide access to telephony information may be facilitated. The telephony information may be retained in a telephony information repository. Information about a first location may be processed. A region of interest may be determined. A set of telephony information may be processed based on the region of interest. Telephone number inventory corresponding to the region of interest may be determined based in part on the set of telephony information. Telephone number inventory may be categorized according to availability to determine a first set of telephone numbers. Local calling characteristics may be determined. Indication to the user interface of availability of telephone numbers within the region of interest based on the first set of telephone numbers and the local calling characteristics may be caused. The user interface may present graphical indicia that distinguishes the local calling characteristics.

  • Pub Date: 2016/15/06
  • Number: 09577980
  • Owner: YP LLC
  • Location: Tucker, US
  • Details: Visit USPTO

Visit USPTO Page


Spectrometry systems, methods, and applications

A hand held spectrometer is used to illuminate the object and measure the one or more spectra. The spectral data of the object can be used to determine one or more attributes of the object. In many embodiments, the spectrometer is coupled to a database of spectral information that can be used to determine the attributes of the object. The spectrometer system may comprise a hand held communication device coupled to a spectrometer, in which the user can input and receive data related to the measured object with the hand held communication device. The embodiments disclosed herein allow many users to share object data with many people, in order to provide many people with actionable intelligence in response to spectral data.

  • Pub Date: 2016/15/06
  • Number: 09562848
  • Owner: VERIFOOD, LTD.
  • Location: Herzliya, IL
  • Details: Visit USPTO

Visit USPTO Page


Remote alarm hushing

Methods and devices may be used to remotely hushing alarms by receiving an indication of an alarm event occurring at a remote device and presenting a visual indicator of the alarm event including a hush option to alter an audible and/or visual alarm notification of the remote device. A user selection of the hush option is received. In response to receiving the user selection of the hush option, communicating, from the electronic device to the remote device via a point-to-point low power wireless connection between the electronic device and the remote device, a hush request requests that the remote device alter its audible and/or visual alarm notification and causes an adjustment of the visual indicator to reflect a status of the hush request.

  • Pub Date: 2016/15/06
  • Number: 09635536
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Bulk uploading of multiple self-referencing objects

A computer implemented method, computer program product, and system for performing create, read, update, or delete operations on a plurality of resources in a client-server environment. In an embodiment, the computer implemented method includes the steps of identifying individual resources requiring operations to be performed, assigning local references for any resources to which a URI (Uniform Resource Identifier) has not been provided by the server, generating metadata describing the local references and operations to be performed, wrapping each individual resource with the metadata to provide a plurality of wrapped resources arranging the wrapped resources into a single payload, and transmitting the single payload to the server.

  • Pub Date: 2016/15/06
  • Number: 09584613
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Delivering promotions associated with user profiles through multiple digital channels associated with the user profiles

Multiple copies of the same coupon are delivered to a consumer simultaneously via different delivery channels. After one copy of the coupon has been presented in connection with a transaction and used, the coupon is marked as used with respect to all delivery channels for that consumer. Different copies of the coupon can have different coupon identifiers, for example when delivered through different channels. Consumers also can access such multichannel coupons without having to login each time they wish to access their coupons from multiple channels. In one implementation, each consumer has a user profile. A promotion is associated with that consumer's user profile. Each user profile also is associated with different channel identifiers representing communication channels to deliver instances of the promotion to the consumer. Each delivered instance of the promotion includes a coupon identifier associated with the promotion.

  • Pub Date: 2016/14/06
  • Number: 09639851
  • Owner: CodeBroker, LLC
  • Location: Belmont, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for computing location of a mobile device based on observed Wi-Fi access points

In one embodiment, scanning data is received for wireless access points whose wireless signals were observed by the one or more scanning devices in a target area. For each group of scanning data that shares a common identifier of a Wi-Fi access point, a centroid of the scanning data is determined, a set of scanning data of the group that exceeds a threshold distance from the centroid is designated as having potential error, and a location of the Wi-Fi access point is calculated. The calculated location of the Wi-Fi access point for each group of scanning data is stored in a reference database. Upon receiving a request for a location of a mobile device, an identity of one or more Wi-Fi access points in range of the mobile device is determined, and the location of the mobile device is computed using calculated locations from the reference database.

  • Pub Date: 2016/13/06
  • Number: 09554247
  • Owner: Skyhook Wireless, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for real-time analysis of network traffic

A system for monitoring live-data flow through a network includes a processor implementing a first processing node including an ingestor virtual machine (ingestor VM) for monitoring a mirrored live-data flow of the live-data flow passing through a selected point within the network in a non-intrusive manner that does not affect the live-data flow of at least one live data flow passing through the selected point. The ingestor VM further decodes each packet within the mirrored data flow according to each protocol associated with a packet and manages processes occurring within and between the first processing node and a second processing node. A time dependent buffer virtual machine (TDB VM) allocates a time dependent buffer (TDB) within the memory for executing the processes performed within and between the first processing node and a second processing node, and releasing the allocated TDB after completion of the processes. A governor virtual machine (governor VM) allocates memory resources within the memory between the first processing node and the second processing node for the processes performed within and between the first processing node and a second processing node. A grid virtual machine (grid VM) controls communications within and between the first processing nodes and between the first processing node and the second processing node.

  • Pub Date: 2016/13/06
  • Number: 09529621
  • Owner: Network Kinetix, LLC
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Reading station structures

In some examples, a reader system is provided for managing inventory items in an inventory system. The reader system may be configured to read tags associated with items stowed in an inventory holder. The inventory holder may be detachably coupled to a mobile drive unit. The mobile drive unit may move the inventory holder to a first position near an antenna of the reader system and the tags may begin to be read. While reading or at other times in the reading process, the mobile drive unit may move the inventory holder relative to the antenna. The identified tags may be compared to a manifest list of items expected to be stowed in the inventory holder.

  • Pub Date: 2016/13/06
  • Number: 09613338
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for quantum ready computations on the cloud

The present disclosure provides methods, systems, and media for allowing access to quantum computers in a distributed computing environment (e.g., the cloud). Such methods and systems may provide optimization and computational services on the cloud. Methods and systems of the present disclosure may enable quantum computing to be relatively and readily scaled across various types of quantum computers and users at various locations, in some cases without the need for users to have a deep understanding of the resources, implementation or the knowledge that may be required for solving optimization problems using a quantum computer. Systems provided herein may include user interfaces that enable users to perform data analysis in a distributed computing environment while taking advantage of quantum technology in the backend.

  • Pub Date: 2016/13/06
  • Number: 09537953
  • Owner: 1QB INFORMATION TECHNOLOGIES INC.
  • Location: Vancouver, BC, CA
  • Details: Visit USPTO

Visit USPTO Page


Load balancing in a central conferencing routing server

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants. In one embodiment, the conferencing routing service may maintain a database of information or preferences associated with the conference requester and attempt to select a conference bridge based on the requester's information. Further, the conferencing routing service may receive performance information from a plurality of conference bridges that are able to conduct the collaboration conference and select a conference bridge in response to the performance information.

  • Pub Date: 2016/13/06
  • Number: 09635071
  • Owner: Level 3 Communications, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptable framework for cloud assisted augmented reality

A mobile platform efficiently processes image data, using distributed processing in which latency sensitive operations are performed on the mobile platform, while latency insensitive, but computationally intensive operations are performed on a remote server. The mobile platform acquires image data, and determines whether there is a trigger event to transmit the image data to the server. The trigger event may be a change in the image data relative to previously acquired image data, e.g., a scene change in an image. When a change is present, the image data may be transmitted to the server for processing. The server processes the image data and returns information related to the image data, such as identification of an object in an image or a reference image or model. The mobile platform may then perform reference based tracking using the identified object or reference image or model.

  • Pub Date: 2016/10/06
  • Number: 09633447
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Vehicle-based abnormal travel event detecting and reporting

A travel reporter system is used to report abnormal travel events. In use, a sensor mounted on a vehicle obtains real-time data about an object near the vehicle. The object has an object type which is identified by processing the real-time data with an object recognition subsystem of the travel reporter system. An event evaluation subsystem of the travel reporter system processes the real-time data and the object type in order to determine that the object is associated with an abnormal travel event. The abnormal travel event has an event type which is processed by an event notification subsystem of the travel reporter system in order to select a first information consumer type. The event notification subsystem reports the abnormal travel event to information consumers having the first information consumer type.

  • Pub Date: 2016/09/06
  • Number: 09583000
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method, software and apparatus for performing actions on a wireless device using action lists and versioning

A system and method for performing actions on a wireless device using action lists and versioning. The system includes receiving, over a network, a remote action list version number, the remote action list version number associated with a remote action list containing an instruction for the wireless device. The system further includes determining whether the remote action list version number is different from a local action list version number. The system also includes sending, over a network, a request for the remote action list in response to determining the remote action list version number is different from the local action list version number. Also, the system includes receiving, over a network, the remote action list.

  • Pub Date: 2016/08/06
  • Number: 09591428
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for detecting restricted content associated with retrieved content

In embodiments of the present invention improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, presenting retrieved content in response to the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may utilize the contextual information from the client request to aid in the detection of restricted content associated with retrieved content.

  • Pub Date: 2016/08/06
  • Number: 09654488
  • Owner: Sophos Limited
  • Location: Abingdon, GB
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for anonosizing data

Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity, and security by enabling subjects to which data pertains to remain “dynamically anonymous,” i.e., anonymous for as long as is desired—and to the extent desired—are disclosed herein. This concept is also referred to herein as “anonosizing.” In some embodiments, the anonosizing of data may be implemented by encoding and decoding data under controlled conditions to support specific uses within designated authorized contexts. By anonosizing data controls via “identifying” and/or “associating” data elements within a population, data uses may be restricted to only those uses permissioned by a data subject or authorized third party. If new authorized data uses arise, all original data value and utility may be retained to support them—to the extent authorized by a data subject or authorized third party—but inappropriate, i.e., non-permissioned, uses of identifying information may be prevented.

  • Pub Date: 2016/06/06
  • Number: 09619669
  • Owner: Anonos Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of detecting delivery of malware based on indicators of compromise from different sources

According to one embodiment, a computerized method comprises receiving a set of indicators of compromise (IOCs) associated with a known malware of a first message type from a first source and receiving one or more IOCs (IOC(s)) from a second source that is different from the first source. Thereafter, a determination is made as to whether the received IOC(s) from the second source correspond to the set of IOCs received from the first source. If so, information associated with at least the set of IOCs is used to locate a malware of the first message type that is undetected at the second source.

  • Pub Date: 2016/06/06
  • Number: 09609007
  • Owner: FireEye, Inc.
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for storage and retrieval of blockchain blocks using galois fields

A method and system for storage and retrieval of blockchains with Galois Fields. One or more blocks for a blockchain are securely stored and retrieved with a modified Galois Fields on a cloud or peer-to-peer (P2P) communications network. The modified Galois Field provides at least additional layers for security and privacy for blockchains. The blocks and blockchains are securely stored and retrieved for cryptocurrency transactions including, but not limited to, BITCOIN transactions and other cryptocurrency transactions.

  • Pub Date: 2016/06/06
  • Number: 09569771
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical dependency analysis of source code

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generated aggregated dependencies between software elements in a code base. One of the methods includes processing selected software elements as represented by a raw dependency graph and a hierarchy graph to generate data representing an aggregated dependency graph, the aggregated dependency graph having nodes representing the selected software elements and aggregated dependencies between one or more of the selected software elements, wherein each aggregated dependency between a pair of the selected software elements represents that a first software element of the pair, or a descendant of the first software element according to the hierarchy graph, depends, according to the raw dependency graph, on a second software element of the pair or a descendant of the second software element according to the hierarchy graph. The data representing the aggregated dependency graph is provided in response to the request.

  • Pub Date: 2016/06/06
  • Number: 09658839
  • Owner: Semmle Limited
  • Location: Oxford, GB
  • Details: Visit USPTO

Visit USPTO Page


Electrical transformer failure prediction

A computing device predicts a probability of a transformer failure. An analysis type indicator defined by a user is received. A worth value for each of a plurality of variables is computed. Highest worth variables from the plurality of variables are selected based on the computed worth values. A number of variables of the highest worth variables is limited to a predetermined number based on the received analysis type indicator. A first model and a second model are also selected based on the received analysis type indicator. Historical electrical system data is partitioned into a training dataset and a validation dataset that are used to train and validate, respectively, the first model and the second model. A probability of failure model is selected as the first model or the second model based on a comparison between a fit of each model.

  • Pub Date: 2016/06/06
  • Number: 09652723
  • Owner: SAS Institute Inc.
  • Location: Cary, US
  • Details: Visit USPTO

Visit USPTO Page


Delivery of instructions in host applications

Embodiments of the systems described herein can implement one or more processes remotely delivering customized code to a host application and/or computing device. The host application may be configured as an Application Programming Interface with a customized code processing library that may configure the host application to receive further instructions remotely. The host application may be further configured to execute host code and/or third-party code. The host application may be configured to receive remote application logic, after the host application has been installed on a computing device, and to execute the received application logic to alter the behavior of the host application, such as selectively tracking end user interactions.

  • Pub Date: 2016/06/06
  • Number: 09635100
  • Owner: TEALIUM INC.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for categorizing detected motion events

A computing system device with processor(s) and memory displays a video monitoring user interface on the display. The video monitoring user interface includes a first region for displaying a live video feed and/or a recorded video feed from the video camera and a second region for displaying a single event timeline. The single event timeline includes a plurality of equally spaced time indicators each indicating a specific time and a current video feed indicator indicating the temporal position of the video feed displayed in the first region. The temporal position includes a past time corresponding to the previously recorded video feed from the video camera and a current time corresponding to the live video feed from the video camera. The current video feed indicator is movable relative to the equally spaced time indicators to facilitate a change in the temporal position of the video feed displayed in the first region.

  • Pub Date: 2016/03/06
  • Number: 09479822
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


User notifications for interaction information

A content management system creates and modifies user notification queues for shared content items synchronized between a content management system and multiple devices. A user notification queue includes interactions with a shared content item that may be presented to a user to indicate recent interactions with the shared content item by other sharing users. The content management system sends the user notification queue corresponding to a user to the user's device when the user accesses the content item. The client device displays a content item in a window associated with a process on the device. A client application displays an interaction indicator that presents user notification queue content to the user.

  • Pub Date: 2016/02/06
  • Number: 09596276
  • Owner: Dropbox, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Assessment of cyber threats

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for assessing cyber threats. In some implementations, data indicating a time window is received. Data indicating at least one dynamic Bayesian network (DBN) is accessed. A plurality of simulations are performed using the DBN, and outcomes of the plurality of simulations are sampled according to the state of the DBN representing the end of the time window. Based on the sampled outcomes of the simulations, a measure of impact of the computer-based threats to the organization over the time window is determined. The determined measure is provided for output to a user.

  • Pub Date: 2016/01/06
  • Number: 09537884
  • Owner: Cyberpoint International LLC
  • Location: Baltimore, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for multimodal short-cuts to digital services

A method and system for facilitating user access to services through a wireless device of a user, involves recommending to a user a subset of services from a plurality of services available to the user in which each recommended service of the subset has at least one voice short-cut associated therewith, and selecting a service to be accessed through the user's wireless device from the subset of services according to a voice command by the user corresponding to the voice short-cut of the service.

  • Pub Date: 2016/31/05
  • Number: 09497311
  • Owner: Nokia Technologies Oy
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Performance of secure mobile applications

A request for a first resource by a user is received. In response to receiving the request for a first resource, a second resource is determined based on the first resource and a resource usage pattern of the user. A response to the request for the first resource is provided. The response includes the first resource and the second resource.

  • Pub Date: 2016/31/05
  • Number: 09560163
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Modulators of androgen synthesis

The present specification discloses compositions comprising at least one therapeutic compound capable of modulating androgen production and methods and uses for treating a disorder associated with androgen production using such compositions and/or compounds.

  • Pub Date: 2016/31/05
  • Number: 09585890
  • Owner: Tangent Reprofiling Limited
  • Location: London, GB
  • Details: Visit USPTO

Visit USPTO Page


Methods and devices for a DDR memory driver using a voltage translation capacitor

Embodiments relate to systems, methods and computer readable media to enable design and creation of memory driver circuitry using a voltage translation capacitor. One embodiment is high speed level translation memory driver apparatus comprising a plurality of field effect transistors (FETs), complementary metal oxide semiconductor (CMOS) logic gates to drive the FETs, and a voltage translation capacitor with a first terminal of the voltage translation capacitor connected to an output of a second CMOS logic gate and a second terminal of the voltage translation capacitor connected to a gate terminal of a first P-type FET. Additional embodiments including other circuitry, associated methods, and media comprising instructions associated with generation of circuit design files are also described.

  • Pub Date: 2016/31/05
  • Number: 09589627
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic extraction of closed caption data from frames of an audio video (AV) stream using image filtering

Exemplary methods of extracting closed caption images from frames of an audio video (AV) stream are described. A first set of frames of a first AV stream including CC images and a second set of frames not including the CC images are received. Each pixel in the first frame is replaced with a dummy pixel, upon determination that a pixel at a corresponding position in the corresponding frame has a same color value to generate a filtered frame including dummy pixels and non-dummy pixels. First coordinates of the top-left most pixel of the first frame that is not a dummy pixel and second coordinates of the bottom-right most pixel of the first frame that is not a dummy pixel are determined. The filtered frame is cropped along the first and second coordinates to extract the CC image.

  • Pub Date: 2016/31/05
  • Number: 09652683
  • Owner: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


System and method for deploying handheld devices to secure an area

A handheld security system includes a set of handheld devices positioned at a group of access points to a secure area. The handheld device includes a set of input/output devices including a text and graphics display, a camera, a local security database and a set of security devices including an RFID reader, a bar code reader, a magnetic stripe card reader and a biometric scanner. The set of handheld devices are communicatively connected through wireless signaling and protocol to one another and to a server operating a global a global security database. The local security database is synchronized to the global security database. A location stack table is continuously updated with security events and monitored for violation of a set of anti-passback rules. An association table associates a set of assets and a set of personnel, allowing for visitor tracking and asset tracking on a schedule.

  • Pub Date: 2016/27/05
  • Number: 09619951
  • Owner: MDI Security, LLC
  • Location: San Antonio, US
  • Details: Visit USPTO

Visit USPTO Page


Method for decoupling caller routing services and off-net data acquisition

Call routing system and method for routing calls based upon an initiator's current location in a wireless communications network. The call routing system includes an interface to receive incoming communications directed to an identifier identifying different geographic locations of destination party. Interactive unit interacts with off-network providers. Call routing process is created to determine, based on the current location of the initiator, which geographic location to direct the communication and gateway mediation process is created to inquire from off-network service the current location of the initiator, to receive location data related to the initiator's current location, and to return the received location data to the call routing process. Interactive unit is configured to terminate communication to geographic location of the destination party based on the initiator's current location. Incoming communication and terminating communication are bridged at interactive unit.

  • Pub Date: 2016/27/05
  • Number: 09596346
  • Owner: 800 RESPONSE INFORMATION SERVICES LLC
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Integration of payment capability into secure elements of computers

Methods, secure elements, validation entities, and computer program products for effecting secure communication of payment information to merchants for Internet-based purchases. Payment information for a user's real payment information is installed in a secure element of a computer, the payment information may comprise a pseudo PAN number for the portable consumer device provided by a validation entity. The secure element is shielded from the computer's operating system to thwart hacker attacks. The user accesses the secure element to make a purchase. In response, the secure element contacts the validation entity with the pseudo account number, and in response obtains dynamic payment information that the secure element can used to effect the payment. The dynamic payment information comprises an account number that is different from the pseudo PAN, and which has at least one difference which respect to the user's real payment information.

  • Pub Date: 2016/27/05
  • Number: 09589268
  • Owner: Visa International Service Association
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


User interface interaction for transparent head-mounted displays

Embodiments of the present invention are directed toward enabling a user to quickly interact with a graphical user interface (GUI) displayed by the HMD. Utilizing techniques provided herein, a hand or other object can be used to select visual elements displayed by the HMD. The visual elements can be located within larger active regions, allowing the user to more easily select a visual element by selecting the active region in which the visual element is disposed.

  • Pub Date: 2016/26/05
  • Number: 09547374
  • Owner: QUALCOMM INCORPORATED
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing mobility aspects to applications in the cloud

An exemplary system according to the present disclosure comprises at least one mobility networking module implemented in at least one lower tier radiolet. The mobility network module performs one or more traffic data plane functions. The exemplary system further comprises at least one mobility application module implemented in at least one upper tier radiolet. The mobility application module performs one or more application data plane functions. The exemplary system further comprises at least one mobility cloud module implemented in the at least one lower tier radiolet and the at least one upper tier radiolet. The mobility cloud module performs computing execution functions of a cloud session.

  • Pub Date: 2016/25/05
  • Number: 09635580
  • Owner: Alef Mobitech Inc.
  • Location: Bernardsville, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing messages to users of a social network using a prediction model that determines likelihood of user performing desired activity

Techniques to optimize messages sent to a user of a social networking system. In one embodiment, information about the user may be collected by the social networking system. The information may be applied to train a model for determining likelihood of a desired action by the user in response to candidate messages that may be provided for the user. The social networking system may provide to the user a message from the candidate messages with a selected likelihood of causing the desired action.

  • Pub Date: 2016/24/05
  • Number: 09584465
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Generating comprehensive symbol tables for source code files

A computer program product includes instructions to identify a primary symbol table associated with a primary source code file and identify a secondary symbol table associated with a secondary source code file. The computer program product includes instructions to receive a source code association indication. The source code association indication includes at least one association relationship between the primary source code file and the secondary source code file. The computer program product includes instructions to create a comprehensive symbol table. The comprehensive symbol table comprises contents of the primary symbol table and contents of the secondary symbol table. A corresponding computer-implemented method and computer system are also disclosed.

  • Pub Date: 2016/24/05
  • Number: 09513877
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network

A system and method monitors for fraudulent transactions relating to a mobile device. Either of first and second processing nodes places a hold on a transaction associated with the first live-data flow and the second live-data flow responsive to detection of a potentially fraudulent condition. A third processing node generates an interactive verification communication responsive to the first data associated with the first live-data flow and the second data associated with the second live-data flow to establish a validity of the transaction. The third processing node releases the hold on the transaction responsive to the interactive verification communication determining the potentially fraudulent condition relates to a non-fraudulent transaction and generates a fraud detection response responsive to the interactive verification communication determining the potentially fraudulent condition relates to a fraudulent transaction before the transaction completes.

  • Pub Date: 2016/23/05
  • Number: 09532227
  • Owner: NETWORK KINETIX, LLC
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Interprocessor memory status communication

In a transactional memory environment including a first processor and one or more additional processors, a computer-implemented method includes identifying a memory location and sending a probe request from the first processor to the additional processors. The probe request includes the memory location. The computer implemented method further includes generating, by each additional processor, an indication including whether the memory location is in use for a transaction by the additional processor. The computer-implemented method further includes sending the indication from each additional processor to the first processor and proceeding, by the first processor, based on the indication.

  • Pub Date: 2016/23/05
  • Number: 09563468
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Executing a kernel device driver as a user space process

A method, including receiving, by a user space driver framework (UDF) library executing from a user space of a memory over a monolithic operating system kernel, a kernel application programming interface (API) call from a device driver executing from the user space. The UDF library then performs an operation corresponding to the kernel API call.

  • Pub Date: 2016/23/05
  • Number: 09619308
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Zero-wait publishing, searching, and queuing systems and methods

Zero-wait publishing, searching, and queuing systems and methods are disclosed. The system includes a local retail service engagement application installed on a mobile device. The application requests a service from a service provider system. The application receives data associated with a service provider from the service provider system, transmits a request for a reservation, receives a confirmation of the reservation, transmits a queue request to a queuing system, and receives a confirmation of the queue request. The application determines a physical location of the mobile device, calculates a distance between the mobile device and the service provider, and transmits an estimated arrival time. When the mobile device arrives, the queuing system searches for the mobile device. The system further includes an identification, location and authentication system. The service provider system receives authentication and the relative location of the mobile device and retrieves the reservation.

  • Pub Date: 2016/20/05
  • Number: 09646325
  • Owner: CloudTraQ LLC
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for caching augmented reality target data at user devices

Systems and methods are disclosed for transmitting, to user devices, data for potential targets predicted to be identified in an augmented reality application. One method includes receiving a request for target data related to at least one physical object within an image of a real-world environment captured at the device; identifying a current target representing the physical object within a virtual environment corresponding to the real-world environment; determining at least one potential future target to be identified at the device based on identified coincident target requests; and sending to the device target data for each of the current and potential future targets based on the determination, wherein the device presents the target data for the current target within the virtual environment displayed at the device and store the target data for the potential future target in a local memory of the device.

  • Pub Date: 2016/19/05
  • Number: 09553946
  • Owner: AOL Advertising Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Providing social impact information associated with identified products or businesses

Embodiments of the invention are directed to methods and apparatuses for capturing a real-time video stream using a mobile computing device, determining, using a computing device processor, which images from the real-time video stream are associated with goods and businesses consistent with a predetermined social impact, and presenting on a display of the real-time video stream, one or more indicators, each indicator being associated with an image determined to be consistent with a predetermined social impact.

  • Pub Date: 2016/19/05
  • Number: 09530145
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Unmanned aerial vehicle authorization and geofence envelope determination

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for unmanned aerial vehicle authorization and geofence envelope determination. One of the methods includes determining, by an electronic system in an Unmanned Aerial Vehicle (UAV), an estimated fuel remaining in the UAV. An estimated fuel consumption of the UAV is determined. Estimated information associated with wind affecting the UAV is determined using information obtained from sensors included in the UAV. Estimated flights times remaining for a current path, and one or more alternative flight paths, are determined using the determined estimated fuel remaining, determined estimated fuel consumption, determined information associated wind, and information describing each flight path. In response to the electronic system determining that the estimated fuel remaining, after completion of the current flight path, would be below a first threshold, an alternative flight path is selected.

  • Pub Date: 2016/18/05
  • Number: 09607522
  • Owner: UNMANNED INNOVATION, INC.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Day and night detection based on one or more of illuminant detection, lux level detection, and tiling

A method for controlling a camera mode is executed at a camera including a controller, a sensor array, an IR filter, and a lens assembly. The camera is operated in a night mode. While in the night mode the IR filter is not interposed between the lens assembly and the sensor array, the camera receives at the sensor array ambient light that is not filtered by the IR filter, determines whether the received ambient light is due to a light source other than an IR light source, and detects a light level of the received ambient light. The camera switches the operation of the camera from the night mode to a day mode when it is determined the received ambient light is due to a light source other than an IR light source and that the light level of the received ambient light exceeds a first threshold.

  • Pub Date: 2016/18/05
  • Number: 09549124
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Technology for stall detection

Detecting stalling of a software process in a computer system includes receiving identification of a work process thread group, including a work process thread, for a task. The task is marked as running responsive to detecting whether there is a state change for the work process thread and is marked as stalled responsive to detecting an absence of the state change for a first predefined amount of time. The work process is marked as stalled responsive to detecting an absence of a predetermined signal from the work process for a second predefined amount of time. An API gets stack traces for the work process thread via calls. Instances of a hash are calculated for each of the stack traces. Respective instances of the hash calculated at least the first amount of time apart are compared for detecting whether there is a state change for the work process thread.

  • Pub Date: 2016/17/05
  • Number: 09558058
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content

A security system for authenticating users and protecting content that provides an application program interface (API) with a Cloud Platform integration (Platform) to extend the security capabilities of Public Key Infrastructure and Privilege Management Infrastructure systems to authenticated external users and protected content.

  • Pub Date: 2016/13/05
  • Number: 09578035
  • Owner: T-Central, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Robust routing and delivery of notifications

Embodiments are directed towards a notification message system arranged to generate notification messages. Responsible resources may be determined based on the notification messages and a schedule. A plurality of message providers that have a provider profiles may be determined based on the responsible resources and a region. A message provider from the plurality of message providers may be determined based on its provider profile. The notification messages may be provided to the message provider so they can be provided to the responsible resources. The provider profiles may be updated based on performance metrics associated with the message provider.

  • Pub Date: 2016/13/05
  • Number: 09467970
  • Owner: PagerDuty, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Resource-centric authorization schemes

A method includes receiving a request of a user to perform an operation with respect to a first resource, in response to the request, determining, in view of a resource-based master data structure, a first resource-based permission data structure associated with the first resource, and accessing the first resource-based permission data structure to identify a first resource entry associated with the user. The method further includes upon determining that the first resource entry does not indicate that the user has a permission to perform the requested operation with respect to the first resource, determining a second resource-based permission data structure associated with a second resource that is a parent of the first resource, accessing the second resource-based permission data structure to identify a second resource entry associated with the user, and upon determining that the second resource entry indicates that the user has a permission to perform the requested operation with respect to the second resource, allowing the user to perform the requested operation with respect to the first resource.

  • Pub Date: 2016/13/05
  • Number: 09602517
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Invariant biohash security system and method

Systems, methods, and program products for providing secure authentication for electronic messages are disclosed. A method may comprise generating an asymmetric private key based at least in part upon an invariant biometric feature vector derived from an input biometric reading. The private key may be further based at least in part upon a user password. The resulting private key may not be stored but rather may be generated when required to authenticate an electronic message, at which time it may be used to provide a digital signature for the electronic message. The private key may be deleted after use. The private key may be regenerated by inputting both a new instance of the biometric reading as well as a new instance of the password.

  • Pub Date: 2016/13/05
  • Number: 09483762
  • Owner: ISLAND INTELLECTUAL PROPERTY, LLC
  • Location: Manhasset, US
  • Details: Visit USPTO

Visit USPTO Page


Organizing messages in a messaging system using social network information

A messaging system receives a message that is intended for a recipient, who is a user of a social networking system. An object associated with the message is identified based on the message content and/or metadata associated with the message. The messaging system accesses a social networking system database to obtain social information about a relationship between the recipient and the identified object. The message is then indexed using the social information, wherein an entry for the message is stored in a message index based on the social information. This process may be repeated for each received message, and multiple different message indexes may be generated for received messages to track different types of social information. A user interface for viewing messages uses the message index to organize the messages, such as to filter, categorize, and/or sort the messages in the display.

  • Pub Date: 2016/12/05
  • Number: 09590944
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Slitted tissue fixation devices and assemblies for deploying the same

Tissue fasteners carried on a tissue piercing deployment wire fasten tissue layers of a mammalian body together include a first member, a second member, and a connecting member extending between the first and second members. One of the first and second members has a configuration alterable by a deployment wire to permit release of the fastener from the deployment wire after deployment and without causing excessive tissue trauma.

  • Pub Date: 2016/11/05
  • Number: 09572578
  • Owner: EndoGastric Solutions, Inc.
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Proxy based data transfer utilizing direct memory access

A method for transferring data utilizing direct memory access. The method includes a computer processor establishing a networking connection, using a proxy, between at least a first computing entity and a second computing entity. The method further includes determining a shared memory space for the established networking connection between at least the first computing entity and the second computing entity. The method further includes allocating the shared memory space from heap memory. The method further includes transmitting data over the established networking connection between at least the first computing entity and the second computing entity utilizing a direct memory access protocol and the allocated shared memory space.

  • Pub Date: 2016/11/05
  • Number: 09495284
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Periodic database search manager for multiple data sources

Systems and techniques for searching multiple data sources are described herein. Users may specify searches of multiple data sources to occur on a periodic basis. The searches may be configured to search time or date ranges that have not previously been searched. A user may select the data sources of interest and specify search terms, review and edit previously created searches, and review results of searches. The system automatically performs the specified searches, and notifies the user and/or a team of the user each time new results are found. The system may efficiently search the data sources by storing previous search results and comparing the previous results to current search results to identify new search results.

  • Pub Date: 2016/11/05
  • Number: 09547693
  • Owner: PALANTIR TECHNOLOGIES INC.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment

In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer data exchange environment, wherein a secure email input facility for accepting non-secure email from outside the exchange into the secure collaborative computer data exchange environment, wherein the non-secure email is received and the non-secure email and/or the content delivered thereby is stored as secure content in a location of the secure exchange server related to at least one of the sender of the email, the subject line of the non-secure email, the destination address of the email within the exchange, and the content of the email.

  • Pub Date: 2016/11/05
  • Number: 09596227
  • Owner: Intralinks, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for newsroom management with electronic-publish-point integration

Presently described are systems and methods for newsroom management with electronic-publish-point integration. One example embodiment takes the form of a non-transitory computer-readable medium containing instructions that, when executed by a processor, cause a set of steps to be carried out for submitting content to an electronic publish point. The set of steps includes providing a newsroom script to a user via a user interface; receiving a selected portion of an on-air text portion of the newsroom script from the user via the user interface; and retrieving, from a media database, media associated with the newsroom script. The set of steps further includes submitting content to the publish point, wherein the content includes text associated with the selected portion of the on-air text portion, and wherein the content further includes the retrieved media.

  • Pub Date: 2016/10/05
  • Number: 09495472
  • Owner: Tribune Broadcasting Company, LLC
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Cross-site, TOTP-based two factor authentication

A host machine has a web browser. A user of the host machine also has a mobile device. A time-based, one-time password (TOTP) authentication scheme leverages a plug-in associated with the browser to automatically inject a received TOTP code into an element of an HTML-based TOTP authentication page, and to programmatically submit the HTML form (e.g., by mimicking the “click to submit” button on the TOTP form). Typically, the TOTP code is obtained following a successful completion of a push notification interaction between a cloud service, which stores TOTP shared secrets that are used to generate the TOTP codes, and the user of the mobile device.

  • Pub Date: 2016/10/05
  • Number: 09596223
  • Owner: LogMeIn, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Remote display performance measurement triggered by application display upgrade

Methods, systems, and computer programs are provided for measuring the performance of display images received on a remote computer display. One method includes an operation for detecting calls from an application to an application programming interface (API), which is provided for rendering images on a display image, each call causing an update of the display image. Further, the method includes an operation for embedding data for measuring performance in display frames of the display image based on the detecting. The embedding results in modified displayed frames with respective data for measuring performance. The modified displayed frames are transmitted to a remote client, which results in received modified display frames having respective received data for measuring the performance. In addition, the method includes an operation for calculating the remote display quality for the given application based on the received modified display frames and the respective received data for measuring performance.

  • Pub Date: 2016/09/05
  • Number: 09578373
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Retractable stair system with precision elevation control

A retractable stair system for vehicles. The apparatus includes stairs which are retractable into a frame, or extendable to provide a set of stairs with relatively uniform height therebetween. Indexing plates with locking notches and companion latches with latch tongues to fit in the notches enable adjustment of the height of a top step S in a set of steps in an extensible-retractable stairs assembly. Extensible legs are provided which are individually vertically adjustable to provide secure engagement with an uneven substrate such as rocky ground or a sloping surface. Foot pads are pivotally attached to the extensible legs. The combination of vertical adjustability, the selection of a desired number of stairs, and individual top stair height adjustability, make the unit adaptable for use in a variety of vehicles.

  • Pub Date: 2016/08/05
  • Number: 09527448
  • Owner: TORKLIFT INTERNATIONAL INC.
  • Location: Kent, US
  • Details: Visit USPTO

Visit USPTO Page


Clustering for parallel processing

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for clustering for parallel processing. One of the methods includes providing virtual machines with an interface to a shuffle service, the shuffle service executing external of the virtual machines. The method includes receiving data records through the interface, each data record having a key and a value. The method includes partitioning the data records, using the shuffle service, according to the respective keys. The method includes providing a part of the partitioned data records through the interface to the virtual machines, wherein data records having the same key are provided to the same virtual machine. Each of the virtual machines can execute on a host machine and each of the virtual machine is a hardware virtualization of a machine.

  • Pub Date: 2016/06/05
  • Number: 09535742
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for a computer understanding of multi modal data streams

Systems and methods for understanding (imputing meaning to) multi modal data streams may be used in intelligent surveillance and allow a) real-time integration of streaming data from video, audio, infrared and other sensors; b) processing of the results of such integration to obtain understanding of the situation as it unfolds; c) assessing the level of threat inherent in the situation; and d) generating of warning advisories delivered to appropriate recipients as necessary for mitigating the threat. The system generates understanding of the system by creating and manipulating models of the situation as it unfolds. The creation and manipulation involve “neuronal packets” formed in mutually constraining associative networks of four basic types. The process is thermodynamically driven, striving to produce a minimal number of maximally stable models. Obtaining such models is experienced as grasping, or understanding the input stream (objects, their relations and the flow of changes).

  • Pub Date: 2016/05/05
  • Number: 09563843
  • Details: Visit USPTO

Visit USPTO Page


Wet ink texture engine for reduced lag digital inking

A wet ink texture engine and associated method. The wet ink texture engine may run in the context of any application on any device, service, or general endpoint capable of receiving ink input. For example, the wet ink texture engine may be used in the context of a note application that receives input in the form of writing or drawing. The wet ink texture engine reduces, minimizes, or eliminates lag between receiving the input and displaying the input to improve inking experience for the user.

  • Pub Date: 2016/04/05
  • Number: 09454254
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of notifying mobile devices to complete transactions after additional agent verification

A method of completing a transaction that requires authorization by an authority agent includes registering an authority device as associated with the authority agent, receiving a transaction request from a service provider; pushing an authentication notification to the authenticating application of the authority device; displaying the authentication notification, including a prompt to supply agent verification data, on the authority device; collecting and verifying the agent verification data; in response to verification of the agent verification data, transmitting an authority agent response from the authority device to the authentication platform, and, at the authentication platform, authenticating the authority agent response; and in response to authenticating the authority agent response, transmitting a transaction confirmation from the authentication platform to the service provider.

  • Pub Date: 2016/04/05
  • Number: 09532222
  • Owner: Duo Security, Inc.
  • Location: Ann Arbor, US
  • Details: Visit USPTO

Visit USPTO Page


Overlay networks for application groups

A method and apparatus for configuring an overlay network are provided. In the method and apparatus, a first application is caused to be deployed for execution on the first computer system, with the application being member of an application group. First information is provided to the first computer system, with the first information being usable for securing communication between at least the first application and a second application deployed to a second computer system. Second information usable for establishing a routing entity for the first computer system is provided to the first computer system, with the routing entity established to route data from or to the first application.

  • Pub Date: 2016/04/05
  • Number: 09602612
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-module compilation system, multi-module compilation method, and non-transitory computer-readable storage medium

Provided is a multi-module compilation system for generating execution codes for each of modules in a module system. The multi-module compilation system may include a module identifier configured to analyze a program code of the module system and to identify target modules that execute the program code, a module code generator configured to divide the program code into module codes for each of the target modules and to generate the module codes, and a compiler configured to compile the module codes and to generate execution codes for each of the target modules.

  • Pub Date: 2016/04/05
  • Number: 09524148
  • Owner: LUXROBO
  • Location: , KR
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and apparatus for displaying the multimedia information from wireless communication networks

Video signals for a mobile terminal are converted to accommodate reproduction by an alternative display terminal. The video signal is processed to provide a converted video signal appropriate for an alternative display terminal that is separate from the mobile terminal. This converted video signal is then provided for the alternative display terminal to accommodate the corresponding video display on a screen provided by the alternative (e.g., external) display terminal.

  • Pub Date: 2016/04/05
  • Number: 09589531
  • Owner: Virginia Innovation Sciences, Inc.
  • Location: Alexandria, US
  • Details: Visit USPTO

Visit USPTO Page


Invariant biohash security system and method

Systems, methods, and program products for providing secure authentication for electronic messages are disclosed. A method may comprise generating an asymmetric private key based at least in part upon an invariant biometric feature vector derived from an input biometric reading. The private key may be further based at least in part upon a user password. The resulting private key may not be stored but rather may be generated when required to authenticate an electronic message, at which time it may be used to provide a digital signature for the electronic message. The private key may be deleted after use. The private key may be regenerated by inputting both a new instance of the biometric reading as well as a new instance of the password.

  • Pub Date: 2016/04/05
  • Number: 09569773
  • Owner: ISLAND INTELLECTUAL PROPERTY, LLC
  • Location: Manhasset, US
  • Details: Visit USPTO

Visit USPTO Page


Sensor control switch

A method and apparatus for governing sensor data readings from a plurality of input sensors onboard a communications device. An inventory of available input sensors is generated, and a set of requested input sensors from an application running on the communications device is received. The requested input sensors that are absent from the inventory of available input sensors is identified, and based upon received measured values from the available input sensors, equivalent values for those absent input sensors are derived. The accuracy and precision of the measured and equivalent sensor values are estimated, and those measurements not meeting certain thresholds are filtered. The measured values and the derived equivalent values meeting the predetermined thresholds for accuracy and precision, and the filtered measured values and the filtered derived equivalent values are output to the application.

  • Pub Date: 2016/03/05
  • Number: 09578493
  • Owner: ADTILE TECHNOLOGIES INC.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Resource server providing a rapidly changing resource

A computing device is provided that supports receipt and processing of blocks of streamed data associated with an event and provision of pre-rendered and compressed events to event client systems with a high-throughput. The computing device includes a compression optimizer module that determines how to make new compressed blocks of the right level of compression as the blocks of streamed data are received from an event publishing system. The compression optimizer module utilizes a tree map and unique identifiers to selectively compress, read, and recompress the blocks of streamed data associated with each event. To prevent duplicate work in compressing the streamed data, compressed blocks are re-used where possible to support requests from the event client systems. Each new block includes a unique identifier defined by the event publishing system that generated the event, so that a previous version of the event in a compressed block can be replaced.

  • Pub Date: 2016/03/05
  • Number: 09654586
  • Owner: SAS Institute Inc.
  • Location: Cary, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for intermodal container handling

A rail-road intermodal freight system. In an embodiment, a conveyor system is provided for placing rail cars in a position for loading shipping containers thereon, while an over-the-road trailer is secured to the rail car. Rail cars have a frame with a front end and a rear end, and a bogie having at least four flanged rail wheels is pivotally mounted to the rear of the frame of the rail car. A method for unloading the rail cars includes lifting the front of the frame of the rail cars and pivoting the rail cars by an angle alpha from the track direction at an unloading area, and lowering the front end of the frame to the ground to allow truck access to trailers on the rail car. By utilizing the method, efficient loading and unloading of train involved in intermodal shipments may save considerable time, and thus reduce costs.

  • Pub Date: 2016/02/05
  • Number: 09637327
  • Owner: SEA-TRAIN EXPRESS—LLC
  • Location: Federal Way, US
  • Details: Visit USPTO

Visit USPTO Page


Granular event management for service platforms

Granular event management for service platforms. First bundle information relating to the content of a bundle is received at a first time, wherein the bundle relates to one or more resources in an application of a distributed computing environment. The bundle is monitored for a bundle event, wherein the bundle event is generated from a change in a lifecycle state of the bundle. Whether the bundle event has occurred is determined. Responsive to determining that the bundle event has occurred, second bundle information relating to the content of the bundle is received at a second time. Responsive to receiving the second bundle information, a granular event associated with the bundle event is identified, wherein the granular event relates to a difference between the first bundle information and the second bundle information.

  • Pub Date: 2016/02/05
  • Number: 09471403
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of using a bitmap index to determine bicliques

A method includes receiving, at a computing device comprising a processor, a request to determine bicliques in a graph, where the graph includes a first set of nodes, a second set of nodes, and a set of edges, each edge in the set of edges connecting a node in the first set of nodes to a node in the second set of nodes. The method also includes determining at least one biclique based on querying a bitmap index representing the graph, where the bitmap index includes a plurality of bit strings corresponding to the first set of nodes, and where a value stored in a particular location in each bit string indicates whether an edge connects a first node corresponding to the bit string to a second node corresponding to the particular location.

  • Pub Date: 2016/29/04
  • Number: 09607104
  • Owner: UMBEL CORPORATION
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


System for business intelligence data integration

A system for business intelligence data integration, comprising a query transformation server that receives an SQL query, applies transformations to the query, and embeds the transformed query into an XML web services request. At least a portion of the XML web services request is sent to a business intelligence engine web service. An XML response is received from the business intelligence engine web service. The system applies modifications to the XML response including extracting SQL from the XML and adding back the visualization-specific column to generate a complete SQL response, which is provided to the client device.

  • Pub Date: 2016/29/04
  • Number: 09639630
  • Owner: GUIDANZ INC.
  • Location: Fremont, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for management of video and ring tones among mobile devices

Provided herein are methods and systems for a sender-controlled contact media content type that can be sent among mobile devices, including addressing the contacts systems and methods of such devices to provide rich interactions among users upon the occurrence of contact events.

  • Pub Date: 2016/29/04
  • Number: 09609124
  • Owner: Vyng, Inc.
  • Location: Santa Monica, US
  • Details: Visit USPTO

Visit USPTO Page


Bitmap index including internal metadata storage

A method includes receiving a query directed to a bitmap index. The bitmap index includes a plurality of bit strings, where a value stored in a particular location in each of the bit strings indicates whether a corresponding signal associated with a signal source has been received, and where the bitmap index includes at least a first metadata value associated with each of the bit strings, at least a second metadata value associated with each of a plurality of signal sources, or both. The method also includes generating a query execution plan for the query and generating query results based on the query execution plan. The query results identify at least one signal associated with at least one bit string of the plurality of bit strings, at least one signal source of the plurality of signal sources, and at least one of the first metadata value or the second metadata value.

  • Pub Date: 2016/29/04
  • Number: 09489410
  • Owner: Umbel Corporation
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Training image adjustment preferences

Some embodiments include a method of operating a computing device to learn user preferences of how to process digital images. The computing device can record a user image selection, associated with a user account, of at least one of digital image versions of a base digital image. The computing device can determine a context attribute to associate with the user image selection. The computing device can compute an image processing rule associated with the user account by applying machine learning or statistical analysis on multiple user image selections associated with the context attribute, the multiple user image selections including the user image selection.

  • Pub Date: 2016/28/04
  • Number: 09589209
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for automated DCB configuration of access switches

A system and method of automated Data Center Bridging (DCB) configuration of an access switch includes a control unit, a memory, and a port configured to couple the access switch to a peer device. The control unit is configured to operate the port according to a state machine including a DCB disabled state, a DCB downstream state, and a DCB upstream state. When the port is in the DCB disabled state, the control unit exchanges network traffic on the port without any DCB extensions. When the port is in the DCB upstream state, the control unit exchanges network traffic on the port using DCB extensions based on the DCB configuration and receives the DCB configuration from the peer device. When the port is in the DCB downstream state, the control unit exchanges network traffic on the port using the DCB extensions and transmits the DCB configuration to the peer device.

  • Pub Date: 2016/27/04
  • Number: 09553763
  • Owner: DELL PRODUCTS L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Composite graphical interface with shareable data-objects

Aspects of the present disclosure involve receiving references to application data of applications hosted by the servers. The application data includes information defining an interface of the application (e.g., a set of interface elements), and data types associated with the application. As a part of the process for generating a composite graphical user interface (GUI), the composite interface system receives references to application data of one or more applications at various memory locations (e.g., at both local and third-party servers). In this way, the composite interface system accesses the application data of any referenced application in order to retrieve application data to configure a composite GUI which includes interface elements of each of the referenced application.

  • Pub Date: 2016/27/04
  • Number: 09612723
  • Owner: Palantir Technologies Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Tracking unitization occurring in a supply chain

Various embodiments include a method of tracking a chain of custody of an item in a supply chain. A computer system implements a computer interface with a distributed consensus network comprised of computing devices configured to verify one or more waiting transaction records for addition into one or more blocks in a block chain representing a cryptographically verifiable ledger. The order of the block chain is cryptographically protected against tampering by the computing devices. The computer system can track provenance of the item by identifying an existing record in the block chain. The existing record can place a first quantity of a first stock keeping unit (SKU) at a first address. The computer system can then unitize the item by publishing a new record to the block chain. The new record indicates the existing record as a source record and associates a new SKU with a destination address.

  • Pub Date: 2016/26/04
  • Number: 09641342
  • Owner: SKUCHAIN, INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method for controlling data acquisition for a plurality of field devices

A method for online licensing of field devices using an enterprise server with a processor and a data storage, which communicate via a network to the field devices optionally through at least one intelligent cryptographic module. The method receives a request for a license online from a client device for bidirectional communication between field devices and the enterprise server. The method generates a license and a symmetric encryption key. The method generates an object with a communication protocol of the field devices, and a primary communication path. The object contains a schedule configuration and time synchronization configuration and settings. The method then initiates communication, provides a secondary communication path if the primary communication paths fails, and simultaneously collects data by type and value from the field devices and publishes a report.

  • Pub Date: 2016/26/04
  • Number: 09596090
  • Owner: DJ INVENTIONS, LLC
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus of providing messaging service and callback feature to mobile stations

Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a hosted server that an action needs to be performed by a mobile device under management. The method may further include generating a message via the hosted server, the message includes the action, and transmitting the message to the mobile device under management, and receiving a result message from the mobile device under management responsive to the transmitted message, the result message indicating that the action has been satisfied.

  • Pub Date: 2016/26/04
  • Number: 09553866
  • Owner: KASEYA LIMITED
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for identity federation gateway

Techniques for an ID federation gateway include determining whether a user associated with a request for a particular network resource is to be identified by the provider of the particular service or by a different party. The service also comprises causing the different party to provide identification data that indicates an identity for the user, if the user is to be identified by the different party. The method further comprises causing user credentials data, based on the identification data, to be sent to an authentication process of the provider for a set of one or more network resources that includes the particular network resource requested by the user, if the data indicates that the user is successfully identified.

  • Pub Date: 2016/26/04
  • Number: 09660975
  • Owner: Nokia Technologies Oy
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Techniques to communicate messages utilizing a common telephone number

Various embodiments are generally directed to an apparatus, method and other techniques to receive a message directed towards a common telephone number, the common telephone number to enable communications between attendee devices and organizer devices. Embodiments also include techniques to determine whether the message is received from an attendee device or an organizer device based on a telephone number associated with the message and the device that sent the message. Further, in response to determining that the message is received from an attendee device, send the message to one or more organizer devices, and in response to determining that the message is received from an organizer device, send the message to all attendee devices or a specific attendee device based on information in the message.

  • Pub Date: 2016/25/04
  • Number: 09445244
  • Owner: Bandwidth.com, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Application programming interface gateway for sponsored data services

A method to facilitate secure access to a sponsored data service (SDS) through an application programming interface gateway includes providing an access token to a content provider device, where the access token authorizes the content provider device to receive sponsored data services (SDSs). The method also includes receiving a first request for an SDS resource from the content provider device; generating a first timestamp associated with the first request; determining a destination for the first request, where the destination specifies a network address corresponding to an SDS resource device; forwarding the first request to the SDS resource device based on the determined destination; receiving a first response from the SDS resource device corresponding to the first request; generating a second timestamp associated with the first response; and forwarding the first response, along with the first timestamp and the second timestamp, to the content provider device.

  • Pub Date: 2016/25/04
  • Number: 09596606
  • Owner: VERIZON PATENT AND LICENSING INC.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for secure content sharing and synchronization

A flexible content sharing system may comprise a network based application built on a client device using information from dissociated user experience component (UXC), application logic and execution layer (ALEL), and content distribution system (CDS) payloads. An ALEL engine may communicate a request from the network based application to a CDS module. The CDS module may interface the ALEL engine and a CDS server. The ALEL engine can act as a gate keeper and securely communicates requests from client devices to the CDS server. The CDS server is configured to manage and alert the ALEL of any enterprise policies that may be applicable to the client devices connected to the ALEL engine which, in turn, notifies the client devices to comply with the enterprise policies. The CDS server may synchronize any change made to the content by any of the client devices running network based applications.

  • Pub Date: 2016/21/04
  • Number: 09578013
  • Owner: Open Text SA ULC
  • Location: Halifax, CA
  • Details: Visit USPTO

Visit USPTO Page


Associating received contact information with user profiles stored by a social networking system

A social networking system receives contact information from a social networking system user. The received contact information is stored and associated with a user profile in the social networking system including information matching at least a portion of the stored content information. This increases the information associated with the user profile. Subsequently received content information is compared to user profiles and stored contact information associated with one or more user profiles. User profiles including information matching at least a portion of the subsequently received content information or associated with stored contact information matching at least a portion of the subsequently received content information are identified as potential connections for the user providing the subsequently received contact information.

  • Pub Date: 2016/21/04
  • Number: 09535944
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Application access to native and bundled libraries

An application executing on a computing device may invoke a function call of a first function. The computing device may support a bundled application library of functions and a native library of functions. It may be determined that code for executing the first function exists in both the bundled application library and the native library, and the application may execute the first function using the code in the native library. While the application continues execution on the computing device, the application may invoke a function call of a second function. It may be determined that, of the bundled application library and the native library, the code for executing the second function exists in the bundled application library. The application may execute the second function using the code in the bundled application library.

  • Pub Date: 2016/21/04
  • Number: 09575737
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for enhancing user data derived from digital communications

A computer-implemented method for enhancing and utilizing user data derived from digital interactions includes receiving a submission generated by input into a client side application interface by a first user on a first computing device, and determining, based on the attributes of the submission, that the submission is in response to an issue-specific communication advertising information concerning a first issue. The method includes generating a first dataset associated with the first user, searching one or more additional datasets for additional data to be associated with data elements of the first dataset, associating the additional data from the one or more additional datasets with the first user, generating a data model, and requesting records associated with additional users.

  • Pub Date: 2016/20/04
  • Number: 09471932
  • Owner: CAY BAXIS HOLDINGS, LLC
  • Location: New Haven, US
  • Details: Visit USPTO

Visit USPTO Page


Communication network of moving things

Communication network architectures, systems and methods for supporting a network of mobile nodes. As a non-limiting example, various aspects of this disclosure provide communication network architectures, systems, and methods for supporting a dynamically configurable communication network comprising a complex array of both static and moving communication nodes (e.g., the Internet of moving things).

  • Pub Date: 2016/20/04
  • Number: 09641391
  • Owner: VENIAM, INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Sign-on service and client service information exchange interactions

Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and other functionality to other services for use with those services' users. The access manager system may maintain various sign-on and other account information for various users, and provide single sign-on functionality for those users using that maintained information on behalf of multiple unrelated services with which those users interact. The access manager may allow a variety of types of customizations to single sign-on functionality and/or other functionality available from the access manager, such as on a per-service basis via configuration by an operator of the service, such as co-branding customizations, customizations of information to be gathered from users, customizations of authority that may be delegated to other services to act on behalf of users, etc., and with the customizations that are available being determined specifically for that service.

  • Pub Date: 2016/19/04
  • Number: 09537853
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of revealing the outcomes of wagers through physiological condition-based reveals

The invention relates to systems and methods of maintaining revealed and unrevealed balances that both belong to a user, but the user is aware only of the revealed balance. In this manner, the system can give the user an impression that a value (e.g., a cash amount or other value) has been gained or lost by transferring the value between the revealed and unrevealed balances of the user, even though no gain or loss actually occurred. The unrevealed balance may include a payout from a real-world wager. Thus, payout may be revealed to the user in a manner that the user believes that the payout was won by the user through a game or other interactive media, even though the payout belongs to the user based on the payout. Other changes in value to the unrevealed and revealed balances may occur as well.

  • Pub Date: 2016/18/04
  • Number: 09619967
  • Owner: Game Play Network, Inc.
  • Location: Los Angeles, US
  • Details: Visit USPTO

Visit USPTO Page


N-node link aggregation group (LAG) systems that can support various topologies

Aspects of the present invention include an arbitrary N-Node virtual link trunking (VLT) system comprising a set of N nodes collectively provide a logical fabric-level view that is consistent across the set of N nodes. Embodiments of the arbitrary N-Node VLT system comprise a control plane mechanism to provide Layer 2 multipathing between access network devices (switches or servers) and the core network. The N-Node VLT system provides a loop-free topology with active-active load-sharing of uplinks from access to the core. Accordingly, the N-Node VLT system eliminates the disadvantage of Spanning Tree Protocol (STP) (active-standby links) by allowing link aggregation group (LAG) terminations on multiple separate distribution or core switches and also supporting a loop-free topology. Additional benefits of an N-Node VLT system include, but are not limited to, higher resiliency, improved link utilization, and improved manageability of the network.

  • Pub Date: 2016/18/04
  • Number: 09628375
  • Owner: DELL PRODUCTS LP
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile device radio management

Alternative network access for a mobile device having a first radio and a second radio, or in some cases, only one radio can include using a first radio in a first connection with a first access point. Whether to establish a second connection with a second access point using a second radio is determined. The determination is based on a first set of access conditions associated with the first access point and a second set of access conditions associated with the second access point. The second connection is established with the second access point using the second radio based on the determining, which indicates establishing the second connection.

  • Pub Date: 2016/18/04
  • Number: 09578674
  • Owner: BANDWIDTHX INC.
  • Location: Carlsbad, US
  • Details: Visit USPTO

Visit USPTO Page


Gaze assisted object recognition

An electronic device can attempt to determine a gaze direction of a user, which can be used to determine an object of interest to the user. Determining the gaze direction helps to reduce the search space and reduce processing requirements for identifying the object. Image information can be captured that includes the object of interest, which then can be analyzed to recognize the type of object. Upon recognizing the object, the user can be provided with information about the object, which in some cases can depend at least in part upon a current context or location of the object. If the object is a networked device, the user can potentially be provided with input options for controlling the device.

  • Pub Date: 2016/18/04
  • Number: 09563272
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for leveraging social queuing to facilitate event ticket distribution

A method for identifying a simulated social media account history is provided. The method may include querying a social media identification information (“social media ID”) to determine whether the account history includes one or more parameters that indicate whether the social media ID is related to an automated entity or a human entity. The parameters may include at least one of less than a threshold number of friends on the account. The parameters may include more than a threshold frequency of historic ticket purchases per unit time. The parameters may also include disparate location of historic ticket purchases per unit time. The parameters may also include a historic record of less than a threshold reaction time to a plurality of ticket offers.

  • Pub Date: 2016/15/04
  • Number: 09639811
  • Owner: SONGKICK.COM B.V.
  • Location: London, GB
  • Details: Visit USPTO

Visit USPTO Page


Social network system with social objects

A social network system provides a social network that receives from an application a business object and an associated system of record and generates a social object that corresponds to the business object and that comprises the system of record for the enterprise application. The social network assigns one or more members to the social object. The social network receives first changes to the system of record and, in response, modifies the social object to incorporate the first changes. The system provides second changes to the social object to the enterprise application, and the enterprise application, in response, modifies the system of record to incorporate the second changes.

  • Pub Date: 2016/15/04
  • Number: 09626728
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud queue playhead

An example implementation may involve a computing system receiving, from a media playback system over the network interface, a request to initiate playback of the particular cloud queue at a first media item. The computing system assigns a playhead pointer to a position within the particular cloud queue that corresponds to the first media item and transmits, to the media playback system over the network interface, an instruction that causes one or more playback devices of the media playback system to initiate playback of the particular cloud queue at the first media item. While the one or more playback devices play back the particular cloud queue, the computing system updates the assigned position of the playhead pointer to indicate the currently playing media item of the particular cloud queue.

  • Pub Date: 2016/15/04
  • Number: 09648071
  • Owner: Sonos, Inc.
  • Location: Santa Barbara, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud queue access control

An example implementation may involve a computing system receiving, from a media playback system, a request to initiate playback of a cloud queue. The cloud queue may currently have a first access status that authorizes a first set of queue operations, which may include playback of the cloud queue. After receiving the request to initiate playback, the computing system may cause audio tracks of the cloud queue to be queued in a local queue of the media playback system such that the media playback system may playback audio tracks of the cloud queue via the local queue. The computing system may modify the access status of the cloud queue to a second access status. This second access status may authorize a second set of queue operations on the cloud queue. The computing system may cause access to the local queue to be restricted to the second set of queue operations.

  • Pub Date: 2016/15/04
  • Number: 09648070
  • Owner: Sonos, Inc.
  • Location: Santa Barbara, US
  • Details: Visit USPTO

Visit USPTO Page


Audio capture and remote output

In a wireless content sharing system, audio may be captured at various levels of a source device, including at an application level. Audio may also be divided into components prior to packetization and transmission, allowing different channels of audio to be sent to different target devices. Audio may be sent with timing information to coordinate playback of content. Audio may be buffered to reduce user noticeable latency.

  • Pub Date: 2016/15/04
  • Number: 09569173
  • Owner: AMAZON TECHNOLOGIES, INC.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Using representational state transfer (REST) for consent management

Techniques are disclosed for sending, from an application executing on a device associated with a user, through a Representational State Transfer (REST)-based interface, to an authorization computer system, a request for permission to access a scope of information associated with the user. The techniques can further include, based on authentication of the user, receiving, at the device associated with the user, through the REST-based interface, a request for consent by the user to allow the application to access information that is within the scope of information associated with the user. Furthermore, the techniques can include, responsive to the device receiving consent from the user, sending, from the device associated with the user, through the REST-based interface, to the authorization computer system, the consent to allow the application to access the information for the authorization computer system to store a mapping between the application and the scope.

  • Pub Date: 2016/14/04
  • Number: 09565178
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for interfacing with a network of moving things

A request from a mobile access point that is installed on a vehicle may be received via network interface circuitry of one or more computing devices. Processing circuitry of the one or more computing devices may determine characteristics of a captive portal to present in response to the request based on current location of the vehicle and mobile access point. A captive portal with the determined characteristics is then provided by the processing circuitry, via the network interface circuitry, in response to the request.

  • Pub Date: 2016/14/04
  • Number: 09521606
  • Owner: Veniam, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for determining translation accuracy in multi-user multi-lingual communications

Various embodiments described herein facilitate multi-lingual communications. The systems and methods of some embodiments enable multi-lingual communications through different modes of communication including, for example, Internet-based chat, e-mail, text-based mobile phone communications, postings to online forums, postings to online social media services, and the like. Certain embodiments implement communication systems and methods that translate text between two or more languages. Users of the systems and methods may be incentivized to submit corrections for inaccurate or erroneous translations, and may receive a reward for these submissions. Systems and methods for assessing the accuracy of translations are described.

  • Pub Date: 2016/14/04
  • Number: 09448996
  • Owner: Machine Zone, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for distributing antivirus records to user devices

Disclosed are system and method for distributing antivirus records to user devices. An exemplary method includes collecting, by a server, statistics on the use of antivirus records; calculating a coefficient of effectiveness of each antivirus record based on the statistics; identifying one or more most effective antivirus records whose coefficients of effectiveness exceed a predetermined effectiveness threshold; identifying one or more less effective antivirus records whose coefficients of effectiveness do not exceed the predetermined effectiveness threshold; transmitting identified most effective antivirus records to a plurality of user devices for storage in antivirus databases of the user devices; receiving, from the user devices, one or more less effective antivirus records removed from the antivirus databases of the user devices; and storing the received less effective antivirus records in an antivirus database of the server if said antivirus records were not in the antivirus database of the server.

  • Pub Date: 2016/14/04
  • Number: 09578065
  • Owner: AO Kaspersky Lab
  • Location: Moscow, RU
  • Details: Visit USPTO

Visit USPTO Page


ETL tool interface for remote mainframes

Embodiments of the present invention disclose a method for remote job submission. A computer receives a first job of a job stream. If the first job accesses a mainframe operating system, then the computer retrieves at least a return code threshold for the first job from a data store. If an option to build job control language is selected for the first job, then the computer generates job control language for the first job. The computer submits the first job to a job reader on the mainframe operating system using a file transfer protocol. The computer parses a retrieved output file to determine a return code for the first job.

  • Pub Date: 2016/14/04
  • Number: 09613114
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Managing shared memory in database server

Provided is a method for managing a shared memory in a database server. The database server includes a shared memory manager which divides a shared memory into a plurality of memory chunks to manage the memory chunks and allocates at least one memory chunk to a cache memory manager based on a request of the cache memory manager; a cache memory manager which requests at least one of the plurality of memory chunks to the shared memory manager, wherein the database server includes a plurality of cache memory managers and the database server uses the memory chunk which is allocated to the cache memory manager as a cache memory having a predetermined purpose, and the predetermined purposes of the plurality of cache memory managers are different from each other; and a main processor which performs a database operation using the cache memory.

  • Pub Date: 2016/13/04
  • Number: 09652393
  • Owner: TMAXDATA CO., LTD.
  • Location: Seongnam, KR
  • Details: Visit USPTO

Visit USPTO Page


Systems and user interfaces for data analysis including artificial intelligence algorithms for generating optimized packages of data items

Systems and user interfaces enable integration of data items from disparate sources to generate optimized packages of data items. For example, the systems described herein can obtain data items from various sources, score the data items, and present, via an interactive user interface, options for packaging the data items based on the scores. The systems may include artificial intelligence algorithms for selecting optimal combinations of data items for packaging. Further, the interactive user interfaces may enable a user to efficiently add data items to, and remove data items from, the data packages. The system may interactively re-calculate and update scores associated with the package of data items as the user interacts with the data package via the user interface. The systems and user interfaces may thus, according to various embodiments, enable the user to optimize the packages of data items based on multiple factors quickly and efficiently.

  • Pub Date: 2016/12/04
  • Number: 09652510
  • Owner: Palantir Technologies Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for multi-party media management

Systems and methods for recording full quality audio and/or video from a plurality of parties, while also facilitating a real-time conversation or other interaction over low-bandwidth network links are provided. A voice over Internet protocol (VoIP) conversation, or other type of session, is facilitated between two or more parties using methods that reduce sound or video quality to achieve a low-latency connection. During the VoIP conversation, or other type of session, the audio and/or video from each party is recorded directly onto a storage medium of their respective device and stored as one or more data files. These data files can be generally unmodified, or merely lightly modified or compressed, resulting in a higher quality recording of the audio and/or video as compared to the audio and/or video that was transmitted to the other party during the session. The data files are then merged to create a final merged high-quality composite recording of the session.

  • Pub Date: 2016/12/04
  • Number: 09479547
  • Owner: Ringr, Inc.
  • Location: Mahomet, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-wire signaling with matched propagation delay among wire pairs

In a multi-wire channel that includes at least three wires, each unique wire pair of the multi-wire channel has approximately the same signal propagation time. In this way, jitter can be mitigated in the multi-wire channel for signaling where, for a given data transfer, a differential signal is transmitting on a particular pair of the wires and every other wire is floating. In some implementations, matching of the signal propagation times involves providing additional delay for at least one of the wires. The additional delay is provided using passive signal delay techniques and/or active signal delay techniques.

  • Pub Date: 2016/12/04
  • Number: 09521058
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Unified player interface

A unified player interface executing at a user device may include a section that displays songs that are associated with a first Artist Specific Application (ASA) of a first artist installed at the user device. The unified player interface may include another section that displays other ASAs, each associated with a respective artist, installed at the user device. Selection of another ASA may cause music from the selected ASA to be played. Such selection may cause the selected ASA to be launched and its unified player interface to be launched, essentially replacing the unified player interface that was previously displayed at the user device. The unified player interface may include another section that displays music that is not associated with an ASA installed at the user device. For example, the unified player interface may search for locally stored music or streaming music source and display them for selection.

  • Pub Date: 2016/11/04
  • Number: 09465869
  • Owner: EscapeX Limited
  • Location: Kowloon, HK
  • Details: Visit USPTO

Visit USPTO Page


System and method for verifying status of an authentication device

A system and method that includes receiving a first device profile and associating the first device profile with a first application instance that is assigned as an authentication device of a first account; receiving a second device profile for a second application instance, wherein the second application instance is making a request on behalf of the first account; comparing the second device profile to the first device profile; and completing the request of the second application instance according to results of comparing the second device profile and the first device profile.

  • Pub Date: 2016/11/04
  • Number: 09455988
  • Owner: Duo Security, Inc.
  • Location: Ann Arbor, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for diagnosis and treatment

This invention relates the use of cortisol blockers (glucocorticoid receptor [GR] antagonists) for the treating or preventing treatment resistant prostate cancer, treating or preventing neoplasia, and treating or preventing infection related to acute or chronic injury or disease.

  • Pub Date: 2016/11/04
  • Number: 09636351
  • Owner: Pop Test Oncology Limited Liability Company
  • Location: Cliffside Park, US
  • Details: Visit USPTO

Visit USPTO Page


Printer and printing system

In a system of a data processing apparatus coupled to a printer, the apparatus sends a status information transmission request to the printer and, in response, receives status information from the printer. The status information includes ink storage identification information written in a memory contained in an ink storage, device identification information identifying the printer in which the ink storage is installed, and ink usage amount information for use by the printer in calculating a remaining ink amount.

  • Pub Date: 2016/11/04
  • Number: 09498972
  • Owner: Seiko Epson Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Updating rich communication suite capability information over a communications network

In an embodiment, a requesting UE configures an RCS capabilities request message to request a target UE to provide RCS capability information (i) for the target UE, and (ii) for a set of other UEs. The requesting UE transmits the configured RCS capabilities request message to the target UE. The target UE determines that the target UE has access to RCS capability information for at least one UE from the set of other UEs, and configures an RCS capabilities response message that indicates the RCS capability information (i) for the target UE and (ii) for the at least one UE. The target UE transmits the configured RCS capabilities response message to the requesting UE. In another embodiment, a given UE determines whether to perform an RCS capability information refresh operation based on whether RCS capability information for another UE is older than a priority-specific age threshold.

  • Pub Date: 2016/08/04
  • Number: 09571611
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Using connections between users in a social networking system to regulate operation of a machine associated with a social networking system user

A social networking system includes information identifying a machine (e.g., a robot, a drone, a computer, a thermostat, etc.) and a connection between the machine and an owner of the machine, which is a user of the social networking system capable of authorizing an action by the machine. The owner of the machine associates permissions associated with various actions by the machine, where a permission associated with an action identifies one or more criteria for performing the action. Permissions may specify types of connections between social networking system users and the owner of the machine via the social networking system to allow social networking system users with specific types of connections to the owner of the machine to perform certain actions using the machine.

  • Pub Date: 2016/07/04
  • Number: 09648024
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques to process text messages for communication to an emergency service provider

Various embodiments are generally directed to an apparatus, method and other techniques for receiving an indication of one or more errors in a message, the message for communication to an emergency service provider and storing correction information including at least the one or more errors in the memory. Embodiments may also include receiving an indication to communicate the message to the emergency service provider and causing an original version of the message and a corrected version of the message to be communicated to the emergency service provider, the original version to include the one or more errors and the corrected version to include corrections for the one or more errors.

  • Pub Date: 2016/07/04
  • Number: 09432829
  • Owner: Bandwidth.com, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Image recording medium and method for preparing image recording medium

An image recording medium includes an image supporting member that has a ruggedness on a surface and has a surface roughness Rz of 3 μm or more, an image receiving layer that includes a first thermoplastic resin having a glass transition temperature of 60° C. or more and a second thermoplastic resin having a glass transition temperature of 15° C. or less, and a transparent supporting member, in this order, wherein an image formed of an image forming material is provided between the image supporting member and the image receiving layer and a ruggedness corresponding to the ruggedness of the image supporting member is formed on an outermost surface of the image recording medium on a side of the transparent supporting member.

  • Pub Date: 2016/07/04
  • Number: 09656500
  • Owner: FUJI XEROX CO., LTD.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Enhanced policy editor with completion support and on demand validation

In an approach to providing completion support and on demand validation in a web tool that operates on live resources, one or more computer processors create one or more lists of content, where the one or more lists of content include one or more references to one or more runtime objects. The one or more computer processors parse the one or more lists of content. The one or more computer processors populate one or more lists of one or more choices with the parsed one or more lists of content. The one or more computer processors create one or more callbacks for one or more runtime objects referenced by the one or more lists of one or more choices.

  • Pub Date: 2016/07/04
  • Number: 09557967
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Using game data for providing content items

Methods and systems for receiving a request for content associated with a game, receiving at least one of a device identifier and at least one of game data, associating the device identifier with the game data to create a document, and retrieving the document to generate relevant content items for display on the web page.

  • Pub Date: 2016/06/04
  • Number: 09656166
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing virtual link state

A system and method of managing virtual link state includes receiving, at a first device, a first status update associated with the virtual link from a second device. The first status update includes a first management status value (RM) and a first operational status value (RO). The system and method further includes determining a second management status value (LM) associated with the first device, determining a second operational status value (LO) based on the first status update and the RM, transmitting a second status update for the virtual link to the second device, the second status update including the LM and the LO, and determining a state of the virtual link based on the RM, the RO, the LM, and the LO. The first device is configured to be coupled to the second device using a physical network link partitioned into a plurality of first virtual links including the virtual link.

  • Pub Date: 2016/06/04
  • Number: 09654376
  • Owner: DELL PRODUCTS, L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Stateless packet segmentation and processing

High-speed processing of packets to and from a virtualization environment can be provided while utilizing segmentation offload and other such functionality of hardware such as a network interface card. Virtualization information can be added to extension portions of protocol headers, for example, such that the payload portion is unchanged. The virtualization information can be hashed and added to the payload or stream at, or relative to, various segmentation boundaries, such that the virtualization or additional header information will only be added to a subset of the segmented data frames, thereby reducing the necessary overhead. Further, the hashing of the information can allow for reconstruction of the virtualization information upon desegmentation even in the event of packet loss.

  • Pub Date: 2016/06/04
  • Number: 09602636
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Active subscription profiles on secure element supporting concurrent usage of network services

A method, a device, and a non-transitory storage medium provide storing multiple subscription profiles on a secure element; detecting a triggering event; using, by a first stack of a wireless end device, one of the subscription profiles to register with a first network service via a first network; indicating that the one of the subscription profiles is enabled; querying, by a second stack of the wireless end device, the secure element for another one of the subscription profiles; obtaining, by the second stack, access information to the other one of the subscription profiles; selecting, by the second stack, the other one of the subscription profiles; using, by the second stack, the other one of the subscription profiles to register with a second network service via a second network; and indicating that the other one of the subscription profiles is enabled.

  • Pub Date: 2016/05/04
  • Number: 09531831
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Trusted and unsupervised digital certificate generation using a security token

A method, system and computer program product for ensuring PKI key pairs are operatively installed within a secure domain of a security token prior to generating a digital certificate. The public key component of the PKI key pair is incorporated into a digital certificate which is returned to the security token for storage. The arrangement included herein incorporates the use of a critical security parameter to ensure a chain of trust with an issuing entity such as a registration authority. Furthermore, the arrangement does not require security officer or system administrator oversight during digital certificate generation as the critical security parameter provides a sufficient level of trust to ensure that digital certificate generation is being performed in conjunction with a designated security token rather than a rogue application. Lastly, separate inventive embodiments allow alternate communications and verification arrangements to be implemented.

  • Pub Date: 2016/04/04
  • Number: 09602497
  • Owner: Assa Abloy AB
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer-readable medium for facilitating adaptive technologies

A system, method, and computer-readable medium that facilitate software configuration of assistive computer devices by automatically assessing a user's capabilities through questions and tasks are provided. The analysis results of the user's capabilities are then available to assistive computer software applications which may subsequently update their interfaces accordingly. A mapping mechanism from an external input device into a target software application is facilitated for software applications that do not include assistive technology features.

  • Pub Date: 2016/04/04
  • Number: 09594480
  • Owner: Open Invention Network LLC
  • Location: Durham, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of timing wagers in an integrated wagering and interactive media platform

The invention relates to systems and methods of selecting and placing real-world wagers responsive to one or more wager triggers, obtaining outcomes of the real-world wagers, facilitating user interactions with various interactive media, and revealing the outcomes of the real-world wagers through the interactive media to give an appearance that the outcomes of the real-world wagers resulted from the user interactions even though the outcomes resulted from the real-world wagers and were determined before the user interactions. A real-world wager may be initiated by one or more wager triggers that cause the real-world wager to be placed. The one or more wager triggers may include, without limitation, acquisition of a token, user selection or initiation of interactive media (e.g., selection of a game to play), an occurrence of an event in the interactive media (e.g., based on a user controlled or other in-game action), and/or other events.

  • Pub Date: 2016/04/04
  • Number: 09536385
  • Owner: Game Play Network, Inc.
  • Location: Los Angeles, US
  • Details: Visit USPTO

Visit USPTO Page


Ion-conducting membranes

An ion conducting polymeric composition mixture comprises a copolymer of styrene and vinylbenzyl-R. Ris selected from the group consisting of imidazoliums, pyridiniums, pyrazoliums, pyrrolidiniums, pyrroliums, pyrimidiums, piperidiniums, indoliums, and triaziniums. The composition contains 10%-90% by weight of vinylbenzyl-R. The composition can further comprise a polyolefin comprising substituted polyolefins, a polymer comprising cyclic amine groups, a polymer comprising at least one of a phenylene group and a phenyl group, a polyamide, and/or the reaction product of a constituent having two carbon-carbon double bonds. The composition can be in the form of a membrane. In a preferred embodiment, the membrane is a Helper Membrane that increases the faradaic efficiency of an electrochemical cell into which the membrane is incorporated, and also allows product formation at lower voltages than in cells without the Helper Membrane.

  • Pub Date: 2016/04/04
  • Number: 09580824
  • Owner: Dioxide Materials, Inc.
  • Location: Boca Raton, US
  • Details: Visit USPTO

Visit USPTO Page


Implicit software dependency analysis

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generated aggregated dependencies between software elements in a code base. One of the methods includes receiving a request to generate implicit dependencies introduced by remote procedure calls in a project. A registration of a remote procedure call is identified, wherein the registration of the remote procedure call specifies a target function and a name for the remote procedure call. An invocation of the remote procedure call using the name for the remote procedure call is identified, wherein the invocation occurs in a source software element of the project. A definition of the target function of the remote procedure call is identified, wherein the target function is defined in a target software element of the project. A new dependency is generated, the new dependency being a dependency from the source software element to the target software element.

  • Pub Date: 2016/04/04
  • Number: 09477445
  • Owner: Semmle Limited
  • Location: Oxford, GB
  • Details: Visit USPTO

Visit USPTO Page


Creation and management of device versions

The claimed subject matter provides a system and/or method that creates, manages, or maintains multiple device versions in a network of Radio Frequency Identification (RFID) devices. The system can include components that detect whether a device has joined the network and based at least in part on such indication creates a device profile the first time that the device is detected, establishes a version trail containing configuration settings specific to the detected device, and thereafter builds and maintains the version trail when the device joins and/or leaves the network.

  • Pub Date: 2016/04/04
  • Number: 09538367
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Analytics platform spanning subset using pipeline analytics

Determination and indication of operational performance of deployments in an expert integrated system that has multiple deployments, with each deployment having multiple patterns. The determination is based upon pipe analytics, with the pipe analytics being performed over a common subnet that includes both the analytics platform and the management nodes of each deployment of the multiple deployments.

  • Pub Date: 2016/04/04
  • Number: 09569250
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Analytics platform spanning a subset using pipeline analytics

Determination and indication of operational performance of deployments in an expert integrated system that has multiple deployments, with each deployment having multiple patterns. The determination is based upon pipe analytics, with the pipe analytics being performed over a common subnet that includes both the analytics platform and the management nodes of each deployment of the multiple deployments.

  • Pub Date: 2016/04/04
  • Number: 09569251
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method, apparatus, and computer program stored in computer readable medium for managing storage server in database system

Disclosed is a method of managing a storage server in a database system. Provided is a storage server including a cache device to store at least one block that includes data; a permanent storage medium to record the at least one block stored in the cache device; and a controller to record the at least one block stored in the cache device in the permanent storage medium, wherein the controller includes a grade determiner to determine a grade of each of the at least one block based on a size of each of the at least one block; a victim block determiner to determine a victim block to be recorded in the permanent storage medium among blocks stored in the cache device based on the determined grade of each of the at least one block; and a block recorder to record the determined victim block in the permanent storage medium.

  • Pub Date: 2016/01/04
  • Number: 09600415
  • Details: Visit USPTO

Visit USPTO Page


System and method for grouping and assigning channels in a network system

System and methods are provided for dynamically assigning wireless channels to priority groups based on characteristics of the channels, the environment in which the channels will be used, regulatory requirements, and/or capabilities of client devices. Thereafter, channels may be intelligently assigned to access points to achieve one or more goals. For example, wireless channels may be assigned to access points to ensure balanced coverage throughout the network system for client devices of each type/capability, to minimize effects of wireless interference in the network system, to increase fault tolerance in the network system, and/or to generally improve the coverage and quality of connections in the network system.

  • Pub Date: 2016/31/03
  • Number: 09585143
  • Owner: Aruba Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for determining a status of a component of a device

Methods and systems for determining a status of a component of a device are provided. An example method includes triggering an action of a component of a device, and responsively receiving information associated with the action of the component from a sensor. The method further includes a computing system having a processor and a memory comparing the information with calibration data and determining a status of the component based on the comparison. In some examples, the calibration data may include information derived from data received from a pool of one or more devices utilizing same or similar components as the component. The determined status may include information associated with a performance of the component with respect to performances of same or similar components of the pool of devices. In one example, the device may self-calibrate the component based on the status.

  • Pub Date: 2016/30/03
  • Number: 09486922
  • Owner: X Development LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Provisioning digital certificates in a network environment

A method for provisioning digital certificates in a compute service environment may include authorizing a customer entity for using and/or controlling a network resource in the compute service environment. Upon completing the authorization, a digital certificate may be issued to the customer entity. The digital certificate may be associated with the network resource and may be issued for a limited duration period. The use and/or control of the network resource by the customer entity may be monitored. Reissuance of the digital certificate may be conditioned on whether the customer entity is still using and/or controlling the network resource in the compute service environment. If the customer entity is still using and/or controlling the network resource in the multi-tenant environment, the digital certificate may be automatically reissued for another limited duration period. The automatically reissuing may take place without receiving a certificate reissue request from the customer entity.

  • Pub Date: 2016/30/03
  • Number: 09485101
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Machine-to-machine service based on common data format

A method, a device, and a non-transitory storage medium having instructions to establish a connection with a sensor device; receive sensor data from the sensor device via the connection; convert the sensor data into common data of a common data format, wherein the common data includes metadata that supports an ontology; store the common data; and transmit the common data to a network device of a network.

  • Pub Date: 2016/30/03
  • Number: 09654567
  • Owner: Cellco Partnership
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Suppressing duplicate listings on multiple search engine web sites from a single source system given that a publisher selects a different listing as a synchronized listing

A source system receives initial identification data of a listing related to an entity. The source system searches a provider system for one or more listings having identification data matching the initial identification data. The source system receives, from the provider system, a plurality of potential matching listings having identification data matching the initial identification data, wherein each listing of the plurality of potential matching listings has a corresponding confidence score assigned by the source system, and wherein each listing of the plurality of potential matching listings has a corresponding provider-supplied external identifier assigned by the provider system. The source system designates a representative listing of the entity located on a provider system from among the plurality of potential matching listings, the representative listing having the highest confidence score assigned by the source system. The source system transmits, to the provider system, a request to synchronize the representative listing having the highest confidence score assigned by the source system as the representative listing of the entity on the provider system, the request comprising a first provider-supplied external identifier. The source system receives, from the provider system, an indication that a second listing of the plurality of potential matching listings has been selected by the provider system as the representative listing of the entity on the provider system, the response comprising a second provider-supplied external identifier. The source system re-designates the second listing as the representative listing of the entity on the provider system and designating the remaining one or more remaining listing of the plurality of potential matching listings as one or more duplicate listings on the provider system. The source system transmits, to the provider system, a request to suppress the remaining one or more listings as one or more duplicate listings, the request to suppress the remaining one or more listings comprising one or more third provider-supplied external identifiers, the one or more third provider-supplied external identifiers indicating the remaining one or more listings to suppress.

  • Pub Date: 2016/29/03
  • Number: 09519721
  • Owner: Yext, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Managing cache memory in a parallel processing environment

An apparatus comprises a plurality of processor cores, each comprising a computation unit and a memory. The apparatus further comprises an interconnection network to transmit data among the processor cores. At least some of the memories are configured as a cache for memory external to the processor cores, and at least some of the processor cores are configured to transmit a message over the interconnection network to access a cache of another processor core.

  • Pub Date: 2016/29/03
  • Number: 09639487
  • Owner: Mellanox Technologies, Ltd.
  • Location: Yokneam, IL
  • Details: Visit USPTO

Visit USPTO Page


Tracking changes within Javascript object notation

The method includes adjusting, by one or more computer processors, a JAVASCRIPT object notation structure to comprise a tag on at least one object and a tag on at least one array. The method further includes receiving, by one or more computer processors, data indicating a first set of at least one change to the JAVASCRIPT object notation structure. The method further includes adjusting, by one or more computer processors, the tags in the JAVASCRIPT object notation structure to include the first set of the at least one change in the JAVASCRIPT object notation structure. The method further includes receiving, by one or more computer processor, data indicating the first set of the at least one change to the JAVASCRIPT object notation structure is complete. The method further includes displaying the first set of the at least one change to the JAVASCRIPT object notation structure based upon the adjusted tags.

  • Pub Date: 2016/28/03
  • Number: 09535691
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Secure storage for shared documents

Embodiments are directed towards managing data storage for secure storage of shared documents. A user or an application may provide data destined for encryption and a public key. Instruction set information that references at least a seed file that may be installed on the network computer may be generated. An encryption key based on the instruction set information may be generated. Header information that includes the instruction set may be generated. And, the header information may be encrypted using the public key. A secure bundle that includes the public key, the encrypted header information, and the encrypted data may be generated and provided to the user that provided the data and the public key or the application that provided the data and the public key. Decrypting the data included in the secure bundle the above actions are generally performed in reverse.

  • Pub Date: 2016/28/03
  • Number: 09584321
  • Owner: Centri Technology, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Remote access to resources over a network

Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer's ability to access a resource is determined based upon the computer's operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer's access to the requested resource.

  • Pub Date: 2016/28/03
  • Number: 09628489
  • Owner: SonicWall Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to measure exposure to streaming media

Methods and apparatus to measure exposure to streaming media are disclosed. An example method includes detecting an ID3 tag associated with streaming media presented at a client device. Data is extracted from a first field of the ID3 tag. The data from the first field of the ID3 tag is processed to generate a first request directed to a first internet domain, the first internet domain based on the data, the first request including a media identifier from a second field of the ID3 tag, the second field of the ID3 tag separate from the first field of the ID3 tag, the media identifier identifying the streaming media. In response to the detection of the ID3 tag, the first request is sent from the client device to the first internet domain.

  • Pub Date: 2016/28/03
  • Number: 09503784
  • Owner: The Nielsen Company (US), LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for quantifying color changes induced by specific concentrations of biological analytes

Methods and electronic devices for performing color-based reaction testing of biological materials. The method includes capturing and interpreting digital images of an unexposed and later exposed paddle at various delay times within an automatically calibrated environment. The test paddle includes a unique identification mechanism (UID), a Reference Color Bar (RCB) providing samples of standardized colors for image color calibration, compensation and corrections, and several test-specific sequences of Chemical Test Pads (CTP). The method further includes locating the paddle in the image, extracting the UID and validating the paddle, extracting the RCB and locating the plurality of CTP in each image. The method further reduces image noise in the CTP and calibrates the image automatically according to lighting measurements performed on the RCB. To determine test results, the method further determines several distances between the CTP and its possible trajectory in the color space described by the Manufacturer Interpretation Color Chart.

  • Pub Date: 2016/26/03
  • Number: 09607380
  • Owner: Scanadu Incorporated
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Scheduling of scenario models for execution within different computer threads and scheduling of memory regions for use with the scenario models

A method for testing a system-on-a-chip (SoC) is described. The method includes parsing a file to determine functions to be performed components of the SoC. The method further includes receiving a desired output of the SoC and generating a test scenario model based on the desired output of the SoC. The test scenario model includes a plurality of module representations of the functions and includes one or more connections between two of the module representations. The desired output acts as a performance constraint for the test scenario model. The test scenario model further includes an input of the SoC that is generated based on the desired output, the module representations, and the one or more connections. The test scenario model includes a path from the input via the module representations and the connections to the desired output.

  • Pub Date: 2016/25/03
  • Number: 09651619
  • Owner: Breker Verification Systems
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Memory channel that supports near memory and far memory access

A semiconductor chip comprising memory controller circuitry having interface circuitry to couple to a memory channel. The memory controller includes first logic circuitry to implement a first memory channel protocol on the memory channel. The first memory channel protocol is specific to a first volatile system memory technology. The interface also includes second logic circuitry to implement a second memory channel protocol on the memory channel. The second memory channel protocol is specific to a second non volatile system memory technology. The second memory channel protocol is a transactional protocol.

  • Pub Date: 2016/25/03
  • Number: 09619408
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Channel based communication and transaction system

System and methods are provided for receiving identification information from remote user devices associated with users. The identification information serves to obtain corresponding stored user profiles. Primary communication channels are generated for each user based upon their profiles. Each such primary channel is limited to communication with, and facilitates electronic communication between, a single corresponding enterprise data source, and users. For each respective primary channel in a subset of the primary channels of a first user, a corresponding plurality of sub-channels is generated based upon their profile. Each such plurality of sub-channels forms a corresponding hierarchical tree with the corresponding primary channel as root node and the sub-channels as child nodes. A sub-channel in a hierarchy of sub-channels enables secure bidirectional communication between (i) the remote user device associated with the first user and (ii) the enterprise data source associated with the primary channel of the hierarchy.

  • Pub Date: 2016/25/03
  • Number: 09450901
  • Owner: Pypestream Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile client device, operation method, and recording medium

An information processing apparatus including a touch panel and a near field communication interface. The information processing apparatus detects that an input received at the touch panel corresponds to a predetermined input when the information processing apparatus is in a suspended state; and controls the information processing apparatus execute a predetermined function via the near field communication interface and awake from the suspended state upon detecting that the input corresponds to the predetermined input.

  • Pub Date: 2016/24/03
  • Number: 09600056
  • Owner: Sony Mobile Communications, Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Memory sharing via a unified memory architecture

A method and system for sharing memory between a central processing unit (CPU) and a graphics processing unit (GPU) of a computing device are disclosed herein. The method includes allocating a surface within a physical memory and mapping the surface to a plurality of virtual memory addresses within a CPU page table. The method also includes mapping the surface to a plurality of graphics virtual memory addresses within an I/O device page table.

  • Pub Date: 2016/24/03
  • Number: 09514559
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Efficient data reads from distributed storage systems

A method of distributing data in a distributed storage system includes receiving a file into non-transitory memory and dividing the received file into chunks. The chunks are data-chunks and non-data chunks. The method also includes grouping one or more of the data chunks and one or more of the non-data chunks in a group. One or more chunks of the group is capable of being reconstructed from other chunks of the group. The method also includes distributing the chunks of the group to storage devices of the distributed storage system based on a hierarchy of the distributed storage system. The hierarchy includes maintenance domains having active and inactive states, each storage device associated with a maintenance domain, the chunks of a group are distributed across multiple maintenance domains to maintain the ability to reconstruct chunks of the group when a maintenance domain is in an inactive state.

  • Pub Date: 2016/24/03
  • Number: 09514015
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for managing distributed media access control address tables

Methods, systems, and computer programs are presented for switching a network packet. One method includes operations for receiving a packet having a media access control (MAC) address, and for switching the packet by a first packet switching device (PSD) when the MAC address is present in a first memory. Further, the method includes operations for transferring the packet to a second PSD when the MAC address is absent from the first memory and present in a second memory associated with the second PSD, and for transferring the packet to a third PSD when the MAC address is absent from the first memory and the second memory.

  • Pub Date: 2016/23/03
  • Number: 09608937
  • Owner: Pluribus Networks, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Election and use of configuration manager

In an approach for election of a manger for a network, a processor detects that a first set of management tasks is not running. A processor identifies at least a first node in a network and information about the first node. A processor determines that the first node is capable of performing the first set of management tasks based on the information about the first node. A processor elects the first node as a manager in the network to perform the first set of management tasks.

  • Pub Date: 2016/23/03
  • Number: 09497080
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Triggering actions in response to optically or acoustically capturing keywords from a rendered document

A system for processing text captured from rendered documents is described. The system receives a sequence of one or more words optically or acoustically captured from a rendered document by a user. The system identifies among words of the sequence a word with which an action has been associated. The system then performs the associated action with respect to the user.

  • Pub Date: 2016/22/03
  • Number: 09633013
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Inmate information center for correctional facility processing

Systems, methods, and machine-readable media are provided for correctional facility content management. An inmate computing device provides user interfaces and includes a network interface to connect to processors via a network. A platform application facilitates an inmate interface via the inmate computing device and operates in an application layer. Native modules, designed for the platform application, operate in the application layer. At least one module controls access by the inmate computing device to content from a remote source transmitting the content to facilitate playing and displaying of the content with the inmate computing device. Access regimes define rules regulating the modules. At least one access regime defines rules regulating the access to the content. Each access regime is a function of one or more of an identity of third-party module, an identity of native module, an identity of inmate computing device, an identity of inmate, or a location.

  • Pub Date: 2016/22/03
  • Number: 09596247
  • Owner: CORE SYSTEMS (NI) LIMITED
  • Location: Belfast, IE
  • Details: Visit USPTO

Visit USPTO Page


Powering RFID tags using multiple synthesized-beam RFID readers

Synthesized-beam RFID readers may be used to manage and provide information about RFID tag populations. In one embodiment, two or more synthesized-beam readers synthesize respective RF beams towards a tag location. The synthesized-beam readers may coordinate their pointing by means of a controller, a peer-to-peer network, or by using a master-slave arrangement. The synthesized-beam readers may coordinate their transmissions to increase the RF energy available to a tag at the pointing location.

  • Pub Date: 2016/21/03
  • Number: 09652643
  • Owner: IMPINJ, INC
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Event application

The present invention includes systems and methods for providing event information. A one-time use app is downloaded to a user device when a user elects to purchase the app. The app receives event-related information from an event database. The event database receives information from a plurality of sources. The sources are each associated with an application programming interface. The app provides event-related information to the user through purchased options. The app can filter information based on a user profile before providing the information to the user.

  • Pub Date: 2016/21/03
  • Number: 09659102
  • Owner: PROSPORTS TECHNOLOGIES, LLC
  • Location: Miami, US
  • Details: Visit USPTO

Visit USPTO Page


USP7 inhibitor compounds and methods of use

  • Pub Date: 2016/18/03
  • Number: 09573899
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Image forming apparatus and process cartridge

An image forming apparatus is provided which includes an image bearer, a charger to charge the image bearer, a latent image forming device to form an electrostatic latent image on the image bearer, a developing device to develop the electrostatic latent image with a toner, a transfer device to transfer the toner image onto a transfer medium, and a cleaning blade to remove residual toner particles remaining on the image bearer. The toner includes a binder resin and a release agent. The release agent has a longest length Lmax in the toner, which is equal to or greater than 1.1 times a maximum Feret diameter Df of the toner. The cleaning blade includes a strip-like elastic body blade having a contact part with the image bearer. The contact part includes a cured product of an ultraviolet curable composition including an acrylate or methacrylate compound having an alicyclic structure.

  • Pub Date: 2016/18/03
  • Number: 09588479
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Trust relationships in a computerized system

Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.

  • Pub Date: 2016/17/03
  • Number: 09602478
  • Owner: SSH Communications Security OYJ
  • Location: Helsinki, FI
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for configuring media devices utilizing audio codes or signatures

Example systems and methods for configuring media devices utilizing audio codes and/or signatures are disclosed. Example methods disclosed herein include determining a characteristic of audio data received by a device, the characteristic including at least one of a code detected in the audio data or a signature generated from the audio data. Disclosed example methods also include determining whether the characteristic is mapped to at least one of a first command or a second command. Disclosed example methods further include, in response to determining the characteristic is mapped to the first command, executing the first command to cause the device to connect to a communication session to receive an upgrade to software executable on the device, and in response to determining the characteristic is mapped to the second command, executing the second command to cause a previously locked feature of the device to be unlocked.

  • Pub Date: 2016/17/03
  • Number: 09635403
  • Owner: The Nielsen Company (US), LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Remediation of security vulnerabilities in computer software

Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each of the candidate downgrader placement locations corresponds to a transition between a different pair of instructions within the computer software application, and where each of the transitions participates in any of a plurality of data flows in a set of security-sensitive data flows within the computer software application, applying a downgrader specification to the set of candidate downgrader placement locations, and determining that the downgrader specification provides full coverage of the set of security-sensitive data flows within the computer software application if at least one candidate downgrader placement location within each of the security-sensitive data flows is a member of the set of candidate downgrader placement locations.

  • Pub Date: 2016/17/03
  • Number: 09589134
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Relationship-based authorization

Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for authorization to a computer-based resource is received, and the authorization may be provided based on one or more relationships of a requesting principal. A determination may be made as to whether a requesting principal is authorized, which may include determining whether the requesting user has a relationship with a principal that has management rights of the computer-based resource and determining whether the relationship allows for an access, such as a use of the computer-based resource, if the requesting principal has a relationship with the other principal. If there is no such relationship, a determination may be made as to whether an organization of the requesting principal has a relationship with the other principal that allows for the access.

  • Pub Date: 2016/17/03
  • Number: 09608978
  • Owner: Medox Technologies, Inc.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Query-based software dependency analysis

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generated aggregated dependencies between software elements in a code base. One of the methods includes receiving a query that defines a dependency between the software elements in a project. Searching a database to identify matching source software elements having the one or more source attributes and target software elements having the one or more target attributes of the query. Identifying pairs of matching source software elements and matching target software elements having the specified relationship, and generating, for each pair of matching source software elements and matching target software elements having the specified relationship, a new dependency in a raw dependency graph, the new dependency being a dependency from a source software element of the pair to the target software element of the pair.

  • Pub Date: 2016/17/03
  • Number: 09552276
  • Owner: Semmle Limited
  • Location: Oxford, GB
  • Details: Visit USPTO

Visit USPTO Page


Multi-degrees-of-freedom hand controller

Disclosed is a controller including a first control member, a second control member that extends from a portion of the first control member, and a controller processor that is operable to produce a rotational movement output signal in response to movement of the first control member, and a translational movement output signal in response to movement of the second control member relative to the first control member. The rotational movement output signal may be any of a pitch movement output signal, a yaw movement output signal, and a roll movement output signal, and the translational movement output signal may be any of an x-axis movement output signal, a y-axis movement output signal, and a z-axis movement output signal. In exemplary embodiments, the first control member may be gripped and moved using a single hand, and the second control member may be moved using one or more digits of the single hand, thus permitting highly intuitive, single-handed control of multiple degrees of freedom, to and including, all six degrees of rotational and translational freedom without any inadvertent cross-coupling inputs.

  • Pub Date: 2016/16/03
  • Number: 09547380
  • Owner: Fluidity Technologies, Inc.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Heterogeneous media packet bridging

Methods and systems for bridging network packets transmitted over heterogeneous media channels are provided. According to one embodiment, a network switching/routing blade server comprises network modules, including a first and second set operable to receive packets having a first and second framing media format, respectively. A single bridging domain is provided by a shared bridging application. A memory stores data structures for translating between the first and second framing media formats via an intermediate format. The netmods pass a received packet, through a switching fabric, to the bridging application, which determines a relay location for the packet and whether the relay location is among the other set of netmods. Responsive to an affirmative determination, the bridging application uses the translation data structures to translate the packet before relaying the packet to the relay location.

  • Pub Date: 2016/16/03
  • Number: 09509638
  • Owner: Fortinet, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Auto-deployment and testing of system application test cases in remote server environments

A method for executing a system application test case of a runtime system in an integrated server environment is provided. The method includes establishing a transmission control protocol connection between a client development environment and an integrated server environment, to initiate execution of the system application test case in the integrated server environment. The method further includes issuing a data transfer protocol transmission request to the integrated server environment for a description script of the system application test case. The method further includes transmitting an extensible markup language of the requested description script. The method further includes issuing a data transfer protocol transmission request to execute a test of the system application test case. The method further includes executing the system application test case in the integrated server environment. The method further includes transmitting the extensible markup language document of the compiled test results to the client development environment.

  • Pub Date: 2016/16/03
  • Number: 09547583
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for using a side camera for free space gesture inputs

An information handling system including a camera mounted in the side edge surface for detecting gestures by a user on a detected working surface in a gesture detecting zone next to the system and including a gesture detection system for interpreting free space gestures and initializing cursor control commands.

  • Pub Date: 2016/15/03
  • Number: 09658699
  • Owner: Dell Products, LP
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Context based virtual area creation

Examples of systems and methods for context based virtual area creation are described. Some examples provide a quick and easy way for users to wrap virtual areas around contexts of interest. Examples of such contexts may be defined in terms of one or more of content, people, and real-world location. The virtual areas support realtime communications between communicants (e.g., one or more of text chat, voice, video, application sharing, and file sharing) and provide a persistent historical repository for interactions in the virtual area. Summaries of activities and other events in virtual areas typically are published in realtime so that other communicants can readily obtain a quick summary of the activities occurring in a particular context and decide whether or not to join or otherwise participate in those activities.

  • Pub Date: 2016/15/03
  • Number: 09602447
  • Owner: Sococo, Inc.
  • Location: Eugene, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for applying parental control limits from content providers to media content

System and Method of filtering and modifying access to media content based on parental control limits are provided. The method for filtering media content includes receiving authentication information for a content provider, authenticating to the content provider, importing parental control limits from the content provider, storing the received parental control limits in a customer profile, and filtering the media content based on the parental control limits to produce a filtered list of the media content. The method for modifying access to media content includes authenticating to a customer profile with a unique customer identifier, retrieving parental control limits from the customer profile, and modifying access to the media content based on the retrieved parental control limits. Changes in the parental control limits at a content provider may be detected and updated in the customer profile.

  • Pub Date: 2016/14/03
  • Number: 09615134
  • Owner: REDBOX AUTOMATED RETAIL, LLC
  • Location: Oakbrook Terrace, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring and capturing early diagnostic data

A deviance monitoring module is provided for examining various parameters of an operating system for deviance from a baseline behavior at specified intervals. A range of acceptable deviance values from a baseline behavior is set for parameters of an operating system. The parameters of the operating system are then monitored at specified intervals for deviance from the baseline behavior. In response to detecting that the deviance exceeds a predetermined threshold, the method triggers diagnostic data gathering on the parameters of the operating system according to an embodiment.

  • Pub Date: 2016/11/03
  • Number: 09471477
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Low power device with encryption

A server is in communication with a low power device. The server has a handshake key (Kh) with a key exchange that provides for a communication session between a mobile device and the low power device. The mobile device does not have the (Kh). A user mobile device is in communication with the server and uses a cipher to provide a secured communication between the mobile device and the low power device.

  • Pub Date: 2016/11/03
  • Number: 09647996
  • Owner: August Home, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for separating content site visitor profiles

Embodiments of the systems described herein can implement one or more visitor tearing processes. Visitor tearing can include, among other things, one or more processes by which multiple visitors that may appear to be the same visitor may be separated into different visitor profiles due to the leveraging of one or more unique persistent identifiers.

  • Pub Date: 2016/10/03
  • Number: 09537964
  • Owner: TEALIUM INC.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Lighting nodes having a core node and sensor pods

A method and a system of lighting nodes having a core node and sensor pods is described. A core node, representing a master device, is positioned within a luminaire housing to enable lighting control for the luminaire. At least one peripheral device representing an integrated sensor pod, an external sensor pod, or a video node. Each of the peripheral devices representing a slave device and includes one or more sensors for detecting conditions. A pod bus, representing a master-slave bus, enables power signals to be transmitted to each of the peripheral devices. The pod bus also enables the core node to query each of the peripheral devices and each of the peripheral devices to respond to a query from the core node.

  • Pub Date: 2016/10/03
  • Number: 09565732
  • Owner: Sensity Systems Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent door lock system with reduced door bell and camera false alarms

An intelligent door lock system includes a position sensing device at a dwelling configured to be coupled to a drive shaft of a lock device to assist in locking and unlocking a lock of a lock device. An engine with a memory is coupled to the positioning sensing device. An energy source is provided. At least one motion detection device looks for a person at or near a door or window at the dwelling. A device converts energy into mechanical energy is coupled to the positioning sensing device and the drive shaft. The device that converts energy is coupled to the energy source to receive energy from the energy source.

  • Pub Date: 2016/10/03
  • Number: 09644399
  • Owner: August Home, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud based logging service

Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service is integrated within a network security appliance by automatically configuring access settings for the logging service and creating an account for the security appliance with the logging service. A log is created within the logging service by making use of the automatically configured access settings and the account. A request is received by the security appliance to access data associated with the log. Responsive thereto and without requiring separate registration with the cloud-based logging service, the data is retrieved by the security appliance from the logging service and is presented via an interface of the security appliance.

  • Pub Date: 2016/10/03
  • Number: 09521159
  • Owner: Fortinet, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for domain password reset in a secured distributed network environment

Embodiments of systems and method as presented herein allow a user's locally stored authentication credentials to be reset without needing either to contact the domain controller over a network or authenticating a user at the device. Credentials being reset by the user are obtained at the device and encrypted in the same manner as the original locally stored domain credentials such that the new credentials can be used to overwrite the previously stored authentication credentials for the user at the device without contacting the domain controller over the network. The user can then access his device without contacting the domain controller using these new locally stored authentication credentials. Additionally, the user's credentials may be independently reset with respect to the domain controller. Thus, once the user is locally authenticated to the device using the new credentials, the user may be permitted access to the domain with the new credentials through the domain controller as the new credentials have been also been reset at the domain controller.

  • Pub Date: 2016/09/03
  • Number: 09600656
  • Owner: Sailpoint Technologies, Inc.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for assisted real-time control of vehicle headlight

In one embodiment, a Headlight Controlling Device for automatically controlling vehicle headlights is disclosed. The Headlight Controlling Device comprises a processor and a memory communicatively coupled to the processor. The memory stores processor instructions, which, on execution, causes the processor to collect at least one of vehicle information, vehicle speed, road information, area information, weather information or a multimedia object associated with a forward path of the vehicle. The processor further determines a current light intensity distribution of the vehicle headlight based on the multimedia object. The processor further compares the current light intensity distribution of the vehicle headlight with an optimal light intensity distribution, wherein the optimal light intensity distribution is retrieved from a database based on at least one of the vehicle information, the vehicle speed, the road information, the area information or the weather information. The processor further controls the vehicle headlight based on the comparison.

  • Pub Date: 2016/09/03
  • Number: 09649974
  • Owner: WIPRO LIMITED
  • Location: Bangalore, IN
  • Details: Visit USPTO

Visit USPTO Page


Opt-in tracking across messaging application platforms

The systems and methods discussed herein enable telecommunications service providers to track opt-ins (consent) to premium service and goods purchases. An industry aggregator gateway may be employed to receive short codes in messages built by IP messaging applications capable of data transmission, and may transmit the messages to telecommunications service providers and receive purchase information associated with various short codes. At least some of this purchase information is displayed to users to obtain consent to the purchase, and the consent trail from the request to the acceptance of purchase information, including terms and charges, is tracked and stored.

  • Pub Date: 2016/09/03
  • Number: 09571991
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent door lock system with automatic unlock

A lock system is coupled to a lock at a dwelling of a dwelling user, resource owner, or end-user, collectively the user. An intelligent door lock system is provided with a remotely operable lock at the dwelling accessible by the user. The intelligent door lock system is configured to be in communication with a server. An automatic unlock system is activated when the user communicates with the server using the user's mobile device. The server is configured to transmit a crossing notification message in response to tracking the user's mobile device and enable an automatic unlock feature of the lock using the server and a mobile device App.

  • Pub Date: 2016/09/03
  • Number: 09652917
  • Owner: August Home, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Context aware transactions performed on integrated service platforms

Certain aspects of the present disclosure relate to user access to an application service that references user account information and previous user action information. One example method may include receiving, via a receiver device, user input information to access an application, the user input information including at least one action request and authorizing the user to access the application. The method may also include storing the user input information as part of a contextual history information record in a database memory, generating a response message to the selected at least one action request based on the contextual history information, and forwarding the response message to the user via a transmitter device.

  • Pub Date: 2016/08/03
  • Number: 09537959
  • Owner: West Corporation
  • Location: Omaha, US
  • Details: Visit USPTO

Visit USPTO Page


User equipment initiated discontinuous operation in a wireless communications network

An apparatus and method for initiating discontinuous reception (DRX) operation in a user equipment (UE) are disclosed herein. Applications running on the UE are monitored by the UE to identify one or more inactivity trigger events associated with the application(s). The UE includes an application-radio cross layer to process the application information, including the inactivity trigger event, for use by a radio layer. The radio layer of the UE determines initiation of the DRX operation in accordance with the application information, including the inactivity trigger event, provided by the application-radio cross layer and device characteristics information.

  • Pub Date: 2016/07/03
  • Number: 09538547
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing remote direct memory access (RDMA) with cache aligned operations

A system for optimizing remote direct memory accesses (RDMA) is provided. The system includes a first computing device and a second computing device disposed in signal communication with the first computing device. The first and second computing devices are respectively configured to exchange RDMA credentials during a setup of a communication link between the first and second computing devices. The exchanged RDMA credentials include cache line size information of the first computing device by which a cache aligned RDMA write operation is executable on a cache of the first computing device in accordance with the cache line size information by the second computing device.

  • Pub Date: 2016/07/03
  • Number: 09451027
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for digital predistortion of ultra wideband radio frequency upconverters

Method, apparatus, and article of manufacture for performing digital pre-distortion of wideband analog upconversion chains existing within communications systems. By pre-distorting for the deterministic non-linearities in an analog upconverter, a radiated passband signal will show an improved signal quality which will enhance the ability of a receiver to properly decode received data symbols, as well as perform equalization of the received signal constellation. It is desired that this pre-distortion technique will further improve the signal quality of communication systems who only implement pre-distortion techniques for compression effects due to power amplifiers.

  • Pub Date: 2016/07/03
  • Number: 09595983
  • Owner: The United States of America as represented by the Secretary of the Air Force
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Incident light sensor on autonomous vehicle

An incident light meter on an autonomous vehicle receives ambient light and outputs an incident light measurement in response the ambient light. One or more image sensors of the autonomous vehicle image the environment of the autonomous vehicle. An exposure setting is generated at least in part on the incident light measurement. The one or more image sensors capture a digital image at the exposure setting.

  • Pub Date: 2016/07/03
  • Number: 09454154
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Flexible caching of resource oriented web services

A cache management system, method, and computer-readable medium which manage caching of resources are provided. The method includes receiving a request for a resource including a hierarchical resource locator, fetching the resource from a node upon determining that the resource is not stored in a cache, adding an entry for the resource to a mapping table associated with the cache, the entry including the resource locator and dependency information for dependent resources identified from the hierarchical structure of the resource locator, and updating entries in the mapping table for master resources identified from the hierarchical structure of the resource locator, the updated entries including an identifier for the resource.

  • Pub Date: 2016/07/03
  • Number: 09602622
  • Owner: Neustar, Inc.
  • Location: McLean, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic session monitoring in secure media-based conferencing

Methods and apparatuses, including computer program products, are described for monitoring conference session resources in a media-based conferencing system. A server computing device establishes a connection to media engines hosting in-process conference sessions. The server periodically captures system level information, application level information, and meeting size associated with each of the conference sessions. The server determines a session state associated with each of the conference sessions, and determines a pool of available computing devices to provide resources to the conference sessions. The server allocates available computing devices to the in-process conference sessions based upon the session state and periodically reports the session state and the pool of available computing devices to a network API module, which determines a routing for subsequent communication session requests based upon the reported session state and pool of available computing resources.

  • Pub Date: 2016/07/03
  • Number: 09591040
  • Owner: EDIFIRE LLC
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Dual-party session key derivation

Embodiments relate to negotiating a session key to secure a user session executed in a host computer. An electronic hardware security module (HSM) located in the host computer generates a first session key. A smart card generates a second session key that matches the first session key. An encrypted copy of the second session key is communicated to an electronic host application module installed in the host computer. The electronic host application module decrypts the encrypted session key to obtain a copy of the session key such that the first and second session keys possessed by the smart card, the host application module and the HSM match one another.

  • Pub Date: 2016/07/03
  • Number: 09473299
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


CAPTCHA image scramble

In one embodiment, a client computing device receives information regarding a Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA). The CAPTCHA includes an image file, a challenge, and code that is executable by a web browser to unscramble the received image file. The code includes instructions to divide the received image file into image sections, each image section having a unique identifier and grouped into either a first set or a second set. The code further contains instructions to transpose each image section in the first set into a new position, creating a new image. A web browser of the client computing device executes the code to create a second image from the received image file. The second image and the challenge are presented to a user of the client computing device.

  • Pub Date: 2016/07/03
  • Number: 09635019
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Associating geographic attributes with a physical location including a threshold portion of a geographic region

An online system receives a description of a physical location associated with a content item and a threshold distance of the physical location. To identify users eligible to be presented with the content item, the online system divides a geographic map of the physical location associated with the content item into a plurality of geo-tiles each representing a portion of the map. The online system computes and stores values describing portions of a geographic region represented by certain geo-tiles and associates the geographic region with the physical location if the stored values equal or exceed a threshold value. If the geographic region is associated with the physical location, users associated with the geographic region are identified by the online system as eligible to receive the content item.

  • Pub Date: 2016/07/03
  • Number: 09641972
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing compensation, rebate, cashback, and reward for using mobile and wearable payment services, digital currency, NFC touch payments, mobile digital card barcode payments, and multimedia haptic capture buying

Provided are methods and systems for providing compensation for using a mobile payment service. The method may commence with receiving payment information associated with a user. The method may include generating a unique code encoding the payment information and providing the generated unique code to the user. The method may continue with receiving a deposit amount associated with a purchase related to the user. The purchase may be made via the mobile payment service. The method may further include receiving a notification about a further purchase of the user via the mobile payment service. The notification may include at least the unique code and a product barcode. The product barcode may be associated with the further purchase. The method may further include providing a compensation from the deposit amount to the user. The compensation may be associated with a payment amount associated with the further purchase.

  • Pub Date: 2016/04/03
  • Number: 09619794
  • Details: Visit USPTO

Visit USPTO Page


Smarter electronic reader

Embodiments of the present invention provide methods, computer program products, and systems for enriching and customizing one or more portions of textual content. Embodiments of the present invention analyze one or more portions of the textual content and customize the textual content based on preferences of a user interacting with the textual content. Embodiments of the present invention can present customized or original textual content to users requesting textual content.

  • Pub Date: 2016/04/03
  • Number: 09471564
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Removable media tray having a media restraint with sliding cams and pivoting latching cams operable without the use of pinching

A media restraint for a removable media tray and slidably operable without the use of a pinching force. The media restraint slidably positionable on a track in a removable media tray and is operable without pinching. A pair of pivoting latching cams are used to engage the media restraint to the track and have serrated portions pivotally mounted to a bottom of the media restraint. The media restraint is operable by a finger of the user applying a downward force to an actuator that spreads two cam plates apart which in turn pivot the pair of latching cams to release the media restraint from the track and allowing it to be moved along the track. Upon removal of the downward force, a biasing member lifts the actuator to bring the two cam plates back to their first positions thereby pivoting the pair of latching cams back to reengage with the track.

  • Pub Date: 2016/04/03
  • Number: 09580258
  • Owner: Lexmark International, Inc.
  • Location: Lexington, US
  • Details: Visit USPTO

Visit USPTO Page


Comment plug-in for third party system

In particular embodiments, one or more computing devices associated with a third-party system generate a web page comprising one or more references configured to cause a client device to send a request to a web site of a social-networking system to access a user comment, wherein the user comment is associated with content on a third-party web site hosted by the third-party system. The request comprises a first URL that references the web site of the social-networking system, and the first URL comprises a second URL that references the third-party web site and comprises a content identifier for the content, and the request is to cause the web site of the social-networking system to access the user comment in a data store of the social-networking system. The one or more computing devices associated with the third-party system may send the web page to the client device.

  • Pub Date: 2016/04/03
  • Number: 09646173
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for managing the scheduling of snapshots on a storage array

A storage management application of a storage array is operable to create a new volume on the storage device array, and to automatically configure, responsive to user selection of an application protection profile, data protection services for application data to be stored on the volume, and/or, responsive to user selection of an application performance profile, application specific performance parameters. The application protection profile specifies scheduling and replication of snapshots for application data to be stored on the volume, and the application performance profile specifies performance parameters such as setting a block size, enabling or modifying a data caching algorithm, turning on or modifying data compression, etc. The scheduling, replication and/or application performance may be managed by a daemon associated with the storage management application which communicates with an agent associated with an application server on which the application executes.

  • Pub Date: 2016/03/03
  • Number: 09563378
  • Owner: NIMBLE STORAGE, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for accessing hardware resource

A method and an apparatus for accessing a hardware resource are provided. The method includes configuring permission for one or more privileged instructions that are used for hardware access such that when the privileged instructions are used by a user mode application program, the application program can access a hardware resource without trapping into a kernel, and executing the privileged instructions that are encapsulated in the privileged application programming interface (API) that is called at the code level by the application program , and a privileged instruction for direct access to a hardware resource is set and encapsulated into an API, which is deployed in user space in order to reduce system overheads for accessing the hardware resource and improve processing efficiency.

  • Pub Date: 2016/03/03
  • Number: 09529650
  • Owner: Huawei Technologies Co., Ltd.
  • Location: Shenzhen, CN
  • Details: Visit USPTO

Visit USPTO Page


Management and authentication in hosted directory service

A user, group, and device management and authentication system allows administrators to manage one or more directories with devices that are not associated with a domain of the one or more directories via a set of APIs. The system also allows applications and services that do not have direct access to a list of directory users to access the one or more directories. The user, group, and device management and authentication system may be an add-on system that works in conjunction with a centrally-managed directory service to provide such functionality. For example, the system may generate an access token associated with a particular directory that can be used by a service accessed by an administrator to call an API provided by the system. The API call may be translated into a directory-specific API call that can be used to perform an action in the particular directory.

  • Pub Date: 2016/03/03
  • Number: 09596233
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for performing data replication

Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

  • Pub Date: 2016/02/03
  • Number: 09639294
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Settings of a digital camera for depth map refinement

Systems and methods are disclosed for identifying depth refinement image capture instructions for capturing images that may be used to refine existing depth maps. The depth refinement image capture instructions are determined by evaluating, at each image patch in an existing image corresponding to the existing depth map, a range of possible depth values over a set of configuration settings. Each range of possible depth values corresponds to an existing depth estimate of the existing depth map. This evaluation enables selection of one or more configuration settings in a manner such that there will be additional depth information derivable from one or more additional images captured with the selected configuration settings. When a refined depth map is generated using the one or more additional images, this additional depth information is used to increase the depth precision for at least one depth estimate from the existing depth map.

  • Pub Date: 2016/29/02
  • Number: 09521391
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time module protection

Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module associated with the attempt, determining a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt, accessing a security rule to determine whether to allow the attempted access based on the determination of the module and the determination of the subsection, and handling the attempt based on the security rule. The module includes a plurality of distinct subsections.

  • Pub Date: 2016/29/02
  • Number: 09565214
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-application workflow integration

Techniques are described for managing interactions between workflows being performed by different applications, such as to enable a combination of multiple workflows in multiple applications of different types to aggregate varying capabilities available from the different types of applications. In some situations, an integrated workflow is created by separating portions of its functionality into multiple constituent workflows that is each performed by a different application and that initiate one or more inter-workflow interactions between the constituent workflows as they are performed (e.g., for one of the constituent workflows to, while it is being performed, invoke another constituent workflow in order to begin its performance). As one non-limiting example, the multiple applications of different types may include a least an enterprise business application program that provides various core business functions, and a desktop collaborative application program that provides various user activity management capabilities.

  • Pub Date: 2016/29/02
  • Number: 09477539
  • Details: Visit USPTO

Visit USPTO Page


Decentralized authoritative messaging

A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In particular, the secure chat client allows users to create, configure, and manage secure chat rooms. Furthermore, the secure chat client provides users with the ability to recover secure messages when they obtain a new device or otherwise lose communications.

  • Pub Date: 2016/29/02
  • Number: 09590956
  • Owner: Wickr Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Coordinating analytics between media player and server

A method includes receiving a client report including an identifier and client analytics data, the client report received from a client device and the client analytics data associated with a media stream received by the client device from a streaming server. The method further includes receiving a server report including the identifier and server analytics data, the server report received from the streaming server. The method further includes, based on determining that the client report and the server report include the identifier, determining that the client analytics data and the server analytics data are correlated.

  • Pub Date: 2016/29/02
  • Number: 09654360
  • Owner: WOWZA MEDIA SYSTEMS, LLC
  • Location: Golden, US
  • Details: Visit USPTO

Visit USPTO Page


Canonical data model for iterative effort reduction in business-to-business schema integration

The present disclosure describes methods, systems, and computer program products for providing and maintaining an evolving canonical data model (CDM) which consolidates current knowledge of the correspondences of existing schemas. One computer-implemented method includes receiving the plurality of source hierarchical schemas, each source hierarchical schema being stored as a computer-readable document in computer-readable memory, processing, using a computer, the source hierarchical schemas to generate a merged graph, the merged graph comprising a plurality of merged nodes, each merged node being provided based on one or more nodes from at least two of the source hierarchical schemas, and determining, using the computer, that the merged graph includes one or more conflicts and, in response, resolving each conflict of the one or more conflicts to generate a computed-transitive-edge-free, conflict-free merged graph as a unified data model (UDM), wherein resolving comprises splitting one or more merged nodes into respective sub-sets of merged nodes.

  • Pub Date: 2016/29/02
  • Number: 09626451
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Access control interfaces for enhanced wireless router

A wireless router provides access control to information resources stored at the wireless router. The wireless router supports user profiles and/or device profiles that respectively enable user level and/or device level access control. The wireless router may register users via a user registration interface presented by the client device. The wireless router may register client devices using a device identifier. Requests to initiate a communication session may be received by the wireless router from client devices over a wireless local area network. The wireless router may authenticate a client device based on a device identifier and/or authenticate a user based on user credentials obtained via a login interface presented by the client device. The wireless router may control access to information resources stored at the wireless router during the communication session based, at least in part, on access privileges for the authenticated client device and/or authenticated user.

  • Pub Date: 2016/29/02
  • Number: 09635553
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing information security using context-based keys

Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption), or shared with other users (e.g., cryptographic communication). Use of context-based encryption keys enables key association with individual data elements, as opposed to public-private key pairs, or use of conventional user-based or system-based keys. In scenarios wherein data is shared by a sender with other users, the system manages the rights of users who are able to send and/or access the sender's data according to pre-defined policies/roles.

  • Pub Date: 2016/26/02
  • Number: 09621343
  • Owner: Ionic Security Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for enhanced multimedia in VoIP networks

Calls placed to a call recipient bypass the terminating messaging system, creating an enhanced message in the call originator's messaging system and delivering the enhanced message using alternate routing information. A caller creates enhanced messages for a call recipient even when the call recipient's messaging system does not support such functionality. The caller also embeds stored content and/or use links in the enhanced messages to allow the message to be modified and/or deleted before it is accessed by the call recipient.

  • Pub Date: 2016/26/02
  • Number: 09509849
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for routing communications

A system and method that includes receiving a communication request of an account, the communication request including communication properties; identifying at least two routing options of a route priority list, the routing options capable of completing the communication request and identified according to a priority heuristic; generating a communication cost from the communication properties; and upon receipt of the routing response and the communication cost response, executing a communication with a routing option of the routing priority list and committing a cost of the communication to the account.

  • Pub Date: 2016/26/02
  • Number: 09654647
  • Owner: Twilio, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for associating a universal user identification and a domain specific user identification

There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system comprising an ID association server accessible by a plurality of secure domains over a network. The system also includes an ID associator application that when executed by ID association server is configured to receive a domain specific ID that associates the user to the secure domain, enter the domain specific ID in a domain transcendent ID record created for the user, generate a unique data associated with the domain transcendent ID record and identify a network location for submission of the unique data, send the unique data and the network location to the user, and associate the domain transcendent ID and the domain specific ID.

  • Pub Date: 2016/26/02
  • Number: 09473501
  • Owner: Disney Enterprises, Inc.
  • Location: Burbank, US
  • Details: Visit USPTO

Visit USPTO Page


Prioritizing data reconstruction in distributed storage systems

A method of prioritizing data for recovery in a distributed storage system includes, for each stripe of a file having chunks, determining whether the stripe comprises high-availability chunks or low-availability chunks and determining an effective redundancy value for each stripe. The effective redundancy value is based on the chunks and any system domains associated with the corresponding stripe. The distributed storage system has a system hierarchy including system domains. Chunks of a stripe associated with a system domain in an active state are accessible, whereas chunks of a stripe associated with a system domain in an inactive state are inaccessible. The method also includes reconstructing substantially immediately inaccessible, high-availability chunks having an effective redundancy value less than a threshold effective redundancy value and reconstructing the inaccessible low-availability and other inaccessible high-availability chunks, after a threshold period of time.

  • Pub Date: 2016/26/02
  • Number: 09535790
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Landmark based positioning

Disclosed are devices, methods and storage media for use in determining position information for imaging devices or mobile devices. In some implementations, a landmark is identified in an image which is obtained from an imaging device which in turn is positioned at a location and in a pose. A virtual two-dimensional image that would be visible from the landmark is determined based, at least in part, on the pose. The location or position information is based, at least in part, on the virtual two-dimensional image.

  • Pub Date: 2016/26/02
  • Number: 09483826
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated metering of service usage for hybrid clouds

A hybrid cloud environment is provided where a user of cloud computing services is disposed to consume cloud provided services delivered by each of a plurality of cloud computing service providers. Specified event data is received at an MCS component. The event data pertains to metering events related to the cloud provided services delivered by one or more cloud service providers. Event data include event data furnished by one or more entities that actively monitor metering events at one or more local or remote cloud service provider locations. Event data are sent from the MCS component to a metering system. The metering system generates reports from the event data that contains usage information on services provided by one or more cloud service providers. Information for a provider specifies amounts and quality of each type of service delivered to users by the provider.

  • Pub Date: 2016/26/02
  • Number: 09473374
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Device orientation based translation system

A method for translating content includes providing a plurality of content on a user device. The plurality of content is associated with a first region display mode. The plurality of content is displayed on the user device in the first region display mode. A predefined orientation is then detected in the user device. The plurality of content is then translated according to a second region display mode to produce a plurality of translated content. The plurality of translated content is then displayed on the user device. In different embodiments, the plurality of content may have been previously provided on the user device, may be retrieved over a network by the user device, or my be received through a user interface on the user device. A specific embodiment allows a user to rotate the user device 180 degrees to quickly and easily translate text displayed on the user device.

  • Pub Date: 2016/26/02
  • Number: 09613030
  • Owner: PayPal, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for transforming luminal images

The invention provides methods and systems for correcting translational distortion in a medical image of a lumen of a biological structure. The method facilitates vessel visualization in intravascular images (e.g. IVUS, OCT) used to evaluate the cardiovascular health of a patient. Using the methods and systems described herein it is simpler for a provider to evaluate vascular imaging data, which is typically distorted due to cardiac vessel-catheter motion while the image was acquired.

  • Pub Date: 2016/25/02
  • Number: 09659375
  • Owner: Volcano Corporation
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for data transfer and campaign management

An online and offline communication processing and tracking using data processing and data/voice networks is described. A phone address from a phone address number pool is automatically assigned to a first entity. A call quality rating is determined and recorded. A call from a caller directed to the phone address is received at a call bridging system coupled to at least one network, wherein the call is associated with call signaling information. Based at least in part on the call quality associated with the caller call, the caller call is assigned to a first location in a call queue. An outbound call is generated from the call bridging system and the inbound and the outbound calls are bridged. One or more parameters of the bridged call are compared to the call quality rating. An indication is recorded regarding the successful bridging of the calls in association with an entity identifier.

  • Pub Date: 2016/25/02
  • Number: 09438733
  • Owner: Invoca, Inc.
  • Location: Santa Barbara, US
  • Details: Visit USPTO

Visit USPTO Page


Generation and distribution of named, definable, serialized tokens

A method for generating and distributing serialized tokens is provided. The method may include receiving a request from at least one client. The method may further include determining whether the received at least one request is a request for generating names and definitions for a group of serialized tokens, deleting a names and definitions, and/or receiving a group of serialized tokens. Additionally, the method may include enabling the at least one client to generate names and definitions for a group of serialized tokens. The method may also include storing the names and definitions on a server. The method may also include deleting the names and definitions from the server. The method may also include formatting and distributing serialized tokens based on the names and definitions for the serialized tokens. The method may further include sending a response to the client based on the received request.

  • Pub Date: 2016/25/02
  • Number: 09473304
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Drag and drop portlet deployment

Deploying portlet(s) onto a displayed portal page by dragging and dropping portlet related artifacts from the IDE like portlet deployment descriptor node or a specific portlet node, and, responsively displaying the portlet(s), corresponding to the dropped node, in the displayed portal page. The updating of the portal page is accomplished by an internal IDE browser of a stand-alone type IDE working co-operatively with a remote portal server.

  • Pub Date: 2016/25/02
  • Number: 09606777
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Calendar integration with text messaging to facilitate no-time-specified events

A text based communication from a sender to a recipient is analyzed to automatically detect a no-specific-time (NST) text segment within the text communication. Responsive to detecting the NTS text segment, establishment of a firm time consistent with the NST text segment based on availability of the recipient per an electronic calendar of the recipient, referred to hereafter as the recipient's calendar, is programmatically facilitated. The NST text segment references a future time for a gathering that is lacks a specific date and time. Facilitating establishment of the firm time includes accessing an electronic calendar of the recipient, which is maintained by a server independent of a communication server responsible for sending and receiving communications for the recipient.

  • Pub Date: 2016/25/02
  • Number: 09443232
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


User presence data for web-based document collaboration

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, include sending a first electronic document to a first client device over a data network from a web server. The first electronic document includes multiple document elements formatted according to a first document schema for a first client application. The document elements include multiple content elements and one or more presence elements. Presence data is received over the data network at the web server from the first client device. The presence data includes an identification of one or more of the content elements of the first electronic document. The presence data also includes an identification of a status of the first electronic document for the first client device. An updated presence element for the first electronic document, which includes a first presence object, is stored. The first presence object includes the presence data received from the first client device and an identification of the first client device and/or a first user associated with the first client device. The first presence object is sent over the data network from the web server to a second client device.

  • Pub Date: 2016/24/02
  • Number: 09479605
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Source-to-processing file conversion in an electronic discovery enterprise system

Embodiments of the invention relate to systems, methods, and computer program products for improved electronic discovery. Embodiments herein disclosed provide for an enterprise-wide e-discovery system that provides for source-to-processing file conversion of electronic communications and, in some embodiments, decryption of encrypted electronic communication entries for the purpose of efficiently processing data and supplying the electronic data to third party data analysis providers.

  • Pub Date: 2016/24/02
  • Number: 09547660
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Peer-to-peer data storage

A determination is made of users that form a group within a social network in which the users communicate with each other over a network with electronic devices in a client-server architecture. The users in the group within the social network form a peer-to-peer (P2P) storage group within a P2P storage network. In the P2P storage network, users are peers that act as a client and a server for each other.

  • Pub Date: 2016/24/02
  • Number: 09578102
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and devices for message destination hunting

Methods, servers and systems for communicating signaling information in a telecommunications signaling network implement methods that include receiving a first message encoding signaling information from a source component and processing the message using a fixed pipeline having a plurality of modules, each module having at least one procedure for performing a specific set of tasks. Application level routing operations may be performed to identify a suitable destination component. Information contained in the first message may be used to generate a second message encoding signaling information, which is sent to the identified destination component.

  • Pub Date: 2016/24/02
  • Number: 09439129
  • Owner: OPENET TELECOM, LTD.
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Method for presenting documents using a reading list panel

A reading list panel is displayed as a sidebar window with respect to a main window of a content viewing application. In response to a first input, a first article representation of a first article associated with a presentation page displayed in the main window is listed in the reading list panel, where the first article representation includes information identifying the first article. In response to a selection of a second article representation from the reading list panel, content of a second article represented by the second article representation is presented in a reader mode within the main window.

  • Pub Date: 2016/24/02
  • Number: 09563334
  • Owner: APPLE INC.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Fingerprint check to reduce check fraud

A digital image of a surface of a check is received. A check scanning device captures the digital image as the check moves through the check scanning device. A fingerprint is impressed on the surface of the check. A computing system uses the digital image to determine an initial match score for the fingerprint image and an image quality metric to create an adjusted match score. An alert is presented based on the adjusted match score.

  • Pub Date: 2016/24/02
  • Number: 09652658
  • Owner: Wells Fargo Bank, N.A.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for hybrid computer thread creation and management

A technique for operating a computer system to support an application, a first application server environment, and a second application server environment includes intercepting a work request relating to the application issued to the first application server environment prior to execution of the work request. A thread adapted for execution in the first application server environment is created. A context is attached to the thread that non-disruptively modifies the thread into a hybrid thread that is additionally suitable for execution in the second application server environment. The hybrid thread is returned to the first application server environment.

  • Pub Date: 2016/23/02
  • Number: 09619276
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Proxy based data transfer utilizing direct memory access

A method for transferring data utilizing direct memory access. The method includes a computer processor establishing a networking connection, using a proxy, between at least a first computing entity and a second computing entity. The method further includes determining a shared memory space for the established networking connection between at least the first computing entity and the second computing entity. The method further includes allocating the shared memory space from heap memory. The method further includes transmitting data over the established networking connection between at least the first computing entity and the second computing entity utilizing a direct memory access protocol and the allocated shared memory space.

  • Pub Date: 2016/23/02
  • Number: 09397788
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Private application platform

Methods and systems disclosed provide for creating private networks for secured communication between devices. The devices can communicate with each other over a secure tunnel created for a closed circle of devices. Furthermore, the methods and systems can enable offline communication between devices on a private network.

  • Pub Date: 2016/23/02
  • Number: 09608964
  • Owner: PrivApp, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and compositions for treating dry eye disease and other eye disorders

The present invention discloses pharmaceutical preparations for treatment of eye disorders containing an alpha 2 adrenergic agonist, to processes for producing the pharmaceutical preparations and methods for treatment of various eye disorders including dry eye and Meibomian gland dysfunction and a medicinal applicator for topical application of an alpha 2 adrenergic agonist to a subject, a package assembly for the medicinal applicator and methods of using the medicinal applicator to treat eye disorders.

  • Pub Date: 2016/23/02
  • Number: 09597328
  • Owner: The Board of Trustees of the University of Illinois
  • Location: Urbana, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing additional functionality to existing software in an integrated manner

An improved system and method are disclosed for improving functionality in software applications. In one example, the method includes a mobile device having a network interface, a processor, and a memory configured to store a plurality of instructions. The instructions include instructions for a superblock application having instructions for a function block included therein. The function block is configured to provide functions that are accessible to the superblock application via an application programming interface (API). The functions are provided within the superblock application itself and are accessible within the superblock application without switching context to another application on the mobile device.

  • Pub Date: 2016/22/02
  • Number: 09491233
  • Owner: DAMAKA, INC.
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for full virtual machine backup using storage system functionality

A VM management server receives a request from a backup application server to back up a first VM. The VM management server determines a first of the host systems based on the request, wherein the first host system hosts the first VM. A first request is transmitted from the VM management server to a VMM of the first host system hosting the first VM via a VM application programming interface (VM API) over a network. The first request requests the VMM to capture a VM snapshot representing a consistent state of the first VM. In response to determining that the consistent state of the VM has been captured, a second request is transmitted to a first storage system associated with the first host system to send one or more VM disk images associated with the consistent state of the first VM to a second storage system over the network.

  • Pub Date: 2016/22/02
  • Number: 09477415
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Selection of ranked configurations

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for selection of ranked configurations. In one aspect, a method includes providing a plurality of class definitions for selection, each class definition modeling a respective data or functional component of a cloud-based environment using a group of configurable class parameters, each class definition supporting instantiation and inheritance of the class definition in a configuration specification for a cloud-based deployment; deriving respective performance metrics associated with each of the plurality of class definitions based on aggregated performance of multiple cloud-based deployments, wherein the multiple cloud-based deployments had been carried out according to respective configuration specifications that require instantiation of the class definition or a new class definition derived from the class definition; and utilizing the respective performance metrics associated with each of the plurality of class definitions in ranking the plurality of class definitions.

  • Pub Date: 2016/22/02
  • Number: 09557978
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Profiling multiple virtual machines in a distributed system

A task comprising at least a first subtask on a computer system is analyzed. As part of the analysis, a profiler controller transmits a first profile instruction to a first profiler instance. The profiler controller transmits a second profile instruction to a second profiler instance. In response to the first profile instruction, the first profiler instances embeds a first task identifier into a first subtask request sent by a first virtual machine. In response to the second profile instruction, the second profiler instance captures the first task identifier from the first subtask request received by a second process virtual machine. The profiler controller identifies an execution instance of the task of the computer system based on the first copy and the second copy of the first task identifier received from the first profiler instance and the second profiler instance, respectively.

  • Pub Date: 2016/22/02
  • Number: 09619273
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and system for distributing information via multiple forms of delivery services

A content distribution facilitation system is described comprising configured servers and a network interface configured to interface with a plurality of terminals in a client server relationship and optionally with a cloud-based storage system. A request from a first source for content comprising content criteria is received, the content criteria comprising content subject matter. At least a portion of the content request content criteria is transmitted to a selected content contributor. If recorded content is received from the first content contributor, the first source is provided with access to the received recorded content. The recorded content may be transmitted via one or more networks to one or more destination devices. Optionally, a voice analysis and/or facial recognition engine are utilized to determine if the recorded content is from the first content contributor.

  • Pub Date: 2016/22/02
  • Number: 09461958
  • Owner: Greenfly, Inc.
  • Location: Newport Beach, US
  • Details: Visit USPTO

Visit USPTO Page


Asynchronous movement of in-line metadata for cached volumes at storage gateways

Methods and apparatus for supporting cached volumes at storage gateways are disclosed. A storage gateway appliance is configured to cache at least a portion of a storage object of a remote storage service at local storage devices. In response to a client's write request, directed to at least a portion of a data chunk of the storage object, the appliance stores a data modification indicated in the write request at a storage device, and asynchronously uploads the modification to the storage service. In response to a client's read request, directed to a different portion of the data chunk, the appliance downloads the requested data from the storage service to the storage device, and provides the requested data to the client.

  • Pub Date: 2016/22/02
  • Number: 09588895
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Secure analysis application for accessing web resources

Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.

  • Pub Date: 2016/20/02
  • Number: 09537873
  • Owner: Authentic8, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual cable modem termination system

A method, a system, and an apparatus provide for a cable modem termination system (CMTS). The CMTS may include a virtual machine configured to provide a plurality of virtual CMTSs (vCMTSs). The CMTS may also include a plurality of subscriber groups. Each subscriber group of the plurality of subscriber groups may be assigned to a vCMTS of the plurality of vCMTSs. Additionally, each vCMTS is configured to provide a process.

  • Pub Date: 2016/19/02
  • Number: 09641354
  • Owner: CISCO TECHNOLOLGY, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Gesture-based signature authentication

Embodiments of the invention are generally directed to systems, methods, devices, and machine-readable mediums for implementing gesture-based signature authentication. In one embodiment, a method may involve recording a first gesture-based signature and storing the recorded first gesture-based signature. Then the method compares the first gesture-based signature with a second gesture-based signature. Then the method verifies the first gesture-based signature as authentic when the first gesture-based signature is substantially similar to the second gesture-based signature.

  • Pub Date: 2016/19/02
  • Number: 09560044
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for general purpose encryption of data

Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and an encryption accelerator communicatively coupled to the processor. The encryption accelerator may be configured to encrypt and decrypt information in accordance with a plurality of cryptographic functions, receive a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation, and in response to receiving the command, encrypt or decrypt the data associated with the input/output operation based on a particular one of the plurality of cryptographic functions.

  • Pub Date: 2016/18/02
  • Number: 09658969
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Semantic application logging and analytics

A system for managing dictionaries, such as an application dictionary and a domain dictionary, and for adding entries to a data log is described herein. The system may, in response to a determination that an event occurs at an application, determine that the application uses a first concept name from the application dictionary to describe the event. An entry for the event may be added to a data log for the application. The entry may also include the first concept name from the application dictionary. A mapping of the first concept name from the application dictionary to a second concept name from the domain dictionary may be generated. In some aspects, the data log may be sent to a data log analysis system capable of accessing the domain dictionary.

  • Pub Date: 2016/18/02
  • Number: 09442915
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Proximity-based notification of a previously abandoned and pre-queued ATM transaction

Proximity-triggered notifications/alerts are communicated to bank customers as a result of a previously abandoned/canceled ATM transaction that has subsequently been pre-queued for completion. In this regard, the present invention recognizes when the customer is proximate in location to a financial institution channel suitable for completing the transaction and sends the customer an alert, which is typically received by the customer via a mobile communication device. The alert indicates that the previous abandoned ATM transaction has been pre-queued for completion and provides the customer with the location of the nearest financial institution channel suitable for completing the transaction. In specific embodiments of the invention, pre-queuing of the transaction for completion provides for the customer to complete the transaction from the last existing point in the transaction completed by the customer.

  • Pub Date: 2016/18/02
  • Number: 09646466
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices

Various embodiments of the present technology generally relate to data delivery. More specifically, some embodiments of the present technology relate to systems and methods for using spatial and temporal analysis to associate data sources with mobile devices. The delivery of data to support a wide variety of services for and about mobile devices that are based on data stored in corporate, commercial, and government databases which is not currently linked to individual mobile devices. Some embodiments allow advertisers to better target their ads to relevant target audience with greater accuracy.

  • Pub Date: 2016/17/02
  • Number: 09654919
  • Owner: MOBILE TECHNOLOGY CORPORATION, LLC
  • Location: Boulder, US
  • Details: Visit USPTO

Visit USPTO Page


Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction

A registered provider device encrypts provider input related to a transaction between the provider device and one of many registered user devices to create an encrypted one-time-use provider code (the encryption is performed using an encryption key produced, in part, using a uniquely sequenced number generated by a sequencer maintained by the provider device). Similarly, a provider institution app encrypts user input to create an encrypted one-time-use user code using an encryption key produced, in part, using a uniquely sequenced number generated by a user sequencer maintained by the user device. The provider and provider institution app independently transmit their different encrypted one-time-use codes to an intermediate entity, which decrypts the encrypted codes using one-time-use encryption keys produced using sequencers maintained by the intermediate entity. This decryption generates an authorization request. The intermediate entity obtains an authorization decision regarding the authorization request from the authorization entity.

  • Pub Date: 2016/17/02
  • Number: 09558493
  • Owner: BENEDORTSE LLC
  • Location: Dover, US
  • Details: Visit USPTO

Visit USPTO Page


Seamless virtual machine recall in a data storage system

The data storage system according to certain aspects can manage the archiving of virtual machines to (and restoring of virtual machines from) secondary storage. The system may archive virtual machines (VMs) that are determined to have a low level of utilization. The system may create a virtual machine placeholder for an archived VM, which may be a “light” or minimal version of the VM that acts like the actual VM. By using a VM placeholder, a VM may appear to be active and selectable by the user. When the user selects the VM, the VM placeholder can interact with the user in similar manner as the VM. Accessing the VM placeholder may trigger restore of the archived VM from secondary storage. The restore of the archived VM may be “seamless” to the user since the VM remains available while it is being restored.

  • Pub Date: 2016/17/02
  • Number: 09489244
  • Owner: COMMVAULT SYSTEMS, INC.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for routing in a state machine

A device includes a routing buffer. The routing buffer includes a first port configured to receive a signal relating to an analysis of at least a portion of a data stream. The routing buffer also includes a second port configured to selectively provide the signal to a first routing line of a block of a state machine at a first time. The routing buffer further includes a third port configured to selectively provide the signal to a second routing line of the block of the state machine at the first time.

  • Pub Date: 2016/17/02
  • Number: 09535861
  • Owner: Micron Technology, Inc.
  • Location: Boise, US
  • Details: Visit USPTO

Visit USPTO Page


Haptic notifications

Embodiments of the present disclosure are directed to a haptic actuator or a device having a haptic actuator that is capable of producing short, sharp and crisp pulses in a short amount of time.

  • Pub Date: 2016/17/02
  • Number: 09564029
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Depth map generation

Depth maps are generated from two or more of images captured with a conventional digital camera from the same viewpoint using different configuration settings, which may be arbitrarily selected for each image. The configuration settings may include aperture and focus settings and/or other configuration settings capable of introducing blur into an image. The depth of a selected image patch is evaluated over a set of discrete depth hypotheses using a depth likelihood function modeled to analyze corresponding images patches convolved with blur kernels using a flat prior in the frequency domain. In this way, the depth likelihood function may be evaluated without first reconstructing an all-in-focus image. Blur kernels used in the depth likelihood function and are identified from a mapping of depths and configuration settings to the blur kernels. This mapping is determined from calibration data for the digital camera used to capture the two or more images.

  • Pub Date: 2016/17/02
  • Number: 09479754
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for transmitting information, alerts, and/or comments to participants based on location information

The present invention generally relates to systems and methods for sharing information related to a location also referred to herein as a “spot,” such as spot alerts and/or spot comments (e.g., shared information, advertisements, etc.) received, displayed, played, and/or actuated, for example, on recipient mobile electronic devices proximately located to such location (e.g., spot). Users of the system can create spot alerts in which designated recipients can receive messages, such as spot alerts and/or spot comments (e.g., shared information, advertisements, etc.) received, displayed, played, and/or actuated, for example, on respective recipient mobile electronic devices, when located within a proximity of a defined location (e.g., spot).

  • Pub Date: 2016/16/02
  • Number: 09420560
  • Owner: JINGLE TECHNOLOGIES LLC
  • Location: Westport, US
  • Details: Visit USPTO

Visit USPTO Page


System for populating budgets and/or wish lists using real-time video image analysis

System, method, and computer program product are provided for using real-time video analysis, such as augmented reality to provide the user of a mobile device with real-time budgeting and wish lists. Through the use of real-time vision object recognition objects, logos, artwork, products, locations, and other features that can be recognized in the real-time video stream can be matched to data associated with such to provide the user with real-time budget impact and wish list updates based on the products and budget data determined as being the object. In this way, the objects, which may be products and/or budget data in the real-time video stream, may be included into a user's budget and/or wish list, such that the user receives real-time budget and/or wish list updates incorporating product and/or budget data located in a real-time video stream.

  • Pub Date: 2016/16/02
  • Number: 09519932
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


System for collective network of augmented reality users

Embodiments of the invention provide for using video analysis, such as augmented reality or the like to assist a group of users to utilize mobile devices for creating a collective network environment of users that identifies objects in which one or more users in a group of users may be interested, and notifies the one or more users of information associated with the object. A collective network comprises a group of users that each have a mobile device that contains or is otherwise operatively coupled to a data capture device. For example, the mobile device may be a mobile phone that is capable of taking video with a camera device. A user in the collective network may capture video on his mobile device, and an application can identify the object in the video and provide interested users in the collective network with information about the object.

  • Pub Date: 2016/16/02
  • Number: 09519923
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Radiation exposure self test (REST)—optimized personal dosimetry and kiosk for reliably indicating exposure to radiation

Described is a method and system that facilitates triage of thousands to millions of potential patients within a relatively short period of time by scanning of a substrate of a designated card issued to a victim. The method and the system comprise a plurality of noninvasive self-testing test devices located at a plurality of remote peripheral self-testing sites, and each one of the plurality of noninvasive self-testing test devices facilitates self-testing of the substrate of the designated card. Each of the plurality of noninvasive self-testing test devices provides test results of the scan of the substrate of the designated card, and the potential patients are identified, then subsequently screened and triaged based upon the test results of the scan of the substrate of the designated card.

  • Pub Date: 2016/16/02
  • Number: 09400331
  • Owner: GRAY RAPID DIAGNOSIS, LLC
  • Location: Hanover, US
  • Details: Visit USPTO

Visit USPTO Page


Method for populating budgets and/or wish lists using real-time video image analysis

System, method, and computer program product are provided for using real-time video analysis, such as augmented reality to provide the user of a mobile device with real-time budgeting and wish lists. Through the use of real-time vision object recognition objects, logos, artwork, products, locations, and other features that can be recognized in the real-time video stream can be matched to data associated with such to provide the user with real-time budget impact and wish list updates based on the products and budget data determined as being the object. In this way, the objects, which may be products and/or budget data in the real-time video stream, may be included into a user's budget and/or wish list, such that the user receives real-time budget and/or wish list updates incorporating product and/or budget data located in a real-time video stream.

  • Pub Date: 2016/16/02
  • Number: 09524524
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Method for collective network of augmented reality users

Embodiments of the invention provide for using video analysis, such as augmented reality or the like to assist a group of users to utilize mobile devices for creating a collective network environment of users that identifies objects in which one or more users in a group of users may be interested, and notifies the one or more users of information associated with the object. A collective network comprises a group of users that each have a mobile device that contains or is otherwise operatively coupled to a data capture device. For example, the mobile device may be a mobile phone that is capable of taking video with a camera device. A user in the collective network may capture video on his mobile device, and an application can identify the object in the video and provide interested users in the collective network with information about the object.

  • Pub Date: 2016/16/02
  • Number: 09519924
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Method and procedure for dynamic services orchestration that runs within an on-device software container

A system for providing network services is provided. The system includes a device configured to interface with the network to receive a container, where the container is configured to interface with an operating system of the device and a plurality of applications operating on the device. The container is further configured to interface with a network services provider of one or more network services and one or more third party service providers.

  • Pub Date: 2016/16/02
  • Number: 09628572
  • Owner: RELIANCE JIO INFOCOMM USA, INC.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Lockdown apparatus for initiation of lockdown procedures at a facility during an emergency

Some embodiments are directed to a lockdown apparatus for facilitating initiation of lockdown procedures at a facility. The lockdown apparatus can include a manually operated actuator disposed at the facility and configured to transmit a lockdown initiation signal upon being manually actuated. The actuator can be configured to be recognizably distinguishable from a fire alarm actuator. The lockdown apparatus can also include a lockdown communicator configured to produce a lockdown communication for communicating initiation of lockdown procedures to the facility occupants and individuals not disposed proximate the facility upon transmission of the lockdown initiation signal, the lockdown communication being recognizably distinguishable from the fire alarm communication. The lockdown communicator can include an annunciator that communicates an audible annunciation to facility occupants upon transmission of the lockdown initiation signal, and that ceases to communicate the audible annunciation subsequent to a predetermined number of alarm cycles.

  • Pub Date: 2016/16/02
  • Number: 09454891
  • Owner: EMERGENCY ALERT SOLUTIONS GROUP, LLC
  • Location: Great Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Data environment change notification

A method of and system for monitoring and providing notification of changes to a data environment. Parameters of interest for monitoring changes made to a metadata data store are stored. Instructions are stored related to notifying a recipient of a communication about the changes. The metadata is monitored for changes related to the parameters of interest, and a change notification communication is generated with transmission initiated to the recipient. The instructions related to notification of the changes may include the identity of a recipient, mechanism for notification, and format and content of notification. A computer readable memory system and a computer program product may be provided that is encoded with a data structure for notifying data consumers of changes to a data environment that includes metadata.

  • Pub Date: 2016/16/02
  • Number: 09477700
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Communication with a virtual trusted runtime BIOS

A secure communication channel is established between a virtual trusted runtime basic input output system (BIOS) and a virtual machine that includes a virtual BIOS. The virtual trusted runtime BIOS communicates with the virtual machine according to a web-based protocol over the secure communication channel using a secure socket layer.

  • Pub Date: 2016/16/02
  • Number: 09535710
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent data integration system

Data objects stored in a data store include data attribute(s) and associated value(s) for the attributes. Data analysis tools (DATs) stored in a data store are associated with reference data attribute(s). The data objects are identified by one or more DATs based on each reference data attribute(s) of a corresponding DAT matching one of the data attribute(s) of the corresponding data object(s) and independent of the value for the data attribute(s). The DATs generate an additional data object as a function of the identified data object, and the additional data object is stored in the data store.

  • Pub Date: 2016/15/02
  • Number: 09646031
  • Owner: Monsanto Technology, LLC
  • Location: St. Louis, US
  • Details: Visit USPTO

Visit USPTO Page


Performing an action on a social networking system based on a content identifier embedded in provided content

A content source provides metadata associated with content, such as an audio signal or video data, to a social networking system. The metadata identifies characteristics of the content or specifies an action for the social networking system to perform. A content identifier associated with the metadata is generated by the social networking system, and an association between the content identifier and the metadata is stored. The content identifier is provided to the content source, which encodes the content identifier into the content (e.g., as a watermark). When a client device receives the content encoded with the content identifier, the content identifier is extracted and communicated to the social networking system in connection with a user account associated with the client device. Based on the content identifier, the social networking system retrieves the corresponding metadata and performs an action in connection with the user account based on the metadata.

  • Pub Date: 2016/12/02
  • Number: 09462027
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive connectivity in network-based collaboration background information

Various embodiments include at least one of systems, methods, software, and data structures for peer-to-peer exchange of at least a portion of networked collaboration session data. Client and server solutions allow for switching between peer-to-peer and server-centric modes of collaboration data sharing. Some embodiments also allow for sharing of data of a first type via a collaboration server and data of a second type via peer-to-peer connections.

  • Pub Date: 2016/12/02
  • Number: 09565249
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for metadata-driven dynamic content serving

Techniques for metadata-driven dynamic content serving. Metadata content is stored as a source instance. The metadata content is utilized to provide dynamically-constructed pages. The metadata content is published to runtime pods communicatively coupled to receive the metadata content. The source instance includes a metadata definition repository and is a primary source of dynamic data for serving pages in the runtime pods. The runtime pods are groups of multiple servers that act as a single entity to dynamically generate metadata-driven content in response to requests received from client devices. A request for content is received with a selected one of the runtime pods for a specific site. The specific site is mapped to a user identified by a user identifier. The user identifier is utilized to retrieve site metadata from a site metadata server. Content is provided in response to the request with the selected runtime pod utilizing the metadata content.

  • Pub Date: 2016/11/02
  • Number: 09525720
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Performance of secure mobile applications

A request for a first resource by a user is received. In response to receiving the request for a first resource, a second resource is determined based on the first resource and a resource usage pattern of the user. A response to the request for the first resource is provided. The response includes the first resource and the second resource.

  • Pub Date: 2016/11/02
  • Number: 09426241
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Identity verification and authentication

In one embodiment, receiving, at a first computing device associated with a social-networking system and from a second computing device, a first request to verify an identity of a user of the social-networking system; sending, by the first computing device and to a mobile device associated with the user, a second request for information about the user; receiving, at the first computing device and from the mobile device, the information about the user; determining, by the first computing device, a confidence score indicating a probability that the identity of the user is true based on the information about the user received from the mobile device and information available to the social-networking system; and sending, by the first computing device and to the second computing device, the confidence score.

  • Pub Date: 2016/11/02
  • Number: 09595057
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Determining electronic media format when transferring a customer between specialists or amongst communication sources at a customer service outlet

Systems, apparatus, and computer program products are provided for determining the media format for transferring a customer from customer between specialists and/or from one communication source to another communication source within a customer service outlet, such as a banking center or the like. For example, while a two-way video conference system may be used for communication between a customer and a remote specialist, in certain instances in which the customer requires transfer to another specialist (e.g., a specialist having a different specialty) other media formats, such as one-way live video conference, live audio-only conference, text chat or the like may be implemented.

  • Pub Date: 2016/11/02
  • Number: 09467652
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


AD hoc collaboration network for capturing audio/video data

Software authenticates a first user of a first mobile device and a second user of a second mobile device. Each user agrees or has previously agreed to share video data captured by the user with other authenticated users. The software determines whether the first mobile device is located proximate to the second mobile device. Then the software receives video data captured by the second mobile device and transmits the video data to the first mobile device for display along with an annotation, if the first mobile device is proximate to the second mobile device. The annotation indicates the location of the second mobile device relative to the first mobile device and includes data as to camera angle of the second mobile device received from the second mobile device. The software persistently stores the video data upon receipt of a command from the user of the first mobile device.

  • Pub Date: 2016/11/02
  • Number: 09602856
  • Owner: Yahoo! Inc
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


3D pointing devices and methods

Systems and methods according to the present invention address these needs and others by providing a handheld device, e.g., a 3D pointing device, which uses at least one sensor to detect motion of the handheld device. The detected motion can then be mapped into a desired output, e.g., cursor movement.

  • Pub Date: 2016/11/02
  • Number: 09575570
  • Owner: HILLCREST LABORATORIES, INC.
  • Location: Rockville, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for messaging, calling, digital multimedia capture, payment transactions, global digital ledger, and national currency world digital token

Provided are computer implemented methods and systems for using a global world universal digital mobile and wearable currency. The method commences with receiving a transfer request. The transfer request is associated with an amount represented in tokens of the global world universal digital mobile and wearable currency. The transfer request includes at least a sender account, a recipient account, and the amount. The method continues with transferring the amount from the sender account to the recipient account based on the transfer request.

  • Pub Date: 2016/10/02
  • Number: 09406063
  • Details: Visit USPTO

Visit USPTO Page


System and method of providing a buy option in a social media network

Disclosed herein are methods for providing a buy option to social networking communications. The method includes receiving a posting of text, an image or a video through Facebook, identifying data associated with the posting and determining whether the data identifies a product within a database of products for sale from the posting entity. When the determination indicates that there is no reference to the product in the product database, the method includes transmitting the posting through Facebook without a buy now button. When the determination indicates that the posting references the product, thus indicating a sale-related intent, the method includes transmitting the posting through Facebook with a buy option, receiving a purchase interaction associated with the buy option and processing a purchase of the product.

  • Pub Date: 2016/09/02
  • Number: 09430790
  • Owner: Monticello Enterprises LLC
  • Location: Huntingtown, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus of providing messaging service and callback feature to mobile stations

Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a hosted server that an action needs to be performed by a mobile device under management. The method may further include generating a message via the hosted server, the message includes the action, and transmitting the message to the mobile device under management, and receiving a result message from the mobile device under management responsive to the transmitted message, the result message indicating that the action has been satisfied.

  • Pub Date: 2016/09/02
  • Number: 09549057
  • Owner: KASEYA LIMITED
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer-readable storage device for providing a buy option in a social networking posting when user input is classified as having a sale intent

Disclosed herein are methods for providing a buy option to social networking communications. The method includes communicating with a social networking site that posts images from posting entities to receiving entities. The image can have data that points to a product database. The data is processed to determine whether there is a sale-related intent such as a product in a product database. The data is used to access a database of products for sale from the merchant. When the sale-related intent applies, the system transmits the image through the social networking site with a buy button associated with the transmission such that a recipient can easily purchase a product.

  • Pub Date: 2016/08/02
  • Number: 09436957
  • Owner: Monticello Enterprises LLC
  • Location: Huntingtown, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of providing a buy option response to a generalized search

Disclosed herein are methods for presenting a search response to a user query configured to include a buy option. In response to the user query on a generalized search engine, the method includes presenting a purchase-related search result that is configured such that when a user interacts with the purchase-related search result and confirms a purchase via interacting with the buy option, the generalized search entity initiates processing of the purchase of an item. The method includes receiving an interaction from the user associated with the purchase-related search result. The generalized search engine or entity can store and process payment information and communicate through an API with a merchant who handles delivery of the item.

  • Pub Date: 2016/08/02
  • Number: 09466081
  • Owner: Monticello Enterprises LLC
  • Location: Huntingtown, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing a buy option through postings on a social network when user input is classified as having a sale intent

Disclosed herein are methods for providing a buy option to social networking communications. The method includes communicating with a social networking site that posts images from posting entities to receiving entities. The image can have data that points to a product database. The data is processed to determine whether there is a sale-related intent such as a product in a product database. The data is used to access a database of products for sale from the merchant. When the sale-related intent applies, the system transmits the image through the social networking site with a buy button associated with the transmission such that a recipient can easily purchase a product.

  • Pub Date: 2016/08/02
  • Number: 09524519
  • Owner: Monticello Enterprises LLC
  • Location: Huntingtown, US
  • Details: Visit USPTO

Visit USPTO Page


Wearable electronic glasses that move a virtual object in response to movement of a field of view

A method detects a real object with a wearable electronic device and displays a virtual image of the real object with the real object on a display of the wearable electronic device. The wearable electronic device displays movement of the virtual image of the real object to show a task to be completed and detects a completion of the task. The wearable electronic device moves, in response to the virtual image of the real object no longer being within a field of view of the wearable electronic device, the virtual image of the real object to an opposite side of the real object such that the virtual image of the real object is within the field of view.

  • Pub Date: 2016/06/02
  • Number: 09569899
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for encryption and provision of information security using platform services

Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.

  • Pub Date: 2016/05/02
  • Number: 09614670
  • Owner: Ionic Security Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Managing interaction with hosted services

Systems and methods are disclosed which facilitate managing interaction with instances corresponding to hosted services. Customers may implement services on a hosted computing environment. Further, the customer may allow limited interaction with the hosted service to a third party (e.g., in connection with a secondary service). For example, the third party may interact with a temporary copy of the hosted service. Thereafter, the customer may, given the consent of the third party, view details of the third party's interaction with the copy, and may be enabled to merge any alterations with the initial hosted service. In addition, a customer may monitor their own interactions with a hosted service or copies of a hosted service, and view details of the differences between multiple versions of the hosted service.

  • Pub Date: 2016/05/02
  • Number: 09451034
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Devices, systems, and methods for learning and using artificially intelligent interactive memories

Aspects of the disclosure generally relate to computing devices and may be generally directed to devices, systems, methods, and/or applications for learning conversations among two or more conversation participants, storing this knowledge in a knowledgebase (i.e. neural network, graph, sequences, etc.), and enabling a user to simulate a conversation with an artificially intelligent conversation participant.

  • Pub Date: 2016/05/02
  • Number: 09582762
  • Details: Visit USPTO

Visit USPTO Page


Detecting deployment conflicts in heterogeneous environments

Techniques are disclosed for managing deployment conflicts between applications executing in one or more processing environments. A first application is executed in a first processing environment and responsive to a request to execute the first application. During execution of the first application, a determination is made to redeploy the first application for execution partially in time on a second processing environment providing a higher capability than the first processing environment in terms of at least a first resource type. A deployment conflict is detected between the first application and at least a second application.

  • Pub Date: 2016/05/02
  • Number: 09606785
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Data access and anonymity management

Techniques described herein provide data access and data anonymity management within various implementations of content distribution networks. In some embodiments, a data anonymity management system may include multiple different data stores configured to store identity data, user data, and/or linking data, as well as a data anonymity server configured to support data anonymity features such as active user data anonymity, one-way linking and permanently breakable links between user identity data and associated user data. In some embodiments, storage systems and techniques may be used for storing identity data, user data, and link data in multiple different data stores, with different data storage requirements and different processes and policies for data availability, data backup, online disaster recovery, offline storage archiving, and the like. Additionally, cryptographic hash functions may be used to implement one-way encryption between identity data and user data.

  • Pub Date: 2016/05/02
  • Number: 09590989
  • Owner: PEARSON EDUCATION, INC.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Modular system including management and deployment of software updates and revisions

A technology/operating system-agnostic and protocol-agnostic modular-based service delivery system that includes a management of enterprise-wide deployment of services and updates to services delivered by the modules of the system. Management includes determination and automatic implementation of an optimal schedule for service deployment, service version updates and service version roll-backs based on (i) predetermined lifecycle levels assigned to networked devices in the enterprise executing the service delivery application, and/or (ii) segments within the enterprise.

  • Pub Date: 2016/04/02
  • Number: 09519474
  • Owner: BANK OF AMERICA CORPORATION
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Lockdown apparatus for initiation of lockdown procedures at a facility during an emergency

Some embodiments are directed to a lockdown apparatus for facilitating initiation of lockdown procedures at a facility. The lockdown apparatus can include a manually operated actuator disposed at the facility and configured to transmit a lockdown initiation signal upon being manually actuated. The actuator can be configured to be recognizably distinguishable from a fire alarm actuator. The lockdown apparatus can also include a lockdown communicator configured to produce a lockdown communication for communicating initiation of lockdown procedures to the facility occupants and individuals not disposed proximate the facility upon transmission of the lockdown initiation signal, the lockdown communication being recognizably distinguishable from the fire alarm communication. The lockdown communicator can include an annunciator that communicates an audible annunciation to facility occupants upon transmission of the lockdown initiation signal, and that ceases to communicate the audible annunciation subsequent to a predetermined number of alarm cycles.

  • Pub Date: 2016/04/02
  • Number: 09454890
  • Owner: EMERGENCY ALERT SOLUTIONS GROUP, LLC
  • Location: Great Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions for treating biofilms and methods for using same

Compositions containing a surface active agent and a sub-lethal amount of an antimicrobial agent and methods for using such compositions are provided herein.

  • Pub Date: 2016/04/02
  • Number: 09603966
  • Owner: PluroGen Therapeutics, Inc.
  • Location: Norristown, US
  • Details: Visit USPTO

Visit USPTO Page


Support for asynchronous adaptation to uplink and downlink traffic demands for wireless communication

Technology is discussed to allow transmission points within a Wireless Wide Area Network (WWAN) to adapt to Up Link (UL) and Down Link (DL) traffic demands independently. To mitigate potential interference arising from transmission points scheduled for conflicting UL and DL transmissions, measurements between transmission points can be made to indicate a level of coupling. Based on the various levels of coupling between transmission points, clusters can be formed. Where a high level of coupling is present, transmission points can be included in a common cluster. Where a low level of coupling is present, they can be isolated. Transmission points within the same cluster are scheduled with a common pattern of UL and DL transmissions to avoid interference. Transmission points in different clusters can have different patterns of UL and DL transmission to independently adapt to the relative demands for UL and DL transmissions experienced within these different clusters.

  • Pub Date: 2016/03/02
  • Number: 09615378
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Machine learning classifier that can determine classifications of high-risk items

A machine learning classifier system includes a data set processing subsystem to generate a training set and a validation set from multiple data sources. Classifier hardware induces a classifier according to the training set, and tests the classifier according to the validation set. A buffer connected to the classifier hardware stores data objects to be classified, and a register connected to the classifier hardware stores outputs of the classifier, including classified data objects.

  • Pub Date: 2016/03/02
  • Number: 09600779
  • Owner: ACCENTURE GLOBAL SOLUTIONS LIMITED
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Independent targeted sponsored content management system and method

A system may include a database configured with individual partitions, one of the partitions corresponding to a sponsored content campaign of a social network. The system may further include multiple servers each communicatively coupled to the database, and each configured to implement a campaign having a campaign termination criterion. Each of the servers may include a processor configured to track sponsored content event data received from a user device based on the campaign and transmit the event data to the database and terminate the campaign based on a comparison of the event data as received from a partition of the database corresponding to the campaign and an estimation of event data not received from the database. The database may be configured to store the event data as received from the servers in the partition corresponding to the campaign upon receipt of the event data.

  • Pub Date: 2016/03/02
  • Number: 09530147
  • Owner: LinkedIn Corporation
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic network device processing using external components

A network device may receive information regarding a service set identifying service to apply to a data flow received via a particular interface of the network device; receive the data flow via the particular interface; identify a service to provide to the data flow based on the information regarding the service set; identify a processing device to process the data flow; and provide the data flow to the processing device. The processing device may be different than the network device and may process the data flow, on behalf of the network device, to form a processed data flow. The processed data flow may include the data flow with the service applied to the data flow. The network device may further receive the processed data flow from the processing device and transmit the processed data flow toward a destination device.

  • Pub Date: 2016/03/02
  • Number: 09596318
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Assigning communication paths among computing devices utilizing a multi-path communication protocol

A method for routing communication paths among computing devices. The method includes a one or more computer processors identifying a computing entity and a data storage entity that transfer data. The method further includes determining a plurality of communication ports that the data storage entity utilizes to transfer data to the computing entity. The method further includes identifying a plurality of computing resources respectively associated with the determined plurality of communication ports that the data storage entity utilizes to transfer the data to the computing entity. The method further includes generating a list of tuples for the data storage entity based, at least in part, on the identified plurality of computing resources and the determined plurality of communication ports.

  • Pub Date: 2016/03/02
  • Number: 09461867
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-application workflow integration

Techniques are described for managing interactions between workflows being performed by different applications, such as to enable a combination of multiple workflows in multiple applications of different types to aggregate varying capabilities available from the different types of applications. In some situations, an integrated workflow is created by separating portions of its functionality into multiple constituent workflows that is each performed by a different application and that initiate one or more inter-workflow interactions between the constituent workflows as they are performed (e.g., for one of the constituent workflows to, while it is being performed, invoke another constituent workflow in order to begin its performance). As one non-limiting example, the multiple applications of different types may include a least an enterprise business application program that provides various core business functions, and a desktop collaborative application program that provides various user activity management capabilities.

  • Pub Date: 2016/02/02
  • Number: 09594609
  • Details: Visit USPTO

Visit USPTO Page


Local user authentication with neuro and neuro-mechanical fingerprints

In accordance with one embodiment, a method for locally verifying the identification of a user with an electronic device is disclosed. The method includes regenerating a neuro-mechanical fingerprint (NFP) in response to a micro-motion signal sensed at a body part. In response to a plurality of authorized user calibration parameters, a match percentage of the neuro-mechanical fingerprint is determined. The match percentage is determined without the use of a calibration NFP that was previously used to generate the user calibration parameters. Access to the electronic device and its software applications is then controlled by the match percentage. If the match percentage is greater than or equal to an access match level, access to the electronic device is granted. If the match percentage is less than the access match level, access is denied. Subsequent access requires further regeneration of the NFP and a determination of its match percentage in response.

  • Pub Date: 2016/02/02
  • Number: 09590986
  • Owner: Proprius Technolgies S.A.R.L
  • Location: Luxembourg, LU
  • Details: Visit USPTO

Visit USPTO Page


Image forming apparatus with transfer output device outputting superimposed bias as transfer bias

An image forming apparatus includes a transfer bias output device and an information receiving device. The transfer bias output device outputs a transfer bias including a superimposed bias composed of an AC bias superimposed on a DC bias to form a transfer electric field in a transfer nip between an image bearing member bearing a toner image and a nip forming member, to transfer the toner image onto a recording medium in the transfer nip. A controller operatively connected to the information receiving device and the transfer bias output device causes the transfer bias output device to change a target output of a peak-to-peak voltage of the AC bias based on information received by the information receiving device that affects transfer of the toner image and to reduce a target output of the DC bias as the target output value of the peak-to-peak voltage of the AC bias increases.

  • Pub Date: 2016/02/02
  • Number: 09535375
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Enhanced error detection with behavior profiles

Methods, systems, and computer-readable media for detecting errors within a system by using behavior profiles are presented. At a first time, user requests may be received and serviced. The serviced user requests may be logged. Based on the logged user requests, profiles may be determined. At a second time, user requests may be received and serviced. The serviced user requests may be logged. The logged serviced user requests may be compared to the profiles determined at a first time. For example, the determined profiles may include an error rate for serviced user requests. At the second time, an error rate for the logged serviced user requests may be compared to an error rate included the determined profiles. Serviced users requests may be flagged based on the comparison.

  • Pub Date: 2016/02/02
  • Number: 09396058
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Data encryption/decryption using neuro and neuro-mechanical fingerprints

In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to generate a multi-dimensional signal; in response to the multi-dimensional signal and user calibration parameters, generating a neuro-mechanical fingerprint; and encrypting data with an encryption algorithm using the neuro-mechanical fingerprint as a key.

  • Pub Date: 2016/02/02
  • Number: 09577992
  • Owner: Aerendir Mobile Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Archiving data objects using secondary copies

A system for archiving data objects using secondary copies is disclosed. The system creates one or more secondary copies of primary copy data that contains multiple data objects. The system maintains a first data structure that tracks the data objects for which the system has created secondary copies and the locations of the secondary copies. To archive data objects in the primary copy data, the system identifies data objects to be archived, verifies that previously-created secondary copies of the identified data objects exist, and replaces the identified data objects with stubs. The system maintains a second data structure that both tracks the stubs and refers to the first data structure, thereby creating an association between the stubs and the locations of the secondary copies.

  • Pub Date: 2016/02/02
  • Number: 09639563
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for generating location-based group recommendations

Methods and systems for generating location-aware group recommendations are discussed. For example, a method can include operations for receiving a group recommendation request, accessing user profile data associated with members of the group, and generating a group recommendation. The group recommendation request can be received at a network-based system and include identification of a first and second user as well as information identifying a current location associated with the first and second users. Accessing the user profile information can include accessing user profile information for both the first and second users. The group recommendation can be generated based on the current location data and a combination of at least a portion of the user profile data from the first and second users.

  • Pub Date: 2016/01/02
  • Number: 09552605
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for authenticating an avatar

Systems and methods for authenticating an avatar are provided. This system is useful with an avatar having an identifier, virtual environments, and a user who uses the avatar in the virtual environments. Transoms are generated, each with a unique identifier configured to exist in a specific location, and registered with an identity provider. The transom initiates a request. An offer is conveyed that includes the transom identifier, the location and the avatar identifier. The avatar is then authenticated by a shared secret. The identity provider then responds to the offer with avatar identification information, including reputation information. Reputation information is for the avatar and the user, and is compiled from external avatar data sources by using a trust matrix. An avatar gallery is generated by linking each avatar owned by each user to the account and compiling avatar profiles from the account, and the reputation information. The avatar profiles are searchable, and include micro formats.

  • Pub Date: 2016/01/02
  • Number: 09635008
  • Details: Visit USPTO

Visit USPTO Page


System and method bridging cloud based user interfaces

Systems and apparatus providing UI functionality at a client device via a video decoder/renderer operates to decode a compressed video stream bearing UI imagery and a messaging proxy is adapted to process user interaction data indicative of a local function to invoke an application programming interface (API) associated with the local function in order to select an appropriate channel of the decoded compressed video stream.

  • Pub Date: 2016/01/02
  • Number: 09456240
  • Owner: CHARTER COMMUNICATIONS OPERATING, LLC
  • Location: St. Louis, US
  • Details: Visit USPTO

Visit USPTO Page


Secure native application messaging with a browser application

A system for securely mediating messages between a native application and a browser application on a computing device includes running the browser application and a browser process that controls access by the browser-based application to the native resource. The browser process may use a data file distributed with the native application to allow or deny communications between the browser-based application and the native application. When communications are allowed the browser-based application accesses the native resource via the native application. In one implementation, the browser process may initiate a native messaging host and send communication requests to the native messaging host. The data file may be downloaded with the native application or separately from the native application from a site that distributes the native application or a site controlled by the developer of the native application. The data file identifies browser-based applications allowed to communicate with the native application.

  • Pub Date: 2016/01/02
  • Number: 09560122
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method to delay locking of server files on edit

A server is implemented with a modified file open action, which, when a user performs the modified open, initially opens a file without locking the file. When a user indicates (either explicitly or implicitly) that the user is attempting to or intending to open the file, the file can then be locked for editing. In this way, the default action when a user requests a file is to open the file without denying other users access to the file. Then, when the user indicates that editing should occur, the lock for the file is obtained.

  • Pub Date: 2016/01/02
  • Number: 09594925
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Mapping key performance indicators derived from machine data to dashboard templates

Raw machine data are captured and organized as events. Entity definitions representing machine entities that perform a service identify the machine data associated with respective entities. KPI search queries each define a KPI. Each KPI search query derives one or more values for the KPI from machine data identified in the entity definitions. A dashboard template having an identifier for the KPI is presented by a graphical interface. The identifier presents at a user-designated location and may be a widget that provides a numerical or graphical representation of one or more values for the KPI. Embodiments may allow modification of the template.

  • Pub Date: 2016/01/02
  • Number: 09596146
  • Owner: Splunk Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Machine data-derived key performance indicators with per-entity states

Raw machine data are captured and may be organized as events. Entity definitions representing machine entities that perform a service identify the machine data pertaining to respective entities. KPI search queries each define a KPI. Each KPI search query derives one or more values for the KPI from machine data identified in the entity definitions. The derivation may be performed on a per-entity basis and on the aggregate. The derived values may then be translated into a state value domain using per-entity thresholds, aggregate thresholds, or a combination.

  • Pub Date: 2016/01/02
  • Number: 09521047
  • Owner: Splunk Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Hypervisor assisted virtual memory obfuscation

Remote computing resource service providers allow customers to execute one or more applications in a virtual environment on computer systems provided by the computing resource service provider. The virtual machines may be managed by a hypervisor executing on computer systems operated by the service provider. The virtual machines' memory may be protected by a memory obfuscation service and the hypervisor. The memory obfuscation service may enable the virtual machines to maintain at least a portion of sensitive information in an obfuscated format. The virtual machines may request access to the virtual machines' memory, the memory obfuscation service may obtain the requested memory in an obfuscated format and un-obfuscate the memory such that it may be used by the virtual machines.

  • Pub Date: 2016/01/02
  • Number: 09558081
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Backup of volatile memory to persistent storage

Approaches for automatically backing up data from volatile memory to persistent storage in the event of a power outage, blackout or other such failure are described. The approaches can be implemented on a computing device that includes a motherboard, central processing unit (CPU) a main power source, volatile memory (e.g., random access memory (RAM)), an alternate power source and circuitry (e.g., a specialized application-specific integrated circuit (ASIC)) for performing the backup of volatile memory to a persistent storage device. In the event of a power failure of the main power source, the alternate power source is configured to supply power to the specialized ASIC for backing up the data in the volatile memory. For example, when power failure is detected, the ASIC can read the data from the DIMM socket using power supplied from the alternate power source and write that data to a persistent storage device.

  • Pub Date: 2016/01/02
  • Number: 09459805
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Using source taint analysis to reduce false positives in an advanced persistent threat (APT) protection solution

In response to a local Advanced Persistent Threat (APT) agent identifying a potential data exfiltration attack, the binary identified in the attack is sent to a static analysis tool for further analysis. The agent also identifies a source and a sink involved in the potential data exfiltration. The static analysis tool decompiles the binary, and then runs the de-compiled code through a static analysis to identify data flows between the source and the sink, e.g., a data flow from the source that is the method used to read sensitive information, and a data flow to the sink that is the method used to write to the remote system. If there are such data flows, the activity reported by the agent is likely a true exfiltration attack. Based on this flow determination, the static analysis tool returns a response to the agent validating that the activity is an attack.

  • Pub Date: 2016/29/01
  • Number: 09530016
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for indexing, relating and managing information about entities

Systems and methods for use in association with a master entity index system may allow data records to be grouped together into various entities, where each of the entities may represent a logical or physical item. These entities may also be associated with one another in a manner such that relationships between entities may likewise be represented. In one embodiment, an interface may be provided for use in conjunction with the master entity index system such that these various entities and relationships may be better managed, manipulated or visualized. This interface may allow a user to search for or otherwise obtain an entity, where a representation of this entity and one or more associated entities may be presented to the user along with representations of the relationships between these entities.

  • Pub Date: 2016/29/01
  • Number: 09600563
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Automated GUI testing

The invention relates to a computer system that may include a processor, an accessibility API, a GUI, and a test module. The test module may use the accessibility API for analyzing GUI elements of the GUI and for automatically identifying GUI element features and inter-GUI-element dependencies. The test module may use the GUI element features and inter-GUI-element dependencies to generate a graph. The test module may traverse the graph and analyzes the GUI element features assigned to each currently accessed node or said node's child or sibling node. Thereby, the test module may identify predefined GUI element patterns in the graph and in the GUI. In case a matching GUI element pattern was identified, the test module may automatically identify one or more test routines associated with the identified GUI element pattern and automatically perform the one or more identified test routines on the GUI.

  • Pub Date: 2016/29/01
  • Number: 09600401
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Unified communication audit tool

Providing for dynamic auditing of components of a communication network is provided herein. By way of example, network components can be queried by way of dynamic and intelligent application programming interface (APIs) queries to extract data for the network components. Such data can then be compared with best practice rules to identify potential enhancements to efficiency or scalability of such components. In some aspects, an audit report can be output summarizing identified enhancements. In other aspects, data can be written to an updated component according to protocols suited to such component. Accordingly, an audit can provide feedback in light of best practices or can be utilized to dynamically upgrade a legacy system to newer system software and/or hardware components.

  • Pub Date: 2016/28/01
  • Number: 09569539
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Software application and zones

Embodiments described herein relate to a software application that is configured to operate as an add-on software component to audio-playback software on a playback device of a media playback system. One embodiment may involve transmitting, to a computing device, data indicating that a first add-on component installed on a playback device is active; receiving, from the computing device, a command to activate a second add-on component installed on a playback device; in response to receiving the command, activating the second add-on component on the playback device; and causing playback of audio using at least the second add-on component.

  • Pub Date: 2016/28/01
  • Number: 09513868
  • Owner: Sonos, Inc.
  • Location: Santa Barbara, US
  • Details: Visit USPTO

Visit USPTO Page


N-node systems and methods for link aggregation groups (LAG)

Aspects of the present invention include an n-node link aggregation group (LAG) system comprising a set of N nodes collectively provide a logical fabric-level view that is consistent across the set of N nodes. Embodiments of the n-node system comprise a control plane mechanism to provide Layer 2 multipathing between access network devices and the core network. The n-node system provides a loop-free topology with active-active load-sharing of uplinks from access to the core.

  • Pub Date: 2016/28/01
  • Number: 09614727
  • Owner: DELL PRODUCTS L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Ear jack recognition method and electronic device supporting the same

An electronic device is provided. The electronic device connects to an earphone. The electronic device includes a connector into which an ear jack of the earphone is inserted, an audio controller configured to process an acoustic signal, a processor configured to control the audio controller, and a memory configured to functionally connect with the processor. The audio controller outputs a first acoustic signal through an ear speaker of the earphone, if an insertion interruption occurs according to insertion of the ear jack. The processor determines a type of the ear jack according to a second acoustic signal collected through an ear microphone included in the earphone.

  • Pub Date: 2016/28/01
  • Number: 09602910
  • Owner: SAMSUNG ELECTRONICS CO., LTD
  • Location: Suwon-si, Gyeonggi-Do, KR
  • Details: Visit USPTO

Visit USPTO Page


Bulk uploading of multiple self-referencing objects

A computer implemented method, computer program product, and system for performing create, read, update, or delete operations on a plurality of resources in a client-server environment. In an embodiment, the computer implemented method includes the steps of identifying individual resources requiring operations to be performed, assigning local references for any resources to which a URI (Uniform Resource Identifier) has not been provided by the server, generating metadata describing the local references and operations to be performed, wrapping each individual resource with the metadata to provide a plurality of wrapped resources arranging the wrapped resources into a single payload, and transmitting the single payload to the server.

  • Pub Date: 2016/28/01
  • Number: 09444761
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods and computer program products for neurolinguistic text analysis

Computer-implemented methods can transform a corpus of meaningful text sequences into a generalized computer-usable repository of neurolinguistic information that can be applied by one or more computer systems. The computer system(s) can use the neurolinguistic information to neurolinguistically analyze meaningful text sequences to derive statistical information and identify dominant cognitive motivation orientations expressed in those text sequences. The identified dominant cognitive motivation orientations can be used to improve the efficacy of both human-generated and machine-generated communications. The computer system(s) thereby transform a meaningful text sequence into actionable information about the dominant cognitive motivation orientation(s) of the author of that text sequence within the context in which the text sequence was composed. Computer systems and computer-program products for implementing the methods are also described.

  • Pub Date: 2016/27/01
  • Number: 09507769
  • Owner: Weongozi Inc.
  • Location: , CA
  • Details: Visit USPTO

Visit USPTO Page


System library error classification in a cloud based dynamic analysis tool

Techniques are disclosed for classifying system library errors detected by a dynamic analysis tool executing in a first client of a plurality of clients. The dynamic analysis tool monitors an execution of an application. The dynamic analysis tool identifies one or more errors that are related to at least one of a plurality of system libraries called by the application during the execution. For each identified error, the dynamic analysis tool evaluates the error relative to error data observed in a dynamic analysis tool executing in the other clients, and flagging the error as an error that is not caused by a user based on the evaluation.

  • Pub Date: 2016/26/01
  • Number: 09417986
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Predicting API storytelling mapping

A first indication from a user is received. The indication includes a task to be performed using at least one application programming interface. A machine learning model is determine. At least one application programming interface is determined using the machine learning model and the request. The at least one application programming interface is provided to the user.

  • Pub Date: 2016/26/01
  • Number: 09626627
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Notification of communication events

A network element of a communication provider comprises transceiver apparatus arranged to receive a request message from an originating endpoint via a packet-based communication network; and processing apparatus configured to generate, in response to the request message from the originating endpoint, a push notification relating to a communication from the originating endpoint intended for a destination endpoint, the communication to be conducted over the packet-based network. The transceiver apparatus is arranged to send the push notification to the destination endpoint over the packet-based network. The processing apparatus is further configured to generate the push notification with a payload comprising an indication of an image representing an originating user, to be output by the destination endpoint in a user notification notifying a destination user regarding the communication. At least the indication of the image is determined and inserted into the payload of the push notification at the network element.

  • Pub Date: 2016/26/01
  • Number: 09654519
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Normalization of time stamps for event data

Methods and apparatus consistent with the invention provide the ability to organize, index, search, and present time series data based on searches. Time series data are sequences of time stamped records occurring in one or more usually continuous streams, representing some type of activity. In one embodiment, time series data is organized into discrete events with normalized time stamps and the events are indexed by time and keyword. A search is received and relevant event information is retrieved based in whole or in part on the time indexing mechanism, keyword indexing mechanism, or statistical indices calculated at the time of the search.

  • Pub Date: 2016/26/01
  • Number: 09514175
  • Owner: Splunk Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Network coverage hole detection

A technology for a user equipment (UE) that is operable to connect to a third generation partnership project (3GPP) long term evolution (LTE) cell in a cellular network. Logged minimization of drive test (MDT) measurements can be recorded at the UE at a selected rate when the UE is in a radio resource control (RRC) idle mode in a first LTE cell in a cellular network. A change in a UE state of the RRC idle mode can be identified. The Logged MDT measurements can stop being recorded at the UE when the UE state changes from a camped normally UE state to another UE state of the RRC idle mode. The Logged MDT measurements can resume being recorded when the UE state changes to the camped normally UE state of the RRC idle mode.

  • Pub Date: 2016/26/01
  • Number: 09549421
  • Owner: INTEL IP CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Negative allosteric modulators of metabotropic glutamate receptor 2

Described are negative allosteric modulators of metabotropic glutamate receptor 2 (mGlu), pharmaceutical compositions including the compounds, and methods of using the compounds and compositions for treating depression, anxiety, obsessive-compulsive disorder, cognitive disorders, Alzheimer's disease, or autism spectrum disorders in a subject.

  • Pub Date: 2016/26/01
  • Number: 09382208
  • Owner: Vanderbilt University
  • Location: Nashville, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for displaying notifications received from multiple applications

Systems and methods are disclosed for displaying notifications received from multiple applications. In some embodiments, an electronic device can monitor notifications that are received from the multiple applications. Responsive to receiving the notifications, the electronic device can control the manner in which the notifications are displayed while the device is operating in a locked or an unlocked state. In some embodiments, the electronic device can allow users to customize how notifications are to be displayed while the device is in the locked and/or unlocked states.

  • Pub Date: 2016/25/01
  • Number: 09507608
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and apparatus for powering intelligent lighting networks

The present invention relates to a system, method, and apparatus for powering intelligent lighting networks. The power for the intelligent lighting network is supplied by Power-over-Ethernet (PoE) switches and/or Mid-Spans, which are conditioned by a powered device to distribute power tuned specifically for each, at least one light emitting diode (LED) fixture. The Power-over-Ethernet switch and/or Mid-Span with associated router and wireless access point can be used to communicate with, and power a sensor network that collects data relevant to the intelligent lighting network. Optionally, the Power-over-Ethernet switch and/or Mid-Span can be used to communicate with, and power a network of sensors that collects data relevant to the space the intelligent lighting network is operating in, or can be used to communicate with and power a network of AC wall plugs that can be turned on and off, and various switches, relays, and PLCs, RFID systems, USB hubs, etc.

  • Pub Date: 2016/25/01
  • Number: 09544976
  • Owner: IDS-IP HOLDINGS LLC
  • Location: San Juan, US
  • Details: Visit USPTO

Visit USPTO Page


Remotely interacting with a virtualized machine instance

A system and method for remotely interacting with a virtualized machine instance (VMI) through a trigger mechanism resident at the VMI. When the VMI receives a request via the trigger mechanism, the VMI responds to the request, such as by obtaining a program and executing the program locally at the VMI.

  • Pub Date: 2016/25/01
  • Number: 09652279
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Idempotentcy of application state data

Disclosed are various embodiments for synchronizing application state information across devices. More specifically, embodiments of the disclosure are related to facilitating idempotency of application state information. Idempotency is maintained by using a timestamp embedded within application state information and/or by determining that the application state information is associated with an accumulating value.

  • Pub Date: 2016/25/01
  • Number: 09589042
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Data recovery operations, such as recovery from modified network data management protocol data

The systems and methods herein permit storage systems to correctly perform data recovery, such as direct access recovery, of Network Data Management Protocol (“NDMP”) backup data that was modified prior to being stored in secondary storage media, such as tape. For example, as described in greater detail herein, the systems and methods may permit NDMP backup data to be encrypted, compressed, deduplicated, and/or otherwise modified prior to storage. The systems and methods herein also permit a user to perform a precautionary snapshot of the current state of data (e.g., primary data) prior to reverting data to a previous state using point-in-time data.

  • Pub Date: 2016/25/01
  • Number: 09557929
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Unmanned aerial vehicle authorization and geofence envelope determination

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for unmanned aerial vehicle authorization and geofence envelope determination. One of the methods includes determining, by an electronic system in an Unmanned Aerial Vehicle (UAV), an estimated fuel remaining in the UAV. An estimated fuel consumption of the UAV is determined. Estimated information associated with wind affecting the UAV is determined using information obtained from sensors included in the UAV. Estimated flights times remaining for a current path, and one or more alternative flight paths, are determined using the determined estimated fuel remaining, determined estimated fuel consumption, determined information associated wind, and information describing each flight path. In response to the electronic system determining that the estimated fuel remaining, after completion of the current flight path, would be below a first threshold, an alternative flight path is selected.

  • Pub Date: 2016/22/01
  • Number: 09406237
  • Owner: UNMANNED INNOVATION, INC.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile media communications system

A media communications system enabling mobile and desktop devices to communicate with websites relevant to a query that is shallow parsed, associated to predetermined categories, and regenerated as a conflated query array that includes extracted entities, associated categories, a location, and a geo-limit parameter. The media communications system further enables real-time messaging between the mobile and desktop devices and the websites, as well as generation of well-formed websites, media, and multimedia, with pre-rendered embedded content, and enables to concurrently and automatically demographically and geographically distributed push notifications to the websites and devices, and embeds relevancy-amplified, geotargeted media and multimedia communications, which media are selected by real-time machine-learned, high-probability consumer interest weighting and relevancy functions that are continuously updated in response to monitored consumer actions. The system further enables geographically regional and inter-regional systems management to enable automated replication and regional and demographic testing of the geotargeted and relevant communications.

  • Pub Date: 2016/22/01
  • Number: 09420422
  • Owner: Deep Rock Ventures, Inc.
  • Location: Thousdand Oaks, US
  • Details: Visit USPTO

Visit USPTO Page


Bi-directional morphing of two-dimensional screen-space projections

Described herein are technologies that facilitate computationally low-intensity creation of additional frames in a sequence of frames created by real-time three-dimensional (3D) rendering. More particularly, the technologies described herein generate an interposed two-dimensional (2D) screen-space projection (e.g., the resulting rendered image) in between a pair of fully rendered surrounding frames in a sequence of rendered frames. The interposed 2D screen-space projection is generated based upon information derived from the pair of surrounding frames.

  • Pub Date: 2016/22/01
  • Number: 09589316
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods and devices for asset status determination

A system for managing data related to at least one leaf node device, the system including a location processing engine located on a server that is remote from the at least one leaf node device; at least one point of interest (POI) device for collecting data relating to at least one leaf node device and transmitting the collected data with a timestamp using Bluetooth Low Energy (BLE); at least one reader node device for receiving the collected data from the point of interest (POI) device using BLE and transmitting the collected data to the location processing engine; and a database of the known locations of POI devices, wherein the known locations are used as a basis for determining the location of the at least one leaf node device that communicated with the POI device.

  • Pub Date: 2016/21/01
  • Number: 09641964
  • Owner: CloudLeaf, Inc.
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for determining translation accuracy in multi-user multi-lingual communications

Various embodiments described herein facilitate multi-lingual communications. The systems and methods of some embodiments enable multi-lingual communications through different modes of communication including, for example, Internet-based chat, e-mail, text-based mobile phone communications, postings to online forums, postings to online social media services, and the like. Certain embodiments implement communication systems and methods that translate text between two or more languages. Users of the systems and methods may be incentivized to submit corrections for inaccurate or erroneous translations, and may receive a reward for these submissions. Systems and methods for accessing the accuracy of translations using word based and language based features are described.

  • Pub Date: 2016/21/01
  • Number: 09336206
  • Owner: Machine Zone, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Question-answering system

A computer program product and method provides a question and answer service that accepts an initial first question from a user and analyzes the question by a first generation subsystem to generate a first answer. A second generation subsystem of the question and answer service is configured to generate a second question based at least in-part on keywords from the first question and the first answer.

  • Pub Date: 2016/21/01
  • Number: 09471668
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Platform for continuous graph update and computation

A continuous stream data (e.g., messages, tweets) is received by ingest nodes of a platform. The ingest nodes may analyze the data to create a transaction of graph updates, assign a sequence number to the transaction, and distribute the graph updates with the sequence number to graph nodes of the platform. The graph nodes may store graph updates from ingest nodes, and then the ingest nodes may report graph update progresses in a progress table. A snapshot may be taken based on the progress table, and then graph-mining computation may be implemented. Tolerate failures and decaying may be supported and incremental expansion may be allowed to cope with increasing update rates and computation needs.

  • Pub Date: 2016/21/01
  • Number: 09589069
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Tracking user interactions with a mobile UI to facilitate UI optimizations

The disclosed embodiments relate to an apparatus or system for tracking and analyzing user interactions with a mobile user interface (UI). During operation, the apparatus collects data while a user interacts with the mobile UI through a touchscreen, wherein the data includes tap-attempt data that specifies coordinates for touchscreen locations that the user has tapped while interacting with the mobile UI. Next, the apparatus compares the tap-attempt data with locations of tappable elements in the mobile UI, wherein each tappable element has an associated tap target size. For each tappable element, the apparatus uses results of the comparison to determine a percentage of tap attempts that have succeeded or failed for the associated tap target size. Finally, the apparatus makes the percentage information available to a UI designer to enable the UI designer to adjust tap target sizes for the mobile UI.

  • Pub Date: 2016/19/01
  • Number: 09448710
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for database archiving

A data storage system according to certain aspects can archive database data associated with different database applications. The data storage system according to certain aspects may provide database archiving modules that include logic incorporating and/or based on the native schema and/or native commands specific to particular database applications. The database archiving modules according to certain aspects may determine the relationship between tables associated with corresponding database applications and archive selected database data based on the native schema and native commands.

  • Pub Date: 2016/19/01
  • Number: 09659076
  • Owner: COMMVAULT SYSTEMS, INC.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Sending session tokens through passive clients

A session token can be requested to be sent to a first computing service from a second computing service, and a first computing service can receive the requested session token from the second computing service. The first computing service can send a message that includes the session token through a passive client to the second computing service. The second computing service can receive the message that includes the session token from the passive client, and the second computing service can verify that the message is valid. This verification of the validity of the message can include verifying that the session token received back from the passive client matches the session token the second computing service sent to the first computing service.

  • Pub Date: 2016/19/01
  • Number: 09525679
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Secure execution environment services

Techniques for managing secure execution environments provided as a service to computing resource service provider customers are described herein. A request to launch a secure execution environment is received from a customer and fulfilled by launching a secure execution environment on a selected computer system. The secure execution environment is then validated and upon a successful validation, one or more applications are provided to the secure execution environment to be executed within the secure execution environment. As additional requests relating to managing the secure execution environment are received, operations are performed based on the requests.

  • Pub Date: 2016/19/01
  • Number: 09521140
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Management of application state data

Disclosed are various embodiments for synchronizing application state information across devices. More specifically, embodiments of the disclosure are related to generating and storing of application state information. Key-value pairs are stored on a client device and synchronized with an application synchronization service.

  • Pub Date: 2016/19/01
  • Number: 09411872
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Location-based discovery of network members by personal attributes using dynamic and static location data

A technique for allowing members of the same social network using mobile devices to discover others in the vicinity by personal attributes and in specific picture(s) and name for the purpose of connecting, and the ability to use functions provided by a social network such as SMS, e-mail, chat/instant messaging, multimedia, or video by using unique hardware identification of each member mobile device and personal login information that are stored in a network server computing device; and associating the unique apparatus of the members' hardware with the members' personal profile such that when a search is initiated between members, the results contain the members' profile's picture(s), name, location and additional information as stored in the profiles. The proximity of the users is determined by static or dynamic location of the actual device location identified through mobile radio frequency location technology and internet IP information and saved in the user profile.

  • Pub Date: 2016/19/01
  • Number: 09357352
  • Owner: WIRELESS DISCOVERY LLC
  • Location: Los Gatos, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying website activities as being those of a telephone caller

Disclosed are systems and methods of identifying website activities of a webpage visitor as being those of a caller placing a telephone call to a published tracking telephone number presented as a substitute for a contact telephone number. The published tracking telephone number is presented as the substitute so that when a webpage visitor observes the published tracking telephone number and acts as the caller, the telephone call is non-disruptively forwarded to the contact telephone number for purpose of identifying the website activities as being those of the caller.

  • Pub Date: 2016/19/01
  • Number: 09641674
  • Owner: Adpearance, Inc.
  • Location: Portland, US
  • Details: Visit USPTO

Visit USPTO Page


Dental restorative material

A dental restorative composition is provided that includes a polymerizable resin, a substantially translucent structural filler, a nanofiller having a mean particle size less than 100 nm, and at least one rheology-modifying additive. In one embodiment, the structural filler has a refractive index substantially similar to that of the polymerizable resin, a coarse particle fraction, and a fine particle fraction having a mean particle size greater than 0.1 μm and smaller than the mean particle size of the coarse particle fraction. The relative ratio of the coarse particle fraction to the fine particle fraction is in the range from about 12:1 to about 2:1 by volume, the particle size distribution of each fraction is essentially monomodal, and the D(90) of the fine particle fraction is less than or equal to the D(10) of the coarse particle fraction.

  • Pub Date: 2016/19/01
  • Number: 09642782
  • Owner: Kerr Corporation
  • Location: Orange, US
  • Details: Visit USPTO

Visit USPTO Page


RFID tags with brand protection and loss prevention

Brand-protection codes may be used to maintain authenticity chains for items or tags across a number of different entities. A first entity, such as a tag or item manufacturer, may generate a first brand-protection code (BPC) based on a first key and a tag or item identifier and store the first BPC on a tag associated with an item. A second entity that receives the tag and/or item may attempt to authenticate the first BPC. If the second entity authenticates the first BPC, the second entity may generate an authentication code based on a second key and the first BPC and/or the tag/item identifier, and may write the authentication code to the tag. In some embodiments, the authentication code may be a second brand-protection code, or an exit code that allows the item to exit a facility such as a retail store.

  • Pub Date: 2016/18/01
  • Number: 09607286
  • Owner: Impinj, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Gaming, system, method and device including a symbol changing or augmenting feature

Gaming systems, devices and methods are set forth which provide for the selection and application of modifiers to game outcomes. The modifiers confer different functionalities to base game symbols or an augmenting functionality to alter or provide an outcome. Different sets of modifiers may be accessed randomly or under different conditions and event.

  • Pub Date: 2016/18/01
  • Number: 09418520
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and apparatus for displaying the multimedia information from wireless communication networks

Video signals for a mobile terminal are converted to accommodate reproduction by an alternative display terminal. The video signal is processed to provide a converted video signal appropriate for an alternative display terminal that is separate from the mobile terminal. This converted video signal is then provided for the alternative display terminal to accommodate the corresponding video display on a screen provided by the alternative (e.g., external) display terminal.

  • Pub Date: 2016/17/01
  • Number: 09355611
  • Owner: Virginia Innovation Sciences, Inc
  • Location: Alexandria, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for a power converter and system having foldback current limit

A power converter system configured to supply DC power to a load is provided, comprising a power converter device responsive to an AC input voltage and configured to provide an output DC voltage; an output voltage loop controller in operable communication with the power converter; an output current loop controller in operable communication with the power converter; an output power loop controller in operable communication with the power converter; and a foldback controller in operable communication with the power converter. The output voltage loop controller, the output current loop controller, the output power loop controller, and the foldback controller together control the power converter to provide a multi-sloped output characteristic, including constant output voltage in voltage mode, increased output current in a first constant power mode, decreased output current and voltage in a foldback mode, and increasing output current and decreasing output voltage in a second constant power mode.

  • Pub Date: 2016/15/01
  • Number: 09590524
  • Owner: Raytheon Company
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


Targeted pyrrolobenzodiazapine conjugates

Provided are Conjugate comprising PBDs conjugated to a targeting agent and methods of using such PBDs.

  • Pub Date: 2016/14/01
  • Number: 09592240
  • Owner: MEDIMMUNE LIMITED
  • Location: Cambridge, GB
  • Details: Visit USPTO

Visit USPTO Page


Illumination device for performing videography and photography with mobile devices

Illumination devices may be provided with one or more light sources that emit light of the same, similar, and/or different optical spectra within a wavelength range, for example, from the extreme ultraviolet (UV) to the far infrared (IR). One or more of the light sources may be selectively adjusted to control the overall mix of light projected onto a scene of interest. For example, one or more light sources may be used, and sometimes in conjunction with other optical elements, to provide illumination having a particular angular intensity distribution, color temperature, and/or other desired optical properties for a scene within a field of view (FOV) of the camera of a mobile device used for videography and/or photography. One or more illumination devices may also be used as flashlights and/or as sources of electrical power for recharging mobile devices. Related methods are provided.

  • Pub Date: 2016/14/01
  • Number: 09618827
  • Owner: SureFire, LLC
  • Location: Fountain Valley, US
  • Details: Visit USPTO

Visit USPTO Page


Display devices

A display device includes a base structure, a plurality of modules coupled to the base structure, where each of the modules include a plurality of actuator assemblies. Each of the actuator assemblies is individually controllable to move the actuator assemblies between a retracted state and a plurality of extended states. A controller is coupled to each of the modules and is programmed to control the actuator assemblies to move the actuator assemblies between the retracted state and the plurality of extended states.

  • Pub Date: 2016/14/01
  • Number: 09640118
  • Owner: The Coca-Cola Company
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Digital broadcasting system and method of processing data in digital broadcasting system

A method of transmitting a broadcast signal includes encoding mobile data for FEC (Forward Error Correction); encoding signaling information for signaling the mobile data; allocating the encoded mobile data and signaling data into a transmission frame; and transmitting the broadcast signal including the transmission frame, wherein the transmission frame includes a service signaling table having service_type information identifying a type of a service of the mobile data and hidden information indicating whether the service of the mobile data is hidden or not.

  • Pub Date: 2016/14/01
  • Number: 09590659
  • Owner: LG ELECTRONICS INC.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for preventing illicit use of a telephony platform

A system and method for preventing illicit use of a telephony platform that includes enrolling a plurality of accounts on a telecommunications platform, wherein an account includes account configuration; at a fraud detection system of the telecommunications platform, receiving account usage data, wherein the usage data includes at least communication configuration data and billing configuration data of account configuration and further includes communication history of the plurality of accounts; calculating fraud scores of a set of fraud rules from the usage data, wherein at least a sub-set of the fraud rules include conditions of usage data patterns between at least two accounts; detecting when the fraud scores of an account satisfy a fraud threshold; and initiating an action response when a fraud score satisfies the fraud threshold.

  • Pub Date: 2016/13/01
  • Number: 09614972
  • Owner: Twilio, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Computerized refraction prescription determination with sphere calculation

The present disclosure relates generally to a system and method for determining the refractive error of a person, more particularly determining the person's refractive error by using a computerized screen, and providing the person with a prescription for the person's preferred type of corrective lenses. The system and method do not require the trip or expense of a doctor visit, and are optimized for convenience and cost effectiveness. In a general embodiment, the present disclosure provides a method for determining a corrective lenses prescription for a person. The method includes, separately, for each eye of the person, determining the sphere prescription for the person via a computerized screen and without the use of a refractor lens assembly. Determining the sphere prescription is done, in part, by displaying a sphere figure to the person via the computerized screen and enabling the person to select at least one input, where the input corresponds to a sphere measurement.

  • Pub Date: 2016/13/01
  • Number: 09504378
  • Owner: Opternative, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Computerized pupillary distance measurement system and method

The present disclosure relates generally to a system and method for determining the pupillary distance of a person, more particularly determining the person's pupillary distance by using a computerized screen. The system and method do not require the trip or expense of a doctor or store visit, and are optimized for convenience and cost effectiveness. In a general embodiment, the present disclosure provides a method for determining a pupillary distance of a person without physically measuring the pupillary distance with a device. The method includes receiving a front facial image of the person, determining a scale of the image based on an estimated canthal distance, and determining the pupillary distance of the person based, in part, on the determined scale of the image.

  • Pub Date: 2016/13/01
  • Number: 09603517
  • Owner: Opternative, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Manufacturing methods for a transparent conductive oxide on a flexible substrate

An electrochromic device is provided. The device includes a substrate and an electrochromic stack on the substrate. The stack includes a first set of bus bars, a first transparent conductive layer, at least one electrochromic layer, a second transparent conductive layer, and a second set of bus bars, wherein at least one of the first transparent conductive layer or the second transparent conductive layer includes resistivity that varies by horizontal location according to a resistivity profile. In some embodiments the resistivity profile has a vertical component that may or may not be in addition to the horizontal component. Various embodiments of these materials can be tuned as to profiles of vertical resistance and horizontal sheet resistance.

  • Pub Date: 2016/12/01
  • Number: 09658508
  • Owner: Kinestral Technologies, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Extended access barring

A system and method for authorizing access to a transmission station for a mobile device is disclosed. The mobile device can receive device extended access barring (EAB) configuration information in a broadcast control channel (BCCH) from a transmission station. The mobile device can bar the mobile device configured for EAB and having characteristics identified in the EAB configuration information for barring from accessing the transmission station. Alternatively, a system and method for barring a mobile device from accessing a transmission station is disclosed. The transmission station can receive from the mobile device a radio resource control (RRC) connection establishment request. The transmission station can configure a system information block (SIB) with extended access barring (EAB) configuration information. The transmission station can broadcast the SIB with EAB configuration information to the mobile device.

  • Pub Date: 2016/11/01
  • Number: 09655029
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Character model animation using stored recordings of player movement interface data

Technologies are generally described for providing full-motion animation-as-a-service. In some examples, short motion-capture segments may be captured from user motion user interface devices and stored in a database. When a full-motion animation is desired, a start pose and a target pose may be provided, and a multiple-path, multiple-iteration search through the database may be used to assemble the full-motion animation. Motion retargeting may be used to further refine the assembled hill-motion animation.

  • Pub Date: 2016/11/01
  • Number: 09610496
  • Owner: EMPIRE TECHNOLOGY DEVELOPMENT LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless network camera systems

Apparatus, systems and techniques associated with battery powered wireless camera systems. One aspect of the subject matter described in this specification can be embodied in a system that includes a battery powered wireless camera including an internal battery to provide energy and a burst transmission unit to transmit information during burst periods. The system includes a base station, separated from the battery powered wireless camera, in wireless communication with the battery powered wireless camera to receive information from the battery powered wireless camera. The base station is configured to process the received information and includes a web server to transmit the processed information to a client. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products.

  • Pub Date: 2016/08/01
  • Number: 09640053
  • Owner: AXIS AB
  • Location: Lund, SE
  • Details: Visit USPTO

Visit USPTO Page


Verification platform having interface adapted for communication with verification agent

A method includes registering a given user with a verification platform adapted for communication with a verification agent implemented on a given processing device of the given user. The method also includes receiving a specification of verification rules to be used by the verification platform in authenticating a verification request from the given user, the verification rules specifying two or more different types of verification, a verification mode for each of the two or more different types of verification and a sequence for performing the two or more different types of verification. The method further includes synchronizing verification credentials associated with the given user for each of the two or more different types of verification, receiving a verification request from the given user, and authenticating the verification request utilizing the specified verification rules and the synchronized verification credentials.

  • Pub Date: 2016/08/01
  • Number: 09443069
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Use of packet data duplication to manage access network connections

As a communication device receives packet data via a first access network, the communication detects that packet data arriving via a second access network is duplicative of the packet data that the communication device is receiving via the first access network. In response to detecting such duplication, the communication device discontinues being served by the first access network and continues with communication via the second access network.

  • Pub Date: 2016/08/01
  • Number: 09473995
  • Owner: Sprint Spectrum L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Treating a lymphoma with a whole, leech saliva extract

Methods are also provided for isolating and using a whole-saliva leech extract in the treatment of a melanoma. The methods can include feeding a phagostimulatory agent to a leech; inducing a regurgitation in the leech, the inducing including placing the leech in an environment having a temperature of less than about 0° C.; and, collecting an unrefined, whole saliva in the regurgitation of the cooled leech. The methods can include revitalizing the leech by warming it at a temperature ranging from about 5° C. to about 40° C. Stable, lyophilized, whole-saliva extracts of a leech are also provided, the extract having a stable activity when stored for use at a temperature below about −20° C., the extract maintaining at least 70% of the activity for at least 6 months. The extracts can be used to treat solid tumors, treat liquid tumors, treat diabetes, treat a viral disease, treat a parasitic disease, treat an antibacterial disease, or serve as an anti-oxidant.

  • Pub Date: 2016/08/01
  • Number: 09433649
  • Owner: BIOPEP SOLUTIONS, INC.
  • Location: Richmond, BC, CA
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer readable media for controlling presentation and selection of objects that are digital images depicting subjects

The subject matter described herein is directed to controlling presentation and selection of objects that are digital images depicting subjects. According to one aspect, a plurality of objects is presented via a presentation device having a screen. Each object is associated with at least one other object of plurality of objects and is a digital image of a subject. A first object presented is selected in response to a first selection event associated with the first object. A second object non-adjacent to the first object is determined based on a predefined relationship associating the first object with the second object, wherein the second object is on-screen or off-screen. The second is presented via the presentation device on-screen and adjacent to the first object in response to the determination. An indication of the predefined relationship is also presented.

  • Pub Date: 2016/08/01
  • Number: 09569072
  • Owner: Scenera Technologies, LLC
  • Location: Portsmouth, US
  • Details: Visit USPTO

Visit USPTO Page


Software defined networking pipe for network traffic inspection

A software defined networking (SDN) computer network includes an SDN controller and an SDN switch. The SDN controller inserts flow rules in a flow table of the SDN switch to create an SDN pipe between a sender component and a security component. A broadcast function of the SDN switch to the ports that form the SDN pipe may be disabled. The SDN pipe allows outgoing packets sent by the sender component to be received by the security component. The security component inspects the outgoing packets for compliance with security policies and allows the outgoing packets to be forwarded to their destination when the outgoing packets pass inspection. The SDN controller may also insert a flow rule in the flow table of the SDN switch to bypass inspection of specified packets.

  • Pub Date: 2016/07/01
  • Number: 09407579
  • Owner: Trend Micro Incorporated
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Providing enhanced wireline services

Novel tools and techniques that provide enhanced wireline services at one or more known wireline locations. In some cases, these tools and techniques involve determining that a subscriber is at one or more of the known wireline locations based on a detected location of the subscriber's wireless device (e.g., wireless phone, portable computer, etc.). Once the subscriber's presence at that wireline location has been detected, enhanced services can be provided to a wireline telephone at that location.

  • Pub Date: 2016/07/01
  • Number: 09571637
  • Owner: Qwest Communications International Inc.
  • Location: Denver, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for converting a website into a native mobile application

Disclosed herein are a number of embodiments for effective and user-friendly tools that are designed to automatically convert a website into a native app for execution by a mobile computing device such as an Android device or an iOS device. Such tools permit website owners to quickly generate native apps for their websites without the need for any significant programming efforts by app developers.

  • Pub Date: 2016/07/01
  • Number: 09448776
  • Owner: APPNOTCH LLC
  • Location: St. Louis, US
  • Details: Visit USPTO

Visit USPTO Page


Inter-RAT mobility of in-device coexistence

Embodiments of system, device, and method configurations for managing inter-radio access technology (inter-RAT) mobility of handovers between a UMTS Terrestrial Radio Access Network (UTRAN) or GSM EDGE Radio Access Network (GERAN) and an evolved UMTS Terrestrial Radio Access Network (E-UTRAN) to avoid scenarios of in-device coexistence (IDC) interference are disclosed herein. In one example, the existence and types of IDC interference with an E-UTRAN Long Term Evolution (LTE)/Long Term Evolution-Advanced (LTE-A) network are determined and communicated to the UTRAN/GERAN in an IDC indication signal. The IDC indication signal may communicate the existence and type of IDC interference occurring at user equipment, such as between licensed LTE/LTE-A and unlicensed industrial scientific medical (ISM) radio frequency bands. Accordingly, the UTRAN/GERAN may use information provided from the IDC indication signal to prevent a handover to the E-UTRAN that would result in IDC interference.

  • Pub Date: 2016/07/01
  • Number: 09572077
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic device including display with bent area

A portable electronic device is provided. The electronic device includes a transparent front glass cover including a planar portion that forms a front surface of the electronic device, a planar rear glass cover that forms a rear surface of the electronic device, a metal bezel that surrounds a space formed by the front glass cover and the rear glass cover, and a flexible display device that is embedded in the space and exposed through the front glass cover. The front cover includes a left bent portion and a right bent portion on the left and right of the planar portion at the center of the front cover.

  • Pub Date: 2016/07/01
  • Number: 09578149
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Benzodiazepine derivatives

The invention relates to novel benzodiazepine derivatives with antiproliferative activity and more specifically to novel benzodiazepines of formula (I) and (II), in which the diazepine ring (B) is fused with a heterocyclic ring (CD), wherein the heterocyclic ring is bicyclic or a compound of formula (III), in which the diazepine ring (B) is fused with a heterocyclic ring (C), wherein the heterocyclic ring is monocyclic. The invention provides cytotoxic dimers of these compounds. The invention also provides conjugates of the monomers and the dimers. The invention further provides compositions and methods useful for inhibiting abnormal cell growth or treating a proliferative disorder in a mammal using the compounds or conjugates of the invention. The invention further relates to methods of using the compounds or conjugates for in vitro, in situ, and in vivo diagnosis or treatment of mammalian cells, or associated pathological conditions.

  • Pub Date: 2016/07/01
  • Number: 09550787
  • Owner: ImmunoGen, Inc.
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


Trusted storage systems and methods

Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.

  • Pub Date: 2016/05/01
  • Number: 09641490
  • Owner: Intertrust Technologies Corporation
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for determining use of non-human users in a distributed computer network environment

Embodiments of systems and methods as disclosed herein may determine that an initiator of a communication on a distributed computer network is an automated script or the like. More particularly, in one embodiment, a web page including a hidden field may be generated in response to a request for the web page. This hidden field is a field included in the web page that is not visible to a human user when the web page is rendered by a browser and presented to the user. By comparing a received value for such a hidden field with an associated value for the hidden field as provided in the web page, the use of an automated script may be detected.

  • Pub Date: 2016/05/01
  • Number: 09600651
  • Owner: KIMBIA, INC.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for detecting malicious payment transaction activity using aggregate views of payment transaction data in a distributed network environment

Embodiments of systems and methods for fraud prevention in an online distribution network are disclosed. In certain embodiments, service providers that provide forms in association with merchant's web sites for submission of transactions may implement pro-active threat detection based on an aggregate view of transactions in that distributed computer network.

  • Pub Date: 2016/05/01
  • Number: 09626680
  • Owner: Kimbia, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Quantifying the risks of applications for mobile devices

Quantifying the risks of applications (“apps”) for mobile devices is disclosed. In some embodiments, quantifying the risks of apps for mobile devices includes receiving an application for a mobile device; performing an automated analysis of the application based on a risk profile; and generating a risk score based on the automated analysis of the application based on the risk profile.

  • Pub Date: 2016/05/01
  • Number: 09582668
  • Owner: Appthority, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Camera data access based on subscription status

In embodiments of camera data access based on subscription status, a camera device owned by a user captures and communicates video to a cloud-based service. The cloud-based service receives the video from the camera device, and records and maintains the video as recorded video data. The cloud-based service implements a service application to manage subscription levels that each delineate a level of access to the recorded video data associated with the camera device. The service application can then allow a client device application all access, some access, or no access to the recorded video data based on a subscription level corresponding to the camera device. The subscription levels can include a first subscription level that provides access to the live video captured by the camera device, and at least a second subscription level that provides access to both the live video and the recorded video data.

  • Pub Date: 2016/05/01
  • Number: 09532094
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Bioinformatics systems, apparatuses, and methods executed on an integrated circuit processing platform

A system, method and apparatus for executing a sequence analysis pipeline on genetic sequence data includes a structured ASIC formed of a set of hardwired digital logic circuits that are interconnected by physical electrical interconnects. One of the physical electrical interconnects forms an input to the structured ASIC connected with an electronic data source for receiving reads of genomic data. The hardwired digital logic circuits are arranged as a set of processing engines, each processing engine being formed of a subset of the hardwired digital logic circuits to perform one or more steps in the sequence analysis pipeline on the reads of genomic data. Each subset of the hardwired digital logic circuits is formed in a wired configuration to perform the one or more steps in the sequence analysis pipeline.

  • Pub Date: 2016/05/01
  • Number: 09529967
  • Owner: Edico Genome, Corp.
  • Location: La Jolla, US
  • Details: Visit USPTO

Visit USPTO Page


Substituted (E)-N′-(1-phenylethylidene)benzohydrazide analogs as histone demethylase inhibitors

Methods of treatment of disorders of uncontrolled cellular proliferation, including cancer, by administering substituted (E)-N′-(1-phenylethylidene)benzohydrazide analogs, derivatives thereof, and related compounds to mammals in need thereof.

  • Pub Date: 2016/04/01
  • Number: 09642857
  • Owner: University of Utah Research Foundation
  • Location: Salt Lake City, US
  • Details: Visit USPTO

Visit USPTO Page


Smart line routing using wireless beacons

There are provided systems and methods for smart line routing using wireless beacons. A merchant may set up a wireless beacon throughout a storefront or retail location for the merchant. The beacons may connect to a user's device and provide check-in services to the user. Based on the connections between the user's device and the wireless beacons, information about the user's behavior in the merchant location may be determined. The information may correspond to items/services the user may purchase and an amount of items/services the user may purchase. Using this information and a payment instrument the user utilizes to complete a transaction for the items/services, and expected time for the user to complete a checkout and payment to the merchant may be determined. The expected time can be used to direct the user to a checkout line that minimizes a wait time for each line.

  • Pub Date: 2016/04/01
  • Number: 09639868
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Modified data query function instantiations

Techniques are described for using stored function instantiations, together with user queries. In one example, a method includes receiving a query from a user that contains one or more parameters. The method further includes comparing one or more parameters of the query with one or more parameters of one or more stored function instantiations. The method further includes determining a pre-existing function instantiation from the one or more stored function instantiations that have one or more parameters in common with the query. The method further includes identifying one or more parameters that are not in common between the query and the pre-existing function instantiation. The method further includes modifying the pre-existing function instantiation into a repurposed function instantiation that incorporates the one or more parameters from the query that are not in common between the query and the pre-existing function instantiation. The method further includes executing the repurposed function instantiation.

  • Pub Date: 2016/04/01
  • Number: 09396248
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for collecting and disseminating information over a computer network

The apparatus comprises at least one database for storing digital information associated with at least a first user and a second user, at least one links module for the first user and for the second user, at least one manipulations module and at least one display device for respectively displaying at least said linked digital information wherein said linked digital information associated with said first user is automatically updated on at least said display device of said second user when that information is manipulated, and wherein said linked digital information associated with said second user is automatically updated on at least said display device of said first user when that information is manipulated.

  • Pub Date: 2016/04/01
  • Number: 09396479
  • Owner: mBLAST, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Machine or group of machines for monitoring location of a vehicle or freight carried by a vehicle

A machine or group of machines for monitoring location of at least one of a vehicle or freight carried by the vehicle includes a server comprising a central processing unit, a memory, a clock, and a server communication transceiver that receives location information of a mobile device, the mobile device comprising a GPS receiver, a microprocessor and a wireless communication transceiver coupled to the GPS receiver, the mobile device comprising the GPS receiver programmed to receive data sent by a plurality of GPS satellites, calculate location information of the mobile device comprising the GPS receiver and transmit the location information.

  • Pub Date: 2016/04/01
  • Number: 09429659
  • Owner: MacroPoint LLP
  • Location: Cleveland, US
  • Details: Visit USPTO

Visit USPTO Page


Ion generation using modified wetted porous materials

The invention generally relates to ion generation using modified wetted porous materials. In certain aspects, the invention generally relates to systems and methods for ion generation using a wetted porous substrate that substantially prevents diffusion of sample into the substrate. In other aspects, the invention generally relate to ion generation using a wetted porous material and a drying agent. In other aspects, the invention generally relates to ion generation using a modified wetted porous substrate in which at least a portion of the porous substrate includes a material that modifies an interaction between a sample and the substrate.

  • Pub Date: 2016/04/01
  • Number: 09500630
  • Owner: Purdue Research Foundation
  • Location: West Lafayette, US
  • Details: Visit USPTO

Visit USPTO Page


Information exchange engine providing a critical infrastructure layer and methods of use thereof

A virtual record manager and a data exchange engine are provided for dynamically defining data records in a database and for dynamically allocating instances of defined data records. These components are capable of mediating between the database and application and client interface layers to facilitate exchange of information over a network. Embodiments are configured to allow complex data records having a plurality of related fields, and to allow management and exchange of information at both the data field level and data record level.

  • Pub Date: 2016/04/01
  • Number: 09535976
  • Details: Visit USPTO

Visit USPTO Page


Hand-worn device for surface gesture input

Embodiments that relate to energy efficient gesture input on a surface are disclosed. One disclosed embodiment provides a hand-worn device that may include a microphone configured to capture an audio input and generate an audio signal, an accelerometer configured to capture a motion input and generate an accelerometer signal, and a controller comprising a processor and memory. The controller may be configured to detect a wake-up motion input based on the accelerometer signal. The controller may wake from a low-power sleep mode in which the accelerometer is turned on and the microphone is turned off and enter a user interaction interpretation mode in which the microphone is turned on. Then, the controller may contemporaneously receive the audio signal and the accelerometer signal and decode strokes. Finally, the controller may detect a period of inactivity based on the audio signal and return to the low-power sleep mode.

  • Pub Date: 2016/04/01
  • Number: 09360946
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Development community assessment via real-time workspace monitoring

Techniques are described for development community assessment via real-time workspace monitoring. In one example, a method includes outputting, to one or more servers, a first developer registration information for a developer matching service, and downloading an agent associated with the developer matching service to a developer workspace on the client, wherein the agent is configured to monitor the developer workspace. The method further includes outputting, to the servers, data obtained from monitoring the developer workspace by the agent, and receiving, from the servers, a message that a correspondence has been identified between code in the development environment and code in a second development environment registered with the developer matching service. The method further includes establishing a connection between the client and a collaboration platform including a social coding service that facilitates collaboration between the first and second development environments.

  • Pub Date: 2016/04/01
  • Number: 09652225
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Endpoint parameter management architecture for audio mixers

The present disclosure describes a system using an audio mixer for managing endpoint parameters of an input audio device and an output audio device. The system includes a data terminal, multiple endpoints, and the audio mixer, where the data terminal provides multiple data files including configuration parameters of endpoints. The endpoints include a first endpoint and a second endpoint. The audio mixer is configured to receive the data files from the data terminal, process the data files to obtain a first set of configuration parameters corresponding to the first endpoint and a second set of configuration parameters corresponding to the second endpoint, convert the first set and the second set of configuration parameters into a predefined common data format, and organize the predefined common data structure into a generic data structure.

  • Pub Date: 2016/03/01
  • Number: 09628206
  • Owner: ClearOne Inc.
  • Location: Salt Lake City, US
  • Details: Visit USPTO

Visit USPTO Page


If you have any questions about these patents, or know of other patents that I should have listed here, please feel free to reach out and submit a Github issue. I'm always looking for new patents, as well as legacy patents, or more important patent litigation that is occurring, and I depend on my audience and network to help keep me in tune.