API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

Streamdata.io

Streamdata is a software vendor making real-time data accessible to all by operating a proxy turning request / response APIs into feeds of real-time events.

Uptrends

Uptrends is the ultimate monitoring tool to stay in control of the uptime, performance, and functionality of your websites, APIs, and servers.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

Rapid Checkout After Payment2

Visit USPTO Page


Navigational Soundscaping

Visit USPTO Page


Decision Support System For The Management Of Energy Use Contracting And Capital Investments For Facilities

Visit USPTO Page


Partial Initialization Of Divided Programs In Response To Preboot And Postboot Activation Events To Rapidly Boot A Computer System

Visit USPTO Page


Computerimplemented Method And System For Enabling The Automated Selection Of Keywords For Rapid Keyword Portfolio Expansion

Visit USPTO Page


Relocation Of Metadata Server With Outstanding Dmapi Requests

Visit USPTO Page


Multiple Clientuser And Capital Market Funded Participating Interest In Qualifying Trust

Visit USPTO Page


Rapid Image Annotation Via Brain State Decoding And Visual Pattern Mining

Visit USPTO Page


Interactively Shaping Terrain Through Composable Operations

Visit USPTO Page


Calculating And Monitoring The Efficacy Of Stressrelated Therapies

Visit USPTO Page


Rapid Updating Of Cloud Applications

Visit USPTO Page


Systems And Methods For The Management Of Information To Enable The Rapid Dissemination Of Actionable Information

Visit USPTO Page


Component Bonding Using A Capillary Effect

Visit USPTO Page


Reshaping A Camera Image

Visit USPTO Page


Network Processor With Traffic Shaping Response Bus Interface

Visit USPTO Page


Methods and systems for efficient API integrated login in a multi-tenant database environment

Methods and systems for efficient API integrated login in a multi-tenant database environment and for decreasing latency delays during an API login request authentication including receiving a plurality of API login requests at a load balancer of a datacenter, where each of the plurality of API login requests specify a user identifier (userID) and/or an organizational identifier (orgID), fanning the plurality of API login requests across a plurality of redundant instances executing within the datacenter, assigning each API login request to one of the plurality of redundant instances for authentication, and for each of the respective plurality of API login requests, performing a recursive query algorithm at the assigned redundant instance, at one or more recursive redundant instances within the datacenter, and at a remote recursive redundant instance executing in a second datacenter, as necessary, until the login request is authenticated or determined to be invalid.

  • Pub Date: 2011/15/02
  • Number: 08676979
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus providing intelligent radio selection for legacy and non-legacy applications

Methods and apparatus providing intelligent interface selection for legacy and non-legacy applications. The method includes intercepting a networking function call from an application desiring radio access, selecting a radio from a plurality of candidate radios based on selection criteria, and binding the radio to the application. To facilitate flow mobility, the method includes allocating an ephemeral port to the radio, generating a flow binding rule based only on the ephemeral port, and signaling the flow binding rule to a home agent.

  • Pub Date: 2011/15/02
  • Number: 09603085
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method, apparatus and system for management of information content for enhanced accessibility over wireless communication networks

Information content is managed in a network-based communication system by providing a first web site accessible to a user of the system. The first web site is configured to permit the user to designate at least one data source. A second web site is generated that is accessible independently of the first web site via one or more mobile devices over a wireless network of the communication system, with the second web site being configured to receive data automatically from the data source designated by the user at the first web site. The first and second web sites may comprise respective content management and mobile web sites, or other types of web-based interfaces. Other aspects of the invention relate to permitting a first user to designate a plurality of other users that will share access to content with the first user via the second web site, in accordance with accessibility rules established by the first user via the first web site.

  • Pub Date: 2011/15/02
  • Number: 08135801
  • Owner: Wireless Ink Corporation
  • Location: East Islip, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for preventing data loss through screen capture

A computing device detects a command to perform a print screen operation. On detecting the command to perform the print screen operation, the computing device identifies a file associated with a displayed application window. The computing device determines whether the file contains confidential information. Upon determining that the file contains confidential information, the computing device performs an action to enforce a data loss prevention policy.

  • Pub Date: 2011/15/02
  • Number: 08844059
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for managing communications in a wireless communication system

The present technology provides a method and apparatus for managing communications in a wireless communication system. The method and apparatus evaluate one or more network traffic levels, each network traffic level associated with a respective network sector, and submit access-configuration messages in one or more network sectors when the evaluated network traffic level of a particular network sector has a predetermined relation to the traffic threshold for that particular network sector. The access-configuration messages are configured to shift one or more of wireless devices into one or more predetermined operational conditions. The present technology further provides corresponding wireless devices.

  • Pub Date: 2011/15/02
  • Number: 08565080
  • Owner: Sierra Wireless, Inc.
  • Location: Richmond, CA
  • Details: Visit USPTO

Visit USPTO Page


Devices and methods for searching data on data sources associated with registered applications

A mobile device includes a memory to store an unregistered application and corresponding unregistered application data which is unable to be searched, and a registered application and corresponding registered application data that is able to be searched. The mobile device also has a processor to convert the unregistered application and the unregistered application data to a newly registered application and newly registered application data which is able to be searched, and search the registered application data and the newly registered application data for a search term to determine whether the registered application and the newly registered application have search results associated therewith. The processor also displays applications having search results associated therewith on an application selection screen on a display, with a subset of information about the search results being displayed, and receives selection of an application via an input device. The processor also executes the selected application to present the search results on the display.

  • Pub Date: 2011/15/02
  • Number: 09104721
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Cluster processing of an aggregated dataset

Using a computer, a database comprising a field is identified. A query relating to the field is identified. Prior to processing the query, the field is dynamically altered to conform to a desired bit size. The query is processed. The results of the query are returned.

  • Pub Date: 2011/15/02
  • Number: 09466063
  • Owner: Information Resources, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Web media asset ID system and method

Methods of dynamically identifying a server provided media asset on a client device are provided herein.

  • Pub Date: 2011/14/02
  • Number: 08448063
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for reducing executable code vulnerability

Techniques for reducing executable code vulnerability are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for reducing executable code vulnerability comprising analyzing a binary file, using at least one computer processor, to identify a vulnerable executable code structure, and configuring the identified executable code structure to reduce vulnerability.

  • Pub Date: 2011/14/02
  • Number: 09058492
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Suspendable interrupts for processor idle management

Suspendable interrupts are described that allow a processor to remain in an idle state for a longer period of time. Each suspendable interrupt defines a maximum delay value that specifies the maximum delay software associated with the interrupt can wait between a receipt of an interrupt signal associated with the suspendable interrupt and raising the interrupt for servicing by the software. The delay value allows suspendable interrupts to be masked when a processor is placed in the idle state if they can be dealt with at a next scheduled wake time of the processor, allowing the processor to potentially remain in the idle state for a longer period of time.

  • Pub Date: 2011/14/02
  • Number: 08504753
  • Owner: QNX Software Systems Limited
  • Location: Kanata, CA
  • Details: Visit USPTO

Visit USPTO Page


Support structure for linear friction welding

A method and apparatus for fixturing an airfoil stub during linear friction welding are described. Critical clamping support structures are manufactured by a direct digital manufacturing process such as direct metal laser sintering to minimize time and expense of the process.

  • Pub Date: 2011/14/02
  • Number: 08375581
  • Owner: United Technologies Corporation
  • Location: Hartford, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system and computer program product for a client application programming interface (API) in a service oriented architecture

Described are a client application-programming interface (API) in a service oriented architecture (SOA). A system includes an application client having application code, one or more service interfaces, and a processor. An enterprise service bus (ESB) having a service registry connects one or more service implementations with the application client through the ESB. A processor is configured to execute the application code to invoke at least one of the one or more service interfaces and request at least one of the one or more service implementations via a request message. The request message comprises application code language based objects requesting a service. The processor is further configured to dynamically create a service instance for the service message. The service instance comprises the service message formatted for transport in the ESB and an endpoint reference for the one of the one or more service implementations as determined by the service registry.

  • Pub Date: 2011/14/02
  • Number: 08701128
  • Owner: General Electric Company
  • Location: Schenectady, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system to enhance accuracy of a data leak prevention (DLP) system

A Data Loss Prevention (DLP) system is enhanced according to this disclosure by augmenting the information obtained from OS API hooking with “context” information obtained from other sources, such as by monitoring an endpoint's user interface (UI). In one embodiment, the additional “context” information is obtained from one or more user interface hooks that provide the DLP system with additional information, such as the contents of one or more application windows, the UI elements contained in a particular display window, window activation or deactivation, window resizing, user input, pointer operations, and the like. This UI information defines a “context” of the application, namely, its operating state (including, without limitation, its display state), and associated user actions that define that state. When a particular OS API hook is invoked by the application, the DLP solution uses the context information to make a more accurate enforcement decision, preferably based on the UI context.

  • Pub Date: 2011/14/02
  • Number: 08914892
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Information service apparatus and method, information display apparatus and information service system

An information service apparatus provides information described in a language suitable for a user. The information service apparatus has an operation panel on which operation information on the information service apparatus is displayed. It is judged whether or not information can be provided in a language designated by discrimination information contained in a request from a terminal. When it is determined that the information in the language designated by the discrimination information cannot be provided, an operation panel language used for displaying the operation information on the operation panel is set as the language used for providing the information.

  • Pub Date: 2011/14/02
  • Number: 08484012
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Flexible vehicle display

A method and system for displaying graphical content on a vehicle display includes a client module and a plurality of control modules. The client module is in communication with the vehicle display and the plurality of control modules. Each of the plurality of control modules include software for generating a graphical text data intended to be shown on the vehicle display. The graphical text data is formatted with a predetermined layout determined by the corresponding one of the plurality of control modules. The client module includes a control logic for showing the graphical generated by the at least one of the plurality of control modules on the vehicle display. The graphical text data shown on the vehicle display is formatted with the predetermined layout determined by the corresponding one of the plurality of control modules.

  • Pub Date: 2011/14/02
  • Number: 08694177
  • Owner: GM Global Technology Operations LLC
  • Location: Detroit, US
  • Details: Visit USPTO

Visit USPTO Page


Communications system providing mobile wireless communications device application module associations for respective wireless communications formats and related methods

A communications system may include a plurality of electronic devices having respective different device types and each configured to wirelessly communicate via a plurality of different wireless communications formats. The system may also include a mobile wireless communications device including a plurality of application modules associated with respective electronic device types and configured to communicate via a first one of the wireless communications formats. The mobile wireless communications device may further include a control module configured to establish an initial wireless communications link with a given electronic device using a second one of the wireless communications formats, determine a respective device type for the given electronic device based upon the established initial wireless communications link, and cause a respective application module to establish a subsequent wireless communications link with the given electronic device using the second wireless communications format based upon the determined respective device type.

  • Pub Date: 2011/14/02
  • Number: 08358596
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Asymmetric two-pass graphics scaling

A method and an apparatus for determining an up scale factor and a down scale factor according to a scale factor received from a graphics application program interface (API) to scale a graphics data in a graphics processing unit (GPU) are described. The up scale factor and the down scale factor may be precisely stored in the GPU based on a fixed number of bits. An actual scale factor which can be precisely stored in the GPU corresponding to the scale factor may differ from the scale factor with a difference. Graphics commands may be sent to the GPU to scale the graphics data according to the up scale factor and the down scale factor separately. A combined scale factor corresponding to a combination of the up scale factor and the down scale factor may differ from the scale factor less then the difference between the actual scale factor and the scale factor.

  • Pub Date: 2011/14/02
  • Number: 08085280
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Clearinghouse server for internet telephony and multimedia communications

A clearinghouse server for routing multi-media communications, including telephony calls, between a source device and a destination device via a distributed computer network, such as the global Internet. The clearinghouse server can authorize the completion of a communication from a source device to a destination device and collect usage-related information for the completed communication. In response to an authorization request issued by an enrolled source device, the clearinghouse server can identify one or more available destination devices available to accept a communication from an authorized source device. The clearinghouse server can provide a list of the identified destination devices, typically organized in a rank order, by sending an authorization response to the source device. In turn, the source device can use this list to select a destination device and contact that selected device via the computer network to complete the communication.

  • Pub Date: 2011/12/02
  • Number: 08289974
  • Owner: Transnexus, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Voice-based command driven computer implemented method

The present invention generally relates to a voice-based command driven computer implemented method and programmed apparatus that allows a user to easily add any open API communication product they choose to one interface. The computer implemented method filters all electronic communications selected by the user through a common source, such as the user's cell phone or computer. Each time an electronic communication is received, no matter through what program or application, the computer implemented method operates to communicate to the user that the electronic communication has been received and provides the user with the option of listening to and responding to the electronic communication, if appropriate. The user responds to the electronic communication through voice-based communication rather than physical interaction with the common source. The user may additionally initiate electronic communication through voice-based communication.

  • Pub Date: 2011/11/02
  • Number: 08812056
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing a secure uniform resource locator (URL) shortening service

A computer-implemented method to provide a secure uniform resource locator (URL) shortening service is described. A URL is received via a browser provided on a display of a computing device. A shortened URL is generated to represent the received URL. A determination is made as to whether a classification assigned to a web site associated with the shortened URL is valid. Upon determining that the assigned classification is not valid, the web site is evaluated in order to assign an updated valid classification to the web site.

  • Pub Date: 2011/11/02
  • Number: 09058490
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for identifying caller locations

In one embodiment, the present disclosure provides a method, system and device for determining information about a location of the mobile device. The mobile device is configured to contact a private response call center (PRCC), e.g., by pressing or selecting one or more buttons or a softmenu. A PRCC operator can identify a potential emergency situation and, upon such an identification, initiate a conference call between a PRCC operator, a user of the mobile device, and a public safety answering point (PSAP) operator. The mobile device may transmit location information previously determined before PRCC call and be commanded to gather new location information during the call. The mobile device may also, while on a call with the PRCC, determine and transmit to the PRCC location information.

  • Pub Date: 2011/11/02
  • Number: 08489066
  • Owner: GreatCall, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Quality of service (QoS) acquisition and provisioning within a wireless communications system

In an embodiment, an access network (AN) receives a message configured to prompt a conditional allocation of Quality of Service (QoS) resources to an access terminal (AT). The message can be received from the AT or from an application server (AS) that arbitrates a communication session for the AT. In another embodiment, if the AT determines that a QoS resource request has not yet been granted, the AT waits until the traffic channel (TCH) has been obtained for a communication session before resending the QoS resource request. In another embodiment, if the AT determines to initiate or join a second communication session before a confirmation that QoS resources for a first communication session are relinquished, the AT waits until the confirmation is received before a request for QoS resources for the second communication session is sent.

  • Pub Date: 2011/11/02
  • Number: 08804518
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Personal encryption device

A method and system for securing a handheld computing device is described. A personal encryption device may be physically connected to a handheld computing device. Responsive to the connection, a main screen user interface may be displayed on a display of the handheld computing device. The main screen user interface may include at least one cryptography option for a user of the handheld computing device. A user-defined input representative of selection of a first cryptography option of the at least one cryptography option may be received, and at least one cryptography process associated with the selected first cryptography option may be implemented by the handheld computing device and personal encryption device. The cryptography options may include encryption, decryption, digital signatures, and digital signature verification.

  • Pub Date: 2011/11/02
  • Number: 08516609
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Muscle-derived cells (MDCS) for augmenting or bulking urethral sphincter-muscle tissue

The present invention provides muscle-derived cells, preferably myoblasts and muscle-derived stem cells, genetically engineered to contain and express one or more heterologous genes or functional segments of such genes, for delivery of the encoded gene products at or near sites of musculoskeletal, bone, ligament, meniscus, cartilage or genitourinary disease, injury, defect, or dysfunction. Ex vivo myoblast mediated gene delivery of human inducible nitric oxide synthase, and the resulting production of nitric oxide at and around the site of injury, are particularly provided by the invention as a treatment for lower genitourinary tract dysfunctions. Ex vivo gene transfer for the musculoskeletal system includes genes encoding acidic fibroblast growth factor, basic fibroblast growth factor, epidermal growth factor, insulin-like growth factor, platelet derived growth factor, transforming growth factor-1, transforming growth factor-a, nerve growth factor and interleukin-1 receptor antagonist protein (IRAP), bone morphogenetic protein (BMPs), cartilage derived morphogenetic protein (CDMPs), vascular endothelial growth factor (VEGF), and sonic hedgehog proteins.

  • Pub Date: 2011/11/02
  • Number: 08765120
  • Owner: University of Pittsburgh—Of the Commonwealth System of Higher Education
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for navigating a list with gestures

Methods and systems for facilitating the navigation of a list of content items with gestures are described. Consistent with some embodiments, a computing device detects simple gestures, and in response, display a preview of content items preceding, or following a currently selected content item, from the list of content items. Upon detecting a selection gesture, the computing device updates the view of the currently selected content item to display the newly selected content item.

  • Pub Date: 2011/11/02
  • Number: 09015639
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for indexing, relating and managing information about entities

Systems and methods for use in association with a master entity index system may allow data records to be grouped together into various entities, where each of the entities may represent a logical or physical item. These entities may also be associated with one another in a manner such that relationships between entities may likewise be represented. In one embodiment, an interface may be provided for use in conjunction with the master entity index system such that these various entities and relationships may be better managed, manipulated or visualized. This interface may allow a user to search for or otherwise obtain an entity, where a representation of this entity and one or more associated entities may be presented to the user along with representations of the relationships between these entities.

  • Pub Date: 2011/11/02
  • Number: 09286374
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing multi-threaded video decoding

An apparatus for enabling provision of multi-thread video decoding may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured, with the processor, to cause the apparatus to perform at least assigning decoding of a respective video frame to a corresponding thread for each core processor of a multi-core processor in which each respective video frame is divided into macroblock rows, resolving dependencies for each respective video frame at a macroblock row level, and providing synchronization for video decoding of each corresponding thread at the macroblock row level. A corresponding method and computer program product are also provided.

  • Pub Date: 2011/11/02
  • Number: 08873638
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for network analysis

A network analysis capability is provided herein. A network analysis capability supports proactive detection of service troubles in a network by looking at the network from the perspective of the end users. A proactive detection mechanism is provided by having end user devices (e.g., smartphones, computers, and the like) run background applications which monitor for service-impacting problems and autonomously report service-impacting problems when such problems are detected. A background application, before and/or after problems are detected, collects diagnostic information and forwards the diagnostic information to a network for analysis. A network node compiles and analyzes data collected from the end user devices, data collected from one or more network-based data collectors, and, optionally, information from one or more network support systems, to diagnose problems and dynamically respond, potentially before service is impacted.

  • Pub Date: 2011/11/02
  • Number: 08700027
  • Owner: Alcatel Lucent
  • Location: Paris, FR
  • Details: Visit USPTO

Visit USPTO Page


Dynamic data management system and method for collecting data from disperse sources in real-time

A dynamic system and a method for locating and obtaining patient information in real-time is provided. The system generally comprises an order in the form of a query; a document management and storage system (DMSS); at least one tool that is capable of sending the query to a server in order to retrieve available information; a communication channel; and a data collection and conversion system (DCCS). The DMSS includes both an application processor and a tool processor designed to manage and control the storage of electronic documents through the use of an application program that includes functionality for selecting the tool and authenticating the order.

  • Pub Date: 2011/11/02
  • Number: 08515989
  • Details: Visit USPTO

Visit USPTO Page


Detecting a trojan horse

A method and apparatus for detecting a Trojan horse in a suspicious version of a software application in the form of at least one electronic file. A computer device determines a source from which the suspicious version of the software application was obtained. A comparison is then made between the source from which the suspicious version of the software application was obtained and a source from which an original, clean version of the software application was obtained. If the sources differ, then it is determined that the suspicious version of the software application is more likely to contain a Trojan horse than if the sources were the same.

  • Pub Date: 2011/11/02
  • Number: 08726387
  • Owner: F-Secure Corporation
  • Location: Helsinki, FI
  • Details: Visit USPTO

Visit USPTO Page


Ad hoc wireless networking

A software architecture providing ad hoc wireless networking capabilities. The software architecture may be compatible with wireless devices, such as UWB devices operating according to the WLP communication protocol. The software architecture may include user mode and kernel mode modules, and may include a multiplexing driver framework to enable system connection to multiple ad hoc networks.

  • Pub Date: 2011/11/02
  • Number: 08681655
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Secure distributed single action payment system

Methods and systems for enabling and performing secured, single action payments from a mobile device are disclosed. One method includes receiving user credentials at an application installed on a mobile device, and transmitting the user credentials from the mobile device to a server alongside a device identifier. The method includes receiving data at least partially defining encrypted personal payment information and saving the encrypted personal payment information in a memory of the mobile device in association with the application. At least prior to receiving a user request to make a payment via the application, the mobile device lacks a decryption key capable of decrypting the encrypted personal payment information.

  • Pub Date: 2011/10/02
  • Number: 09141945
  • Owner: appMobi IPLC, Inc.
  • Location: Lancaster, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for suppressing network feed activities using an information feed in an on-demand database service environment

Disclosed are systems, apparatus, methods, and computer readable media for suppressing network feed activities using an information feed in an on-demand database service environment. In one embodiment, a message is received, including data indicative of a user action. An entity associated with the user action is identified, where the entity is a type of record stored in a database. A type of the entity is identified. It is determined whether the entity type is a prohibited entity type. When the entity type is not a prohibited entity type, the message data is saved to one or more tables in the database. The tables are configured to store feed items of an information feed capable of being displayed on a device. When the entity type is a prohibited entity type, the saving of the message data, to the one or more tables in the database configured to store the feed items, is prohibited.

  • Pub Date: 2011/10/02
  • Number: 08732150
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus of smart power management for mobile communication terminals using power thresholds

A method is provided for use in a mobile communication terminal configured to support a plurality of applications, wherein each application is executed by performing one or more tasks. The method includes, in response to a scheduling request from an application, obtaining an indication of power supply condition at a requested run-time of at least one of the tasks. The method further includes obtaining a prediction of a rate of energy usage by the task at the requested run-time, estimating, from the predicted rate of energy usage, a total amount of energy needed to complete the task, and making a scheduling decision for the task. The scheduling decision comprises making a selection from a group of two or more alternative dispositions for the task. The selection is made according to a criterion that relates the run-time power-supply condition to the predicted rate of energy usage by the task and to the estimate of total energy needed to complete the task.

  • Pub Date: 2011/10/02
  • Number: 09374787
  • Owner: Alcatel Lucent
  • Location: Boulogne-Billancourt, FR
  • Details: Visit USPTO

Visit USPTO Page


Document encryption and decryption

A document encryption and decryption system for selectively encrypting and decrypting files and any other items and method for same to protect or secure its contents by helping to prevent unauthorized individuals from viewing data in human-perceivable or readable form. The encryption system includes remote authentication to verify a user's credentials stored on a remote database hosted by a web server. The encryption system further includes remote delete to automatically delete encrypted items stored on the user's computer, handheld or portable device, smartphone, and any other computing device of any kind when it logs onto a network if the user's computer or computing device is reported lost, stolen, or otherwise compromised. Decryption keys allow selective decryption of encrypted items that are on the computer or computing device of any kind. A Windows Communication Foundation service helps with authenticating the users with the encryption key and login process stored and processed by the web server.

  • Pub Date: 2011/10/02
  • Number: 08621214
  • Owner: Securencrypt, LLC
  • Location: Jackson, US
  • Details: Visit USPTO

Visit USPTO Page


Designing task execution order based on location of the task icons within a graphical user interface

A method, system and computer program product for designating the order in which a plurality of tasks are to be executed on a computer system. In one embodiment, a plurality of task icons, each of which represents a respective one task, are shown in defined positions in a view on the computer system, and these defined positions of the task icons are used to determine the order in which the tasks are to be executed by the computer system. In an embodiment, the task icons are shown in a grid pattern, having rows and columns. Tasks represented by task icons shown in successive rows of the grid pattern are executed in series, and tasks represented by task icons shown in the same row of the grid pattern are executed in parallel. In an embodiment, at least one of the task icons represents an embedded executable workflow folder.

  • Pub Date: 2011/10/02
  • Number: 09311061
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Module for containing an earpiece for an audio device

A module for containing an earpiece for an audio device, the earpiece having at least one protruding electrical contact. The module comprises a first portion and a second portion, the first portion and the second portion being opposable and forming a cavity sized to accommodate an earpiece. The module further comprises at least one electrical contact within the cavity, on one of the first portion and the second portion. The electrical contact is positioned to engage a protruding electrical contact of the earpiece positioned within the cavity.

  • Pub Date: 2011/09/02
  • Number: 08588454
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for selecting digital coding/decoding technology for programming and data delivery

Methods and apparatus for selecting digital coding and/or decoding technology for programming and data delivery over, e.g., a content-based network. In one embodiment, the network comprises an HFC cable or satellite network that includes a server process interfacing with a plurality of customer premises equipment (CPE), and/or associated client devices, each having different capabilities profiles. The server determines the one or more capabilities possessed by the CPE, and evaluates one or more program or content choices for possible delivery to that CPE based on its profile. The server generates a list of programs or content based on this evaluation, and transmits this list to the CPE, which displays the list for viewing by a user. The user is therefore offered a list of available content that is compatible with their specific configuration. A business and operational rules engine is also optionally employed to control the operation of the foregoing processes to accomplish particular business or operational goals.

  • Pub Date: 2011/09/02
  • Number: 08804767
  • Owner: Time Warner Cable Enterprises LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for performing event-matching with a graphical processing unit

A computer-implemented method for event matching in a complex event processing system includes receiving, with a computer processing device, a stream of event data; receiving, with a computer processing device, an event list and an access predicate list, wherein the event list includes one or more event data pairs; and identifying, with a graphical processing device, patterns in the stream of event data.

  • Pub Date: 2011/09/02
  • Number: 09317456
  • Owner: Infosys Technologies Ltd.
  • Location: Bangalore, IN
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing weakly mutable data in a distributed storage system

A method for managing multiple generations of an object within a distributed storage system is implemented at a computing device. The computing device receives metadata and content of a first generation of an object from a first client connected to the distributed storage system and stores the first generation's metadata and content within a first storage sub-system. The computing device receives metadata and content of a second generation of the object from a second client connected to the distributed storage system and stores the second generation's metadata and content within a second storage sub-system. The computing device independently replicates the first generation's metadata and content from the first storage sub-system to the second storage sub-system and replicates the second generation's metadata and content from the second storage sub-system to the first storage sub-system such that both storage sub-systems include a replica of the object's first and second generations.

  • Pub Date: 2011/09/02
  • Number: 08615485
  • Owner: Google, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Memory management for object oriented applications during runtime

Memory management for object oriented applications during run time includes loading an object oriented application into a computer memory. The object oriented application includes a plurality of nodes in a classification tree, the nodes including key value pairs. The nodes are aggregated in the classification tree by a computer. The aggregating includes eliminating redundant keys and creating a composite node. The composite node is loaded into the computer memory. The plurality of nodes in the classification tree are removed from the computer memory in response to loading the composite node into the computer memory.

  • Pub Date: 2011/09/02
  • Number: 08453130
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic paper terminal device; computer-readable medium storing image display control program, and image display control method

In an electronic paper terminal device, a drawing order determination unit analyzes an image to be displayed, and determines priority of each line. A priority storage unit stores the priority of each line determined by the drawing order determination unit. A drawing unit selects lines in descending order of the priority stored in the priority storage unit, acquires image data on the selected lines from the image to be displayed, and draws on the selected lines of a display device on the basis of the acquired image data.

  • Pub Date: 2011/09/02
  • Number: 08482566
  • Owner: Fujitsu Limited
  • Location: Kawasaki, JP
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for utilizing variable rate program streams in a network

Apparatus and methods for transparently using otherwise wasted bandwidth associated with variable-rate program streams to deliver additional content. In one embodiment, the network comprises a broadcast switched architecture (BSA), and the program streams are loaded up to a target rate using “null” packets and then delivered over the network infrastructure to a plurality of hub sites. The streams are then unloaded to reproduce the original variable streams, and the bandwidth vacated by removal of the null packets used as the transport mechanism for additional (e.g., non time-sensitive) content to be delivered to the subscribers. The process can also be substantially automated and anticipatory (through, e.g., transmission of null bit insertion data downstream). The invention can also advantageously be implemented with minimal modifications to existing infrastructure, and supports business and operational supervisory processes. Network server, QAM modulator, and CPE apparatus implementing the aforementioned methodologies are also disclosed.

  • Pub Date: 2011/09/02
  • Number: 08559465
  • Owner: Time Warner Cable Enterprises LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless network camera systems

Apparatus, systems and techniques associated with battery powered wireless camera systems. One aspect of the subject matter described in this specification can be embodied in a system that includes a battery powered wireless camera including an internal battery to provide energy and a burst transmission unit to transmit information during burst periods. The system includes a base station, separated from the battery powered wireless camera, in wireless communication with the battery powered wireless camera to receive information from the battery powered wireless camera. The base station is configured to process the received information and includes a web server to transmit the processed information to a client. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products.

  • Pub Date: 2011/08/02
  • Number: 08121078
  • Owner: Micropower Technologies, Inc.
  • Location: Ranch Santa Fe, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for safely executing programs

A computer-implemented method for safely executing programs may include identifying an attempt to launch an executable file. The computer-implemented method may also include identifying a reputation associated with the executable file. The computer-implemented method may further include determining, based on the reputation, that the executable file is not trusted. The computer-implemented method may additionally include, in response to determining that the executable file is not trusted, fulfilling the attempt by sandboxing a process instantiated from the executable file. Various other methods, systems, and computer-readable media are also disclosed.

  • Pub Date: 2011/08/02
  • Number: 09111089
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for rendering data

A method of viewing information associated with data in a spreadsheet, includes providing a document including data and information associated with the data, parsing the document to retrieve the associated information, processing the associated information to break the associated information down into at least one sentence, categorizing the at least one sentence to determine whether the at least one sentence corresponds to at least one category in a taxonomy corresponding to the data, assigning an association strength to the categorized at least one sentence, the association strength indicating a likelihood that the categorized at least one sentence actually corresponds to the at least one category in the taxonomy, filtering the at least one categorized sentence based on the association strength to determine whether to match the categorized at least one sentence with the at least one category in the taxonomy and outputting only the categorized at least one sentence matched with the at least one category in the taxonomy.

  • Pub Date: 2011/08/02
  • Number: 08468442
  • Owner: RR Donnelley Financial, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing virtual and dedicated servers

Some embodiments provide a hosting system for managing virtual and dedicated servers. The system includes a front-end user interface (UI) that allows users to configure, provision, and control virtual and dedicated servers through UI elements. The back-end system includes different actuators that perform different tasks related to the virtual and dedicated server. To interface with these different actuators, the hosting system includes a remote management component (1) that receives a user request from the front-end UI, (2) identifies an actuator that can fulfill the user request, and (3) sends the user request to the identified actuator.

  • Pub Date: 2011/08/02
  • Number: 09288117
  • Owner: GoGrid, LLC
  • Location: Jersey City, US
  • Details: Visit USPTO

Visit USPTO Page


Sintered objects and processes for producing same

Provided is a sintered object which has excellent resistance to corrosion by corrosive halogen gases and by the plasmas thereof and has excellent thermal conductivity and excellent electrical conductivity. The sintered object has few limitations on design, is usable in a wide range of applications, and is highly versatile. The sintered object has no frequency dependence when a high-frequency voltage is applied thereto and with which it is possible to actualize the stability of a plasma. Also provided is a method for producing the sintered object. Furthermore provided is a high-frequency transmission material which has direct-current electrical conductivity for reducing fluctuations in plasma potential and has capacitive properties that enable the material to transmit high-frequency power necessary for plasma excitation, and which has no fear of causing contamination of a sample with a metal and has resistance to corrosion by plasmas.

  • Pub Date: 2011/08/02
  • Number: 09403722
  • Owner: SUMITOMO OSAKA CEMENT CO., LTD.
  • Location: , JP
  • Details: Visit USPTO

Visit USPTO Page


Selecting computing nodes in cloud service using replication topologies

A cloud statistics server generates statistics for a cloud service based on an identified data item and an identified operation. The cloud service may include various computing nodes and storage nodes. The cloud statistics may include expected completion times for the identified operation and the identified data item with respect to each of the computing nodes. A computing node may be selected to execute the identified operation based on the expected completion times. The generated statistics may be generated by the cloud statistics server using a network topology associated with the data item that is based on the latencies or expected transfer times between the various storage nodes and computing nodes, and a replication strategy used by the cloud service. The topology may be implemented as a directed graph with edge weights corresponding to expected transfer times between each node.

  • Pub Date: 2011/08/02
  • Number: 09110724
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Providing restartable file systems within computing devices

In general, techniques are described for enabling a restartable file system. A computing device comprising a processor that executes an operating system may implement the techniques. The processor executes kernel and file system functions of the operating system to perform an operation, where both types of functions call each other to perform the operation. The operating system stores data identifying those of the kernel functions that called the file system functions. In response to determining that one of the file system functions that was called has failed, the operating system accesses the data to identify one of the kernel functions that most recently called one of the file system functions, and returns control to the identified one of the kernel functions without executing any of the file system functions called after the identified one of the kernel functions and prior to the one of the file system functions that failed.

  • Pub Date: 2011/08/02
  • Number: 08510597
  • Owner: Wisconsin Alumni Research Foundation
  • Location: Madison, US
  • Details: Visit USPTO

Visit USPTO Page


Ping server

Techniques and systems are described that assist in predicting, diagnosing, and/or managing an incident in a utility service area. A communication system is provided in the service area to communicate with nodes of the service area. Nodes of the service area may communicate with the communication system using a variety of different communication technologies and/or communication protocols. In some instances, the communication system may detect a communication technology and/or a communication protocol used by a node.

  • Pub Date: 2011/08/02
  • Number: 08928489
  • Owner: Avista Corporation
  • Location: Spokane, US
  • Details: Visit USPTO

Visit USPTO Page


Outage management algorithm

Techniques and systems are described that assist in predicting, diagnosing, and/or managing an incident in a utility service area. A communication system is provided in the service area to communicate with nodes of the service area. In some instances, the communication system is configured to communicate with nodes of the service area according to a hierarchy of the nodes and/or a physical location of the nodes.

  • Pub Date: 2011/08/02
  • Number: 08774975
  • Owner: Avista Corporation
  • Location: Spokane, US
  • Details: Visit USPTO

Visit USPTO Page


Modular breaching and demolition system

A modular explosive breaching and demolition system comprised of inert light weight plastic assemblies, field custom hand packed or pre-loaded, utilizing for example cast-cure or press loaded explosives. The assemblies can be snapped together to make different geometeric shapes or lines as may be desired, for demolition objectives.

  • Pub Date: 2011/08/02
  • Number: 08365666
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for processing a video for stabilization and retargeting

Methods and systems for processing a video for stabilization and retargeting are described. A recorded video may be stabilized by removing shake introduced in the video, and a video may be retargeted by modifying the video to fit to a different aspect ratio. Constraints can be imposed that require a modified video to contain pixels from the original video and/or to preserve salient regions. In one example, a video may be processed to estimate an original path of a camera that recorded the video, to estimate a new camera path, and to recast the video from the original path to the new camera path. To estimate a new camera path, a virtual crop window can be designated. A difference transformation between the original and new camera path can be applied to the video using the crop window to recast the recorded video from the smooth camera path.

  • Pub Date: 2011/08/02
  • Number: 08531535
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and computer program products for monitoring system calls using safely removable system function table chaining

Provided are methods and computer program products for monitoring system calls in an operating system using safely removable system function table chaining. Methods may include loading a collector application driver providing one or more dispatch functions corresponding to one or more system functions, each dispatch function operable to call a pre-hook function prior to calling a system function, to call the system function, and to call a post-hook function following the call to the system function. A metadata block in pinned kernel memory contains, for each system function, access descriptors to the system function and the pre- and/or post-hook functions for the system function. The dispatch functions are copied into the pinned kernel memory, and the operating system's access descriptors for the system functions are altered to instead point to the corresponding dispatch functions.

  • Pub Date: 2011/08/02
  • Number: 08516509
  • Owner: BlueStripe Software, Inc.
  • Location: Morrisville, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatuses for facilitating execution of applications requiring runtime compilation

Methods and apparatuses are provided for facilitating execution of kernels requiring runtime compilation. A method may include implementing a driver for a framework for handling kernels requiring runtime compilation. The method may further include receiving, by the driver, code for a kernel requiring at least partial runtime compilation for execution using the framework. The method may additionally include obtaining, by the driver, a compiled executable version of the kernel. The obtained compiled executable version of the kernel may not have been locally compiled. The method may also include causing, by the driver, the compiled executable version of the kernel to be provided for execution. Corresponding apparatuses are also provided.

  • Pub Date: 2011/08/02
  • Number: 08762972
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for synthesizing imaging agents, and intermediates thereof

The present invention generally relates to methods and system for the synthesis of imaging agents, and precursors thereof. The methods may exhibit improved yields and may allow for the large-scale synthesis of imaging agents, including imaging agents comprising a radioisotope (e.g., F). Various embodiments of the invention may be useful as sensors, diagnostic tools, and the like. In some cases, methods for evaluating perfusion, including myocardial perfusion, are provided. Synthetic methods of the invention have also been incorporated into an automated synthesis unit to prepare and purify imaging agents that comprise a radioisotope. In some embodiments, the present invention provides a novel methods and systems comprising imaging agent 1, including methods of imaging in a subject comprising administering a composition comprising imaging agent 1 to a subject by injection, infusion, or any other known method, and imaging the area of the subject wherein the event of interest is located.

  • Pub Date: 2011/08/02
  • Number: 08936777
  • Owner: Lantheus Medical Imaging, Inc.
  • Location: North Billerica, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for uploading data into a distributed storage system

A method for uploading an object into a distributed storage system is implemented at a computing device The computing device splits an object into one or more chunks and uploads the one or more chunks into the distributed storage system. For each uploaded chunk, the computing device receives a write token from the distributed storage system, inserts an entry into an extents table of the object for the chunk in accordance with the received write token and the chunk ID, chunk offset, and chunk size of the chunk, generates a digest of the extents table, the digest representing the one or more chunks that the client expects to be within the distributed storage system, and sends the digest of the extents table to the distributed storage system. The distributed storage system is configured to use the digest to determine whether it has each of the one or more client-expected chunks.

  • Pub Date: 2011/08/02
  • Number: 09305069
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for ultrahigh sensitive optical microangiography

Embodiments herein provide an ultrahigh sensitive optical microangiography (OMAG) system that provides high sensitivity to slow flow information, such as that found in blood flow in capillaries, while also providing a relatively low data acquisition time. The system performs a plurality of fast scans (i.e., B-scans) on a fast scan axis, where each fast scan includes a plurality of A-scans. At the same time, the system performs a slow scan (i.e., C-scan), on a slow scan axis, where the slow scan includes the plurality of fast scans. A detector receives the spectral interference signal from the sample to produce a three dimensional (3D) data set. An imaging algorithm is then applied to the 3D data set in the slow scan axis to produce at least one image of the sample. In some embodiments, the imaging algorithm may separate flow information from structural information of the sample.

  • Pub Date: 2011/08/02
  • Number: 09013555
  • Owner: Oregon Health & Science University
  • Location: Portland, US
  • Details: Visit USPTO

Visit USPTO Page


Media content location awareness and decision making

Various embodiments related to the ability to find content for consumption across all endpoint computing devices in a computing system are disclosed. For example, one disclosed embodiment provides a method for presenting content including aggregating endpoint metadata for each endpoint computing device in a computing system and content metadata of content stored on each of a plurality of endpoint computing devices, receiving a request for a content item on a selected endpoint computing device, querying aggregated endpoint metadata and content metadata to find instances of the content item and corresponding endpoint computing device locations, generating a ranked list of instances of the content item based on selection criteria, and selecting an instance of the content item from the ranked list for playback by the selected endpoint computing device.

  • Pub Date: 2011/08/02
  • Number: 08725680
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Immunogenic HPV L2-containing VLPs and related compositions, constructs, and therapeutic methods

The invention provides immunotherapeutic and prophylactic bacteriophage viral-like particle (VLPs) which are useful in the treatment and prevention of human papillomavirus (HPV) infections and related disorders, including cervical cancer and persistent infections associated with HPV. Related compositions (e.g. vaccines), nucleic acid constructs, and therapeutic methods are also provided. VLPs and related compositions of the invention induce high titer antibody responses against HPV L2 and protect against HPV challenge in vivo. VLPs, VLP-containing compositions, and therapeutic methods of the invention induce an immunogenic response against HPV infection, confer immunity against HPV infection, protect against HPV infection, and reduce the likelihood of infection by HPV infection.

  • Pub Date: 2011/08/02
  • Number: 09533057
  • Owner: STC.UNM
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid cloud integrator

A hybrid cloud integrator provides a capability for integrating data processing resources provided as services across a hybrid cloud. The hybrid cloud integrator includes a software framework that provides for installing, configuring, activating, and controlling operation of a number of plug-in software components. The plug-in software components are configured to provide for using data processing resources provided as a service to process a consumer workload.

  • Pub Date: 2011/08/02
  • Number: 09009697
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid cloud integrator plug-in components

Integrating data processing resources across a hybrid cloud includes providing a plug-in software component configured to be installed in a software framework. When the plug-in software component is activated, it may generate an interface for a consumer of data processing resources. Using this interface, the consumer of data processing resources may request the use of data processing resources provided as a service on the hybrid cloud. In response, the plug-in software component may acquire the requested data processing resources via interfaces provided by the various data processing resources. A number of different data processing resources may have different interface requirements. However, the first interface generated by the plug-in software component may provide a single vendor neutral interface for accessing data processing resources on the hybrid cloud by the consumer of data processing resources.

  • Pub Date: 2011/08/02
  • Number: 09063789
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Caching user information in an integrated communication system

An integrated messaging system for performing various types of messaging across different types of networks, including integrated user interfaces and administrator interfaces. Embodiments include a communication server that couples among networks of different types, and an interface module that couples to the communication server. The interface module may be hosted on a messaging server of a network. The interface module pulls various user information from the messaging server, including information relevant to at least the network that includes the messaging server. A cache couples to the communication server and to the interface module to hold information from the communication server and/or the user information pulled from messaging server. The interface module directs a message from the messaging server and/or the cache to at least one device on the networks using the user information.

  • Pub Date: 2011/08/02
  • Number: 08391461
  • Owner: Avaya Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Autonomous humanoid cognitive systems

Disclosed are computer systems with intelligent or autonomous decision systems which include means for determining relevancy, i.e., the threats to and opportunities of the autonomous decision system. Also disclosed are such autonomous decision systems using an efficient ontology to interact sociably with humans, including the use of natural languages and bonding. The desired “whether concrete is included in abstract” computation system is enhanced by the ontology system using categorizing of natural objects using as primitives a set of self tendencies suitable, when hierarchically assigned to objects, to do incremental simulation of “future” situations (including such objects) from a presented situation. Using such primitives and computation system, planning, learning, languaging, etc., are efficiently accomplished.

  • Pub Date: 2011/08/02
  • Number: 08983889
  • Details: Visit USPTO

Visit USPTO Page


Wait for ready state

Automation of actions on a server system (e.g., web server, FTP server) is facilitated by a server system that is ready for actions to be performed upon it. Because there are scenarios when a server system is not in a state to be acted upon (e.g., web page changed due to navigation, script execution, asynchronous request through dynamic web extensions), an automated action needs to be synchronized to when then server system is in a ready state for that action to occur. A wait-for-ready state can be initiated that detects when a server system is ready for a next action.

  • Pub Date: 2011/07/02
  • Number: 08489714
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Multiplexing in an optical transport network (OTN)

In one embodiment, a method includes receiving a plurality of signals at a plurality of ports, each of the signals having a protocol type; mapping each of the signals to one or more time slots of one of a plurality of Low Order Optical Transport Network (OTN) containers; mapping the Low Order OTN containers to a High Order OTN container; mapping the High Order OTN container to a High Order OTN envelope for communication over an OTN; and, in connection with the mapping of the High Order OTN container to the High Order OTN envelope, for each of the signals, inserting into the High Order OTN envelope information identifying the port that the signal was received at, the protocol type of the signal, the Low Order OTN container that the signal was mapped to, and one or more of the time slots that the signal was mapped to.

  • Pub Date: 2011/07/02
  • Number: 08644340
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Modifying search result ranking based on corpus search statistics

Methods, systems, and apparatus, including computer program products, for ranking search results of a search query using corpus search statistics. In one aspect, a method includes determining a first relevance of a first corpus to a search query, determining a second relevance of a second corpus to the search query, determining a measure of relative relevance of the first corpus and the second corpus to the search query, and providing the measure of relative relevance to a ranking engine for ranking of search results for a new search corresponding to the search query.

  • Pub Date: 2011/07/02
  • Number: 08359309
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for in-band provisioning of a device at a closed subscriber group

Methods and apparatuses are provided that facilitate performing in-band provisioning for one or more devices at a restricted group of network nodes. A packet data context related to performing provisioning at the restricted group can be established between a device and a network via a restricted group node. The device can request provisioning at the restricted group using the packet data context, and the network can perform the provisioning. The packet data context can restrict access to allow provisioning related communications while rejecting other communications until provisioning is complete.

  • Pub Date: 2011/07/02
  • Number: 08792392
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Lightweight armor system

The disclosure provides a shock absorbing layer comprised of one or more shock absorbing cells, where a shock absorbing cell is comprised of a cell interior volume containing a plurality of hydrogel particles and a free volume, and where the cell interior volume is surrounded by a containing layer. The containing layer has a permeability such that the hydrogel particles when swollen remain at least partially within the cell interior volume when subjected to a design shock pressure wave, allowing for force relaxation through hydrogel compression response. Additionally, the permeability allows for the flow of exuded free water, further dissipating wave energy. In an embodiment, a plurality of shock absorbing cells is combined with a penetration resistant material to mitigate the transmitted shock wave generated by an elastic precursor wave in the penetration resistant material.

  • Pub Date: 2011/07/02
  • Number: 08381632
  • Owner: The United States of America as represented by the Department of Energy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Internet payment, authentication and loading system using virtual smart card

A system loads, authenticates and uses a virtual smart card for payment of goods and/or services purchased on-line over the Internet. An online purchase and load (OPAL) server includes a virtual smart card data base that has a record of information for each smart card that it represents for a user at the behest of an issuer. The server includes a smart card emulator that emulates a smart card by using the card data base and a hardware security module. The emulator interacts with a pseudo card reader module in the server that imitates a physical card reader. The server also includes a client code module that interacts with the pseudo card reader and a remote payment or load server. A pass-through client terminal presents a user interface and passes information between the OPAL server and a merchant server, and between the OPAL server and a bank server. The Internet provides the routing functionality between the client terminal and the various servers. A merchant advertises goods on a web site. A user uses the client terminal to purchase goods and/or services from the remote merchant server. The payment server processes, confirms and replies to the merchant server. The payment server is also used to authenticate the holder of a virtual card who wishes to redeem loyalty points from a merchant. To load value, the client terminal requests a load from a user account at the bank server. The load server processes, confirms and replies to the bank server.

  • Pub Date: 2011/07/02
  • Number: 08175973
  • Owner: Visa International Service Association
  • Location: Foster City, US
  • Details: Visit USPTO

Visit USPTO Page


Intermediary system for interconnecting multiple IMS networks

An intermediary infrastructure that facilitates the interconnection of multiple IP Multimedia Subsystem (IMS) networks. The interconnections may span one or more of the IMS logical planes Services Plane, Control Plane, and Network or Transport Plane. The intermediary offers among other things a process, routing, and switching complex that is able to among other things process incoming messages including using a comprehensive routing repository to complete message routing operations.

  • Pub Date: 2011/07/02
  • Number: 08161192
  • Owner: Sybase 365, Inc.
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


Fluid-cooled heat sink with improved fin areas and efficiencies for use in cooling various devices

The disclosure provides a fluid-cooled heat sink having a heat transfer base and a plurality of heat transfer fins in thermal communication with the heat transfer base, where the heat transfer base and the heat transfer fins form a central fluid channel through which a forced or free cooling fluid may flow. The heat transfer pins are arranged around the central fluid channel with a flow space provided between adjacent pins, allowing for some portion of the central fluid channel flow to divert through the flow space. The arrangement reduces the pressure drop of the flow through the fins, optimizes average heat transfer coefficients, reduces contact and fin-pin resistances, and reduces the physical footprint of the heat sink in an operating environment.

  • Pub Date: 2011/07/02
  • Number: 09010405
  • Owner: U.S. Department of Energy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Encryption key exchange system and method

The present invention is a computer-implemented key exchange system and methods for improving the usability of encryption technologies such as Public Key Infrastructure (PKI). One aspect of the present invention includes registering users, verifying user identity, and classifying users such that the users may send a communications such that communication recipients can verify the user identity and classification of the communication sender. Another aspect of the present invention includes users initiating relationships with other users, approving the establishment of relationships, and exchanging encryption keys between users after the establishment of a relationship.

  • Pub Date: 2011/07/02
  • Number: 09002018
  • Owner: Sync Up Technologies Corporation
  • Location: Danville, US
  • Details: Visit USPTO

Visit USPTO Page


Diphenyl substituted alkanes as flap inhibitors

Compounds of formula I are useful as anti-atherosclerotic, anti-asthmatic, anti-allergic, anti-inflammatory and cytoprotective agents.

  • Pub Date: 2011/07/02
  • Number: 08729104
  • Owner: Merck Sharp & Dohme Corp.
  • Location: Rahway, US
  • Details: Visit USPTO

Visit USPTO Page


Annotation-based content rankings

Techniques for ranking electronic content items include analyzing annotations made in the content items. Specifically, the number of annotations and the number of people making the annotations can be analyzed to produce a popularity ranking of different content items.

  • Pub Date: 2011/07/02
  • Number: 08954447
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for energy management and device automation system

An integrated energy management and device automation system for managing a premises electrical system having a plurality of electrical circuits. The energy management and device automation system comprises a central controller. The central controller is configured to receive, over the premises electrical system, energy usage data from a plurality of modules and module originated notifications that a module has been connected to the premises electrical system. The central controller is configured to receive and send, over the premises electrical system, messages for device automation and control from a plurality of modules. The energy management system additionally comprises a plurality of modules. Each module comprises a processor, a powerline interface operatively connected to the processor and to one of the plurality of electrical circuits and a sensor operatively connected to the electrical circuit so that the sensor can sense at least one of current and voltage. Each module is configured to collect data relating to energy usage using the sensor and to transmit the data to the central controller. The central controller uses energy usage data to indentify, profile and analysis connected devices and their usage.

  • Pub Date: 2011/04/02
  • Number: 08682491
  • Owner: Varetika International LLLP
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Symbolic execution and test generation for GPU programs

In particular embodiments, a method includes accessing bytecode generated by a compiler from a software program for execution by a particular processing unit; accessing configuration information describing one or more aspects of the particular processing unit; symbolically executing the bytecode with the configuration information; and, based on the symbolic execution, generating one or more results conveying a functional correctness of the software program with respect to the particular processing unit for communication to a user and generating one or more test cases for the software program for communication to a user.

  • Pub Date: 2011/04/02
  • Number: 08595701
  • Owner: Fujitsu Limited
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Ranking and displaying appraiser-chosen comparables against model-chosen comparables

Ranking and displaying comparable properties entails receiving appraisal information comprising a subject property and appraiser-chosen comparable properties corresponding to the subject property. Property data corresponding to a geographical area is accessed, in support of determining model-chosen comparable properties based upon the appropriateness of each of the comparable properties as comparables for the subject property. A map image is displayed for the geographical area, along with indicators on the map image indicative of the subject property, at least one of the appraiser-chosen comparable properties, and at least one of the model-chosen comparable properties.

  • Pub Date: 2011/04/02
  • Number: 09449022
  • Owner: Fannie Mae
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method for processing telephony sessions of a network

A method for processing telephony sessions of a network including at least one application server and a call router, the method including the steps of assigning a primary Uniform Resource Identifier (URI) and at least a secondary URI to an application; mapping a telephony session to the primary URI; communicating with the application server designated by the primary URI using an application layer protocol; receiving telephony instructions from the application server and processing the telephony instructions with the call router; detecting an application event; and upon detecting the application event, communicating with the application server designated by the secondary URI.

  • Pub Date: 2011/04/02
  • Number: 08649268
  • Owner: Twilio, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Method and device for propagating session management events

A method for propagating session management events between a plurality of machines forming a machine cluster includes generating, with a session management user interface, a session management event on a first machine of the machine cluster; detecting, with an installment of the interface, the generated event; sending, from the installment to a first security service related to the first machine, a set of specific information that is related to the detected event; determining, with the first security service, a set of target machines; sending the specific information from the first security service to target security services that are related to the target machines; and processing the specific information at each target security service of the target machines so as to execute, on each target machine that has received the specific information, the session management event generated on the first machine.

  • Pub Date: 2011/04/02
  • Number: 08893245
  • Owner: Evidian
  • Location: Les Clayes sous Bois, FR
  • Details: Visit USPTO

Visit USPTO Page


Automated web frontend sharding

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for requesting handling web applications provided from a server. A bootstrap object is received from the server. The bootstrap object is independent of the requested web application and includes default settings for a plurality of different web applications. An application configuration object is also received from the server. The application configuration object is specific to the requested web application and includes a plurality of plugin handles. The bootstrap object loads the application configuration object, and identifies, based on the plugin handles, a first plugin for the requested web application. The first plugin is requested, and upon receipt the from the server the first plugin is loaded in a user interface. The first plugin exposes an application programming interface (API) of the first plugin to the bootstrap object.

  • Pub Date: 2011/04/02
  • Number: 08533336
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Automated test tool interface

An automated test tool interface is described. A developer of a reusable web component provides an interface for obtaining an accurate identification of a root element of a component and any sub elements within the root element on a web page. An automated test framework uses this interface when recording automated tests to obtain a stable identification of the element that is independent of the rendering of the component on the web page. When the automated test is played back, the test framework again uses the interface to convert the stable identification of the element to a form that is dependent on the rendering of the component on the web page. Thus, changes in the rendering of a component will no longer cause an automated test tool to fail, as element identification in the testing framework is no longer tied to the specific rendering of the web page.

  • Pub Date: 2011/04/02
  • Number: 08924934
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Scalable cloud computing

A scalable cloud infrastructure serves two or more customers, where each customer is associated with at least one unit of virtual resources. The virtual resources are established by apportioning physical resources in the cloud infrastructure that are partitioned into pods within one or more zones in a scalable manner. Each pod comprises a strongly connected discrete set of physical resources in a zone. Additionally, the cloud infrastructure establishes one or more management server clusters each comprising one or more management servers. Each management server is configured for allocating the units of virtual resources to an account associated with each customer. The traffic from two or more customer accounts within the scalable cloud infrastructure is isolated and segmented.

  • Pub Date: 2011/03/02
  • Number: 08650299
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Reperfusion protection in resuscitation

An apparatus and method for resuscitating a patient suffering from cardiac arrest or another condition in which normal circulation has been interrupted. A ventilator is used for delivering a gas mixture to the patient. The ventilator is configured to adjust the partial pressure of CO2 to one or more partial pressures high enough to slow expiration of CO2 from the patient's lungs and thereby maintain a reduced pH in the patient's tissues for a period of time following return of spontaneous circulation.

  • Pub Date: 2011/03/02
  • Number: 09457165
  • Owner: ZOLL Medical Corporation
  • Location: Chelmsford, US
  • Details: Visit USPTO

Visit USPTO Page


Network operating system and method for managing a changing entity in a computer system

A system and method for a network operating system including a complex data medium that enables the continuous reconciliation of the collaborative information process and product. The system generally increases productivity by enabling a network dynamic among knowledge workers. The system and method generally unifies e-mail and shared file management, synchronous and asynchronous collaboration, serial and parallel work flow, top-down and bottom-up collaboration, and information lifecycle management.

  • Pub Date: 2011/03/02
  • Number: 08209286
  • Owner: Coral Networks, Inc.
  • Location: Arlington, US
  • Details: Visit USPTO

Visit USPTO Page


Network fragmentation and virtual machine migration in a scalable cloud computing environment

A scalable cloud infrastructure serves two or more customers, where each customer is associated with at least one unit of virtual resources. The virtual resources are established by apportioning physical resources in the cloud infrastructure that are partitioned into pods within one or more zones in a scalable manner. Additionally, the cloud infrastructure establishes one or more management server clusters each comprising one or more management servers. The two or more customers create a number of virtual machines within pods in a zone. Due to the scalability of the cloud infrastructure, customer virtual machines may exist in non optimal locations within the zone. A method to migrate virtual machines and defragment customer networks is devised to optimally manage network traffic and data communication in a scaled cloud infrastructure.

  • Pub Date: 2011/03/02
  • Number: 08874749
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and system for executing a program in multiple execution environments

A method and a medium are disclosed for executing a technical computing program in parallel in multiple execution environments. A program is invoked for execution in a first execution environment and from the invocation the program is executed in the first execution environment and one or more additional execution environments to provide for parallel execution of the program. New constructs in a technical computing programming language are disclosed for parallel programming of a technical computing program for execution in multiple execution environments. It is also further disclosed a system and method for changing the mode of operation of an execution environment from a sequential mode to a parallel mode of operation and vice-versa.

  • Pub Date: 2011/03/02
  • Number: 08856796
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for deploying a wireless network

A method for deploying a wireless network in accordance with particular embodiments includes deploying one or more base stations configured to provide wireless connections between the one or more base stations and one or more endpoints. The method also includes deploying one or more remote transceivers configured to provide wireless connections between the one or more remote transceivers and one or more endpoints. The method further includes modifying at least one base station of the one or more base stations. The modified base station is configured to control the one or more remote transceivers. The method additionally includes modifying at least one remote transceiver of the one or more remote transceivers. The modified remote transceiver is configured to control the at least one remote transceiver without receiving control information from the at least one base station.

  • Pub Date: 2011/03/02
  • Number: 08792933
  • Owner: Fujitsu Limited
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Highly selective 5-HT(2C) receptor agonists that show anti-psychotic effects with antagonist activity at the 5-HT(2B) receptor

Highly selective 5-HT(2C) receptor agonists receptors are disclosed. The 5-HT(2C) receptor agonists are used in the treatments of disease and conditions wherein modulation of 5-HT(2C) receptors provides a benefit, such as obesity and psychiatric disorders.

  • Pub Date: 2011/03/02
  • Number: 08492591
  • Owner: The University of North Carolina at Chapel Hikll
  • Location: Chapel Hill, US
  • Details: Visit USPTO

Visit USPTO Page


Event and state management in a scalable cloud computing environment

A scalable cloud infrastructure serves two or more customers, where each customer is associated with at least one unit of virtual resources. The virtual resources are established by apportioning physical resources in the cloud infrastructure that are partitioned into pods within one or more zones in a scalable manner. Additionally, the cloud infrastructure establishes one or more management server clusters each comprising one or more management servers. The two or more customers create a number of virtual machines within pods in one or more zones. As customers interact primarily with the management server cluster to manage their virtual machine, a state and event handling method is devised to centralize the management of a potentially vast number of customer and supporting system virtual machines.

  • Pub Date: 2011/03/02
  • Number: 08856319
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


User input auto-completion

Methods and computer program product relate to user input auto-completion. The methods and product are executable on a processing device in a computing system environment so as to provide an auto-completion scheme with enhanced capabilities that improve user efficiency when performing a task.

  • Pub Date: 2011/02/02
  • Number: 08732660
  • Owner: Novell, Inc.
  • Location: Provo, US
  • Details: Visit USPTO

Visit USPTO Page


Silicon carbide switching devices including P-type channels

Methods of forming a p-channel MOS device in silicon carbide include forming an n-type well in a silicon carbide layer, and implanting p-type dopant ions to form a p-type region in the n-type well at a surface of the silicon carbide layer and at least partially defining a channel region in the n-type well adjacent the p-type region. A threshold adjustment region is formed in the channel region. The implanted ions are annealed in an inert atmosphere at a temperature greater than 1650° C. A gate oxide layer is formed on the channel region, and a gate is formed on the gate oxide layer. A silicon carbide-based transistor includes a silicon carbide layer, an n-type well in the silicon carbide layer, and a p-type region in the n-type well at a surface of the silicon carbide layer and at least partially defining a channel region in the n-type well adjacent the p-type region. A threshold adjustment region is in the channel region and includes p-type dopants at a dopant concentration of about 1×10cmto about 5×10cm. The transistor further includes a gate oxide layer on the channel region, and a gate on the gate oxide layer. The transistor may exhibit a hole mobility in the channel region in excess of 5 cm/V-s at a gate voltage of −25V.

  • Pub Date: 2011/02/02
  • Number: 09552997
  • Owner: Cree, Inc.
  • Location: Durham, US
  • Details: Visit USPTO

Visit USPTO Page


Hibernate mode for chat service

Methods, apparatuses and systems directed to hibernating a client of an instant messaging service. A user wishing to conserve battery life and connection overhead in a mobile device may transmit a hibernate command to a chat server. Although the user's connection is torn down, the user will still maintain a presence on the instant messaging service and be able to receive messages.

  • Pub Date: 2011/02/02
  • Number: 09277502
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Extending data records for dynamic data and selective acceptance based on hardware profile

A system, method and data structure for processing basic client application data types to add thereto extension types and priority levels adapted for use by each of a plurality of set top box classes.

  • Pub Date: 2011/02/02
  • Number: 08788534
  • Owner: TVWorks, LLC
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for modeling and optimizing the performance of transportation networks

A method and system are provided for modeling and optimizing the performance of transportation networks, e.g. for traffic signal retiming. The modeling and optimization may be implemented by obtaining a video signal from a camera at a first intersection; processing data from the video signal to determine at least one value indicative of a corresponding traffic flow through the first intersection; sending the at least one value to a remote processing entity via a wireless network to enable the remote processing entity to update a model of the transportation network, the transportation network comprising the first intersection and at least a second intersection; receiving from the remote processing entity, an instruction for a controller at the first intersection, the instruction having been determined from an update of the model based on data from at least the second intersection; and having the instruction implemented by the controller at the first intersection to optimize at least a portion of the transportation network.

  • Pub Date: 2011/01/02
  • Number: 08666643
  • Owner: Miovision Technologies Incorporated
  • Location: Kitchener, CA
  • Details: Visit USPTO

Visit USPTO Page


Network topologies for energy efficient networks

One embodiment receives at a first node in at least a portion of a network a routing table, the portion of the network comprising the first node and one or more second nodes, the routing table specifying the immediate neighbor that provides each of the best paths in the portion of the network based on a total cost; using the routing table, determines at the first node every second node that is necessary for the first node to reach all edges of the network, the second nodes that are necessary for the first node to reach all edges of the network comprising an active set for the first node; and sends a message from the first node to every second node to facilitate determining whether to shut down the second node.

  • Pub Date: 2011/01/02
  • Number: 09124449
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile vertical missile launcher

A mobile terrestrial vertical missile launch system is provided for relocatable ballistic missile deployment. The system is connectable to a transport truck and includes a trailer, a pivotable canister, a plurality of stabilizing legs, and an equipment module. The trailer has a hitch for connecting to the truck, a base for supporting wheels for road travel, and a flatbed platform having a transverse hinge. The canister contains launcher for at least one missile and is configurable by rotation at the hinge for disposal in either a longitudinal position for stowage or an erected position for deployment. The stabilizing legs are disposed along a periphery of the trailer. The legs can be disposed in one of an elevated position for stowage and a retarded position for ground engagement. The equipment container supplies electrical power, environmental conditioning, tracking, communication and control for the missile.

  • Pub Date: 2011/01/02
  • Number: 08266999
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for installing applications

A method for installing an application according to an exemplary embodiment downloads an application purchased by a client and installs the application in a terminal in an asynchronous manner. The method includes transmitting a request to download at least one application to the server, downloading an application from the server in response to the request to download at least one application and storing the downloaded application, and installing the stored application in the terminal in an order of completion of downloading of the application.

  • Pub Date: 2011/01/02
  • Number: 08935690
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Yeongtong-gu, Suwon-si, Gyeonggi-do, KR
  • Details: Visit USPTO

Visit USPTO Page


Enterprise content management federation and integration system

An enterprise content management federation and integration system integrates a plurality of applications and federates information seamlessly by receiving, by a composite system, a request from a client system. The system then translates, by a manager system, the request from the client system. The manager system performs one or more high level validations and retrieves information from a mapping stored by an ontology modeling system, a plurality of content types, repositories, actions and object types based at least in part on a plurality of attributes including one or more metadata models or attribute models. The manager system then invokes one or more composites based at least in part on the request from the client system and some or all the information retrieved from the mapping.

  • Pub Date: 2011/01/02
  • Number: 08812544
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Enhanced organization and automatic navigation of display screens facilitating automation control

The disclosed subject matter comprises an enhanced screen organizer component (ESOC) that can efficiently control organization and presentation of desired screens, which relate to an industrial control system, to a user. At design time, a designer employs the ESOC to select and organize one or more screens for a project relating to a control system, create and organize screen folders that can contain desired folders or screens in a hierarchical fashion, select a home screen or favorite screens, respectively, for the operator, role or group, wherein a home screen can be a screen a user views when authenticated into a terminal or the screen the user can be returned to in response to selection of a home control. During run time, the user can access desired screens, and use context menus to select a home screen, favorite screens, or other screens, in accordance with user access rights.

  • Pub Date: 2011/01/02
  • Number: 08566923
  • Owner: Rockwell Automation Technologies, Inc.
  • Location: Mayfield Heights, US
  • Details: Visit USPTO

Visit USPTO Page


Vented armor V structure

An armor structure for a vehicle underbody. The armor structure includes an inner plate that is mounted proximate to the vehicle underbody, the inner plate having a plurality of first openings; and an outer plate that is mounted distal to the vehicle underbody, the outer plate having a plurality of second openings. The inner plate and the outer plate are substantially parallel and separated by a spacing. The inner plate and the outer plate each have substantially equal V bends at an obtuse angle, and the V bends in the inner plate and the outer plate are aligned. The first openings and the second openings are (i) aligned across the spacing from each other, and (ii) substantially equal in area. When an underbody blast event is encountered by the vehicle, the outer plate is forced towards, and substantially against the inner plate such that there is no longer fluid communication through the first openings.

  • Pub Date: 2011/31/01
  • Number: 08424443
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for custom segmentation for streaming video

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for segmenting video. A system configured to practice the method determines a total duration of a video asset. The system identifies an optimal streaming chunk duration and a minimum streaming chunk duration. Then the system segments the video asset into a set of chunks, wherein at least one of a final chunk and a penultimate chunk is less than the optimal streaming chunk duration and greater than the minimum streaming chunk duration, and wherein each remaining chunk is of the optimal streaming chunk duration. The system can segment the video asset based on keyframes or codecs. The system can optionally compile a video manifest file, such as an m3u8 file, containing pointers to each chunk in the set of chunks. Then the system can optionally stream the video asset to a video playback device based on the video manifest file.

  • Pub Date: 2011/31/01
  • Number: 08583818
  • Owner: CBS Interactive Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for automatic extraction of power intent from custom analog/custom digital/mixed signal schematic designs

A method of producing a hierarchical power information structure for a circuit design, the method comprising traversing a circuit design hierarchy from a top design level to a bottom design level to identify any intermediate design levels, associating identified power nets with ground nets to produce one or more power domains, producing one or more power domains using the identified power nets and ground nets, identifying an instance of one or more special cells that are associated with a power related property and creating constructs for the special cells in the hierarchical power information structure, generating power rules for the intermediate level design using the special cell constructs, mapping higher design level power domains to lower design level power domains within the intermediate design level, and storing the power domains and power rules as power intent within an information structure associated with a schematic for the intermediate level design.

  • Pub Date: 2011/31/01
  • Number: 08407635
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Search behavior based communication forums

One or more computing devices may be configured to determine an association between at least a first user and a second user based at least on search behavior of the first user and/or the second user. Responsive to the determining, the one or more computing devices may enable a communication forum between the first user and the second user.

  • Pub Date: 2011/31/01
  • Number: 08762405
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Parallel serialization of request processing

A plurality of servers configured to receive a plurality of requests associated with a plurality of byte sequences are described herein. The requests for each byte sequence are received by a single one of the servers. Each server is further configured to serially process the requests it receives while the other servers also perform serial processing of requests in parallel with the server. Also, the requests for each byte sequence are transmitted to the single one of the servers by a plurality of clients, each client independently identifying the single one of the servers for the byte sequence based on system metadata.

  • Pub Date: 2011/31/01
  • Number: 08996611
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Operations management using communications and collaboration platform

A collaboration service operation method provides an efficient and flexible method for operating services implemented across multiple systems. In particular, the method includes determining a change in a master record, and determining the nature of the change. Based on the nature of the change, the method further determines services to be implemented according to business rules and also determines to which systems the services will be implemented.

  • Pub Date: 2011/31/01
  • Number: 08566397
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for encoding the maximum resolution data level for a quadtree

A method and system for searching for data covered by nodes in a quadtree are disclosed. Nodes at a selected level of the quadtree are encoded with an index. The index nodes store data related to the level of descendants and ancestors of each index node. To search for data covered by a particular desired node, the index node ancestor or descendant of the desired node is determined. Based on the data in the index node, the desired node can be located without a full traversal of the quadtree. The quadtree nodes store elevation data for points on the Earth.

  • Pub Date: 2011/31/01
  • Number: 08856184
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing authentication and encryption services by a software as a service platform

An extensible servicing hosting platform is provided that supports the design, build and concurrent deployment of multiple web accessible services on a services hosting platform. The services hosting platform comprises a services hosting framework capable of hosting multiple service applications, each of which may be shared by multiple tenants that each customize their use of a particular application service by extending the application service to exploit run time platform services within a service execution pipeline. The services hosting framework may easily be leveraged by applications to decrease the time associated with developing, deploying and maintaining high quality services in a cost effective manner.

  • Pub Date: 2011/31/01
  • Number: 08321921
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Media playback control

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for performing an action during playback based on a media manifest file. A system, such as a media player, configured to practice the method receives a media manifest, extracts, from the media manifest, a list of media chunks and at least one tag associated with the list of media chunks. The list of media chunks can describe two or more separate media assets. Then the system parses the at least one tag to identify an action to perform during playback and a playback position to perform the action. The system retrieves, for playback, at least one media chunk associated with the playback position from the list of media chunks, and, during playback of the at least one media chunk and at the playback position, performs the action. Modifying the media playback control can include temporarily disabling a media playback control.

  • Pub Date: 2011/31/01
  • Number: 09049494
  • Owner: CBS Interactive, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent content discovery for content consumers

Embodiments of the present invention provide a method, system and computer program product for intelligent content discovery for content consumers in the global Internet. In an embodiment of the invention, a method for intelligent content discovery for content consumers includes parsing a list of previously viewed content in a content browser executing in memory of a computer to identify different content sources for the previously viewed content. The method also includes directing crawling of the content sources over a computer communications network to retrieve updated content from the content sources. The method yet further includes filtering the updated content into a subset of updated content according to at least one parameter corresponding to one of an end user profile of an end user and an end user preference of the end user. Finally, the method includes presenting a list of the subset of updated content in the content browser.

  • Pub Date: 2011/31/01
  • Number: 08612419
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Determining the vulnerability of computer software applications to privilege-escalation attacks

Determining the vulnerability of computer software applications to privilege-escalation attacks, such as where an instruction classifier is configured to be used for identifying a candidate access-restricted area of the instructions of a computer software application, and a static analyzer is configured to statically analyze the candidate access-restricted area to determine if there is a conditional instruction that controls execution flow into the candidate access-restricted area, perform static analysis to determine if the conditional instruction is dependent on a data source within the computer software application, and designate the candidate access-restricted area as vulnerable to privilege-escalation attacks absent either of the conditional instruction and the date source.

  • Pub Date: 2011/31/01
  • Number: 08914890
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Database access unblocker

Embodiments of the invention provide for a centralized system for database access management. In specific embodiments, the centralized system provides for granting users temporal access to databases for a prescribed period of time, such that upon expiration of the time period the user is automatically blocked (i.e., added back to the blacklist) from accessing the database. Moreover, as a result of centralized management, reporting and auditing of actions related to database access management are greatly improved in that all actions are recorded and a historical database of such actions is available to system users. In addition, the centralized system provides for automatic notification to predetermined stakeholders based on occurrence of predetermined system actions, such as blocking a user from database access, unblocking a user from database access (i.e., granting access) or the like.

  • Pub Date: 2011/31/01
  • Number: 08606817
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Data migration using communications and collaboration platform

Data migration using communications and collaboration platform provides an efficient and flexible method for migrating data from an existing system to a new system. In particular, the method includes extracting data, cleansing the extracted data based on a master record, receiving approval for the cleansed data, and migrating the approved data into the new system.

  • Pub Date: 2011/31/01
  • Number: 08380661
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Cloud data persistence engine

Various cloud data persistence systems and methods are described. In some embodiments, a client may request a data object from a server. This data object may contain a link to a media asset and other information linked to the video file, such as a title and duration. This media asset may be stored in a different location. If this first server does not have the data object stored locally, it may contact a second server to determine if it has the data object stored. If the second server does not have the data object stored, it may contact a data object origin server, which may have all existing data objects stored. This data object origin server may then send the data object to the second server, which may in turn transmit the data object to the first server. The first server may then transmit the data object to the client.

  • Pub Date: 2011/31/01
  • Number: 08280987
  • Owner: Unicorn Media, Inc.
  • Location: Tempe, US
  • Details: Visit USPTO

Visit USPTO Page


Caller identification using social network information

In one embodiment, a social networking system determines a user identifier of a caller placing a call to a receiving user based on the call's phone number, accesses one or more data stores for information associated with the caller, and present to the receiving user the information associated with the caller.

  • Pub Date: 2011/31/01
  • Number: 09432502
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Associated with abnormal application-specific activity monitoring in a computing network

Embodiments herein disclosed provide for computer network security and, more specifically, monitoring application-based access to secure data and monitoring predetermined actions conducted on applications to determine abnormal access or abnormal actions. Specific embodiments of the invention provide for improved database which implements time period-structured tables and file directories. Such structuring of the database provides for automated data purging, backing-up of data and data recovery. Additional embodiments provide for tracking data attributes related to the monitored data, such as the quality of the monitored data, the quality of the monitored data and the origin of the monitored data. In addition, embodiments provide for validating the source of the monitored data to assure that data is received from a valid application.

  • Pub Date: 2011/31/01
  • Number: 08745759
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for enabling inter-sequencer communication following lock competition and accelerator registration

In one embodiment, the present invention includes a method for communicating an assertion signal from a first instruction sequencer to a plurality of accelerators coupled to the first instruction sequencer, detecting the assertion signal in the accelerators and communicating a request for a lock, and registering an accelerator that achieves the lock by communication of a registration message for the accelerator to the first instruction sequencer. Other embodiments are described and claimed.

  • Pub Date: 2011/31/01
  • Number: 08380963
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


4,5-dihydro-6-oxa-3-thia-1-aza-benzo[e]azulene compounds

  • Pub Date: 2011/31/01
  • Number: 08399690
  • Owner: F. Hoffman-La Roche Inc.
  • Location: Nutley, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and media for managing ambient adaptability of web applications and web services

Systems, methods, and media for managing web content. Methods may include the steps of providing web content associable with a web server, evaluating ambient data received from the web server and ambient data from at least one third party source, storing the ambient data in a database, selectively modifying content included in the web content based upon the ambient data, and providing the modified web content to the web server.

  • Pub Date: 2011/29/01
  • Number: 09547626
  • Owner: SDL plc
  • Location: Maidenhead, GB
  • Details: Visit USPTO

Visit USPTO Page


Data backup system including a data protection component

A data backup system is provided for backing up data files from a data source and for securing those data files against accidental modification or deletion. The system comprises storage and a data protection component that includes an application programming interface defining a command set. The system can also comprise a backup application that is configured to use the commands of the command set. The data protection component allows applications that use the commands of the command set, such as the backup application, to access the storage of the system. The data protection component prevents operating systems and applications that do not use the commands of the command set from accessing the storage. The data protection function of the data protection component can optionally be disabled to allow open access to the storage.

  • Pub Date: 2011/29/01
  • Number: 08195445
  • Owner: Storage Appliance Corporation
  • Location: Richmond Hill, CA
  • Details: Visit USPTO

Visit USPTO Page


Volatile imidazoles and group 2 imidazole based metal precursors

Synthesis of the novel compounds and their use to form BST films is also contemplated.

  • Pub Date: 2011/28/01
  • Number: 08703103
  • Owner: Air Products and Chemicals, Inc.
  • Location: Allentown, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, apparatus, and methods of a solar energy grid integrated system with energy storage appliance

A system, method, and apparatus for integrating distributed energy sources, energy storage, and balance of system components into a single device with systems and control for monitoring, measuring, and conserving power generated on the premise. A data processing gateway, hybrid inverter/converter and charge controller provide flexibility in the multi-voltages, output capacities, and photovoltaic array sizes coupled to the apparatus and system. The system and apparatus may be used in various commercial and residential applications. A user may store energy provided by one or more alternate energy sources coupled to an energy storage module. The system provides a compact enclosure that fits within a utility workspace and enclosures that can be mechanically coupled together, placed in parallel or in a series. A method, computer implemented apparatus, computer readable medium, computer implemented method and a system for monitoring energy consumption, selling energy back to a utility company and peak shaving are also provided.

  • Pub Date: 2011/28/01
  • Number: 08463449
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program product for validating one or more metadata objects

In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multi-tenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.

  • Pub Date: 2011/28/01
  • Number: 08799233
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program product for implementing at least one policy for facilitating communication among a plurality of entities

Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data corresponding thereto governing interaction with the entity via the interoperability network. A message is transmitted from a first one of the entities to a second one of the entities. The first entity has first policy data corresponding thereto and the second entity has second policy data corresponding thereto. The transmitted message was handled in the network according to combined policy data representing a combination of the first and second policy data.

  • Pub Date: 2011/28/01
  • Number: 08522306
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Searching sensor data

In particular embodiments, a method includes receiving a query for particular sensor data among multiple sensor data from multiple sensors. The plurality of sensor data has been indexed according to a multi-dimensional array. One or more first ones of the dimensions include time, and one or more second ones of the dimensions include one or more pre-determined sensor-data attributes. The method includes translating the query to correspond to the indexing of the plurality of sensor data. The translated query includes one or more values for one or more of the dimensions of the multi-dimensional array. The method includes communicating the translated query to search among the plurality of sensor data according to its indexing to identify the particular sensor data.

  • Pub Date: 2011/28/01
  • Number: 09171079
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Re-establishing push notification channels via user identifiers

Embodiments enable recovery of push notification channels via session information associated with user identifiers. A proxy service creates session information describing push notification channels (e.g., subscriptions) for a user and associates the session information with a user identifier. The session information is stored in a cloud service or other storage area separate from the proxy service. After failure of a user computing device or the proxy service, the session information is obtained via the user identifiers and the push notification channels are re-created with the session information. In some embodiments, the proxy service enables delivery of the same notification to multiple computing devices associated with the user identifier.

  • Pub Date: 2011/28/01
  • Number: 08713365
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method, computer system, and physical computer storage medium for organizing data into data structures

Methods, computer systems, and physical computer storage medium for organizing data are provided. A method includes monitoring usage of the data, detecting a pattern in the usage of the data, and assigning a first concrete implementation associated with a first data structure to the data, based, in part, on the detected pattern of usage of the data. The method also includes identifying a change in the pattern of usage of the data, after the step of assigning and switching the first concrete implementation associated with the first data structure to a second concrete implementation, based, in part, on the change in the pattern of usage.

  • Pub Date: 2011/28/01
  • Number: 08732211
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for network management

The invention relates to a method and an apparatus for managing network infrastructure. The apparatus comprises a binary web service interface () to communicate with resource nodes operationally connected to the apparatus using a binary web service; a resource directory () to store a registry of the resource nodes; a data cache () for caching information related to resource nodes; and an interface () for managing resource nodes, configured to receive Simple Network Management Protocol requests regarding the resource nodes, communicate with the binary web service interface () and respond to the request on the basis of the communication with the binary web service interface; and a controller () to coordinate the operation of the apparatus.

  • Pub Date: 2011/28/01
  • Number: 08898268
  • Owner: Arm Finland Oy
  • Location: Oulu, FI
  • Details: Visit USPTO

Visit USPTO Page


Meta-directory control and evaluation of events

Techniques for meta-directory control and evaluation of events are provided. Disparate events from heterogeneous processing environments are collected as the events are produced by resources within the processing environments. The events are filtered and organized into taxonomies. Next the filtered and organized events are assigned to nodes of a Meta directory, each node defining a relationship between two or more of the resources and policy is applied. Finally, additional policy is evaluated in view of the events and their node assignments with other events, and one or more automated actions are then taken.

  • Pub Date: 2011/28/01
  • Number: 08495426
  • Owner: Novell, Inc.
  • Location: Provo, US
  • Details: Visit USPTO

Visit USPTO Page


Knowledge discovery tool relationship generation

A system for managing a knowledge model defining a plurality of entities is provided. The system includes an extraction tool for extracting data items from disparate data sources that determines if the data item has been previously integrated into the knowledge model. The system also includes an integration tool for integrating the data item into the knowledge model that integrates the data item into the knowledge model only if the data item has not been previously integrated into the knowledge model. Additionally, a relationship tool for identifying, automatically, a plurality of relationships between the plurality of entities may also be provided. The system may also include a data visualization tool for presenting the plurality of entities and the plurality of relationships.

  • Pub Date: 2011/28/01
  • Number: 08660977
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Intelligent remote device

An intelligent remote device equipped with a security token operatively coupled thereto is processing communications with a security token enabled computer system over a wireless private network. The intelligent remote device is adapted to emulate a local security device peripheral connected to the computer system. Multiple computer systems may be authenticated to using the intelligent remote device. Additionally, various secure communications connections mechanisms are described which are intended to augment existing security protocols available using wireless network equipment. Authentication of a user supplied critical security parameter is performed by the security token. The critical security parameter may be provided locally via the intelligent remote device or received from the wireless network and routed to the security token. Aural, visual or vibratory feedback may be provided to the user to signal a successful authentication transaction.

  • Pub Date: 2011/28/01
  • Number: 08200195
  • Owner: Activcard Ireland, Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Indexing sensor data

In particular embodiments, a method includes, from an indexer in a sensor network, accessing a set of sensor data that includes sensor data aggregated together from sensors in the sensor network, one or more time stamps for the sensor data, and metadata for the sensor data identifying one or more pre-determined attributes of the sensor data. The method includes, at the indexer, generating an index of the set of sensor data according to a multi-dimensional array configured for querying of the set of sensor data along with a plurality of other sets of sensor data. One or more first ones of the dimensions of the multi-dimensional array include time, and one or more second ones of the dimensions of the multi-dimensional array include one or more of the pre-determined sensor-data attributes. The method includes, from the indexer, communicating the index of the set of sensor data for use in responding to one or more queries of the set of sensor data along with a plurality of other sets of sensor data.

  • Pub Date: 2011/28/01
  • Number: 09275093
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic web services system and method

A Dynamic Web Service server may facilitate custom Enterprise Application interface development with little or no developer input by dynamically creating a web service for performing a particular transaction according to a transaction map. An Enterprise Application client device may create a transaction map by “recording” a transaction between an Enterprise Application client and an Enterprise Application server and mapping transaction fields to a custom interface generated to collect data for re-performing the recorded transaction. The Enterprise Application client device may call the dynamic web service, and the Dynamic Web Service server may then perform the recorded transaction using input data collected in the custom interface.

  • Pub Date: 2011/28/01
  • Number: 08701159
  • Owner: Winshuttle, LLC
  • Location: Bothell, US
  • Details: Visit USPTO

Visit USPTO Page


Discovery of candidate biomarkers of in vivo apoptosis by global profiling of caspase cleavage sites

The present invention relates to the discovery of novel biomarkers of in vivo apoptosis based on a large number of caspase-like cleavage sites. These biomarkers are useful for detection and quantification of apoptosis in a biological sample. The invention also provides synthetic peptides and proteins corresponding to neo-epitopes created by proteolytic processing of these cleavage sites. The synthetic peptides can be used as standards to enable identification and quantitation of these biomarkers using mass spectrometry. The synthetic proteins can be used to generate antibodies and other binding reagents specific for these biomarkers. Methods for detecting apoptosis as well as for diagnosing or for providing a prognosis for a disease or disease state characterized by apoptosis are also provided herein. Finally, the invention provides compositions and kits for performing the methods of the invention.

  • Pub Date: 2011/28/01
  • Number: 09493522
  • Owner: THE REGENTS OF THE UNIVERSITY OF CALIFORNIA
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Data and event synchronization across distributed user interface modules

A computer includes, among other things, local modules contained within a module container of a same application; a message producer unit to communicate with a data server over the i/o interface; a message consumer unit configured to communicate with the data server over the i/o interface; and a local event manager unit. There is a pre-defined sequence of processing events between the local event manager unit, the local modules within the same application of the same module container, remote modules, the message producer unit, and the message consumer unit.

  • Pub Date: 2011/28/01
  • Number: 08447820
  • Owner: Decision Lens, Inc.
  • Location: Arlington, US
  • Details: Visit USPTO

Visit USPTO Page


Custom web services data link layer

A data interface efficiently transports, manages, and provides data transfer. The data transfer may happen between a data storage layer and a presentation layer, as examples. The presentation layers may be graphical user interfaces that display or report complex data sets, with the data storage layer providing the source data for the presentation layers. The data interface implements a data link layer that efficiently caches, stores, and locates query results, while simultaneously handling security. The data link layer may include load balancing, efficient cache refresh, and other features.

  • Pub Date: 2011/28/01
  • Number: 08655917
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Configuration console for messaging middleware

A method is provided comprising a server reading a first plurality of message queue objects associated with a first application transitioning from a first environment, reading a second plurality of objects associated with a baseline, and determining that a first time stamp associated with a first object in the first plurality is more recent than a second time stamp associated with the corresponding first object in the second plurality. The server reads approved changes, determines approval of the change to the first object, compares file names of objects in the first plurality with those of objects associated with the baseline, and determines that a name of a second object in the first plurality does not correspond to an object in the second plurality. The server determines that the placement of the second object in the first application is not approved, provides notification of need for approval and transitions the application.

  • Pub Date: 2011/28/01
  • Number: 08347315
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Bypass mechanism for virtual computing infrastructures

In accordance with one embodiment of the present disclosure, a system includes one or more computer systems including a memory, one or more processors, and a bypass switch with an open position and a closed position. The one or more computer systems further include computer-executable program code. The computer-executable program code includes one or more virtual machines modules including computer-executable instructions configured, when executed, to cause the one or more processors to implement one or more virtual machines that host one or more guest operating systems and one or more applications. The computer-executable program code further includes a virtual bypass switch module including computer-executable instructions configured, when executed, to cause the one or more processors to, responsive to the availability of the one or more applications, forward packets received on the first physical network interface to at least one of the one or more virtual machines.

  • Pub Date: 2011/28/01
  • Number: 08547972
  • Owner: Blue Coat Systems, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Application installation system, method and computer program product for allowing a package to be installed by a third party

A computer implemented method of developing computer applications, the method comprising providing to multiple users access, over a network, to information on a data center, with a subgroup of the users having access to a sub-portion of the information that is different from the sub-portion accessible by the remaining tenants of the subgroup; and communicating with the data center over the network employing a computer system associated with a user of the sub-group to establish application functionality with the sub-portion that may be accessed, over the network, by additional parties authorized by the user. Also disclosed is a machine-readable medium and a data center, both of which facilitate carrying-out the steps of the method.

  • Pub Date: 2011/28/01
  • Number: 09069803
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Aggregating sensor data

In particular embodiments, a method includes accessing sensor data from sensor nodes in a sensor network and aggregating the sensor data for communication to an indexer in the sensor network. The aggregation of the sensor data includes deduplicating the sensor data; validating the sensor data; formatting the sensor; generating metadata for the sensor data; and time-stamping the sensor data. The metadata identifies one or more pre-determined attributes of the sensor data. The method also includes communicating the aggregated sensor data to the indexer in the sensor network. The indexer is configured to index the aggregated sensor data according to a multi-dimensional array for querying of the aggregated sensor data along with other aggregated sensor data. One or more first ones of the dimensions of the multi-dimensional array include time and one or more second ones of the dimensions of the multi-dimensional include one or more of the pre-determined sensor-data attributes.

  • Pub Date: 2011/28/01
  • Number: 09225793
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Unified notification platform

Notifications are managed in a unified notification platform that receives messages from disparate services, formats, and protocols, and with disparate attributes and meta-attributes. The unified notification platform provides for user defined meta-attributes to allow rapid classification of incoming messages accordingly to user relationships to message senders, including family, friends and co-workers. Incoming messages are received by a message queue component, serialized and prioritized according to a rules engine. Various user interfaces provide views and reports on the serialized messages. In particular a non-modal notification pop-up is disclosed. The unified notification platform exposes an application programming interface provides automatable and remotable programmatic access for application developers.

  • Pub Date: 2011/27/01
  • Number: 09503415
  • Owner: T-Mobile USA, Inc.
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program for providing access to a plurality of services through a unified application

A system, method, and computer program product are provided for providing access to a plurality of services through a unified application. In use, a plurality of services is associated with a unified application of an entity. Additionally, the unified application is installed within a landing page of the entity. Further, access to the plurality of services is provided to a plurality of users through the unified application of the landing page.

  • Pub Date: 2011/27/01
  • Number: 09009239
  • Owner: Amdocs Software Systems Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System and method for publishing, sharing and accessing selective content in a social network

A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module.

  • Pub Date: 2011/27/01
  • Number: 08583683
  • Owner: Onepatont Software Limited
  • Location: Mumbai, Maharashtra, IN
  • Details: Visit USPTO

Visit USPTO Page


System and method for making user generated audio content on the spoken web navigable by community tagging

Methods and arrangements for creating and building subcategories in a user-based voice application. User posts are appended to a category in a voice application and subdivision of the category is prompted upon satisfaction of a first condition. The category is designated as a parent category, and at least one subcategory nomination are solicited from users. User input is solicited on appending at least one nominated subcategory to the parent category, and a nominated subcategory is appended to the parent category upon satisfaction of a second condition. User input is solicited to reassign a user post from the parent category to at least one subcategory.

  • Pub Date: 2011/27/01
  • Number: 09053182
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for accessing and posting nodes of network and generating and updating information of connections between and among nodes of network

A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module.

  • Pub Date: 2011/27/01
  • Number: 08935275
  • Owner: OnePatont Software Limited
  • Location: Mumbai, Maharashtra, IN
  • Details: Visit USPTO

Visit USPTO Page


Outsourced generation of behavior-based content

A service is disclosed for enabling web sites and other entities to provide item recommendations and other behavior-based content to end users. The service can be implemented as a web service that is remotely accessible over the Internet. Web sites use the web service's interface to report events descriptive of item-related actions performed by end users (e.g., item views, item purchases, searches for items, etc.). The web service analyzes the reported event data on an aggregated basis to detect various types of associations between particular items, and stores resulting datasets that map items to associated items. The web service's interface also provides various API calls for enabling the web sites to request item recommendations and other behavior-based content, including but not limited to personalized recommendations that are based on the event history of the target user.

  • Pub Date: 2011/27/01
  • Number: 08073747
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-layer stack platform for cloud communications

A multi-layer stack platform is provided for cloud communication connections and services between devices. The system includes three or more layers, including a directory component, an applications component, and a peering component. An interconnection component may also be provided for communication between the applications component and the peering component. The components operate to provide communication services, such as sessions, according to the functionality of a selected application by adhering to device, user, and routing rules and preferences. The device, user, and routing rules and preferences are maintained in and processed by the directory component. The applications component receives communication session requests and accesses corresponding application scripts to perform the requested session. The peering component receives the device, user, and routing rules and preferences, and establishes connection between devices based on the rules and preferences as defined by the directory component.

  • Pub Date: 2011/27/01
  • Number: 08171160
  • Owner: IntelePeer, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Identity abstraction providing limited cross-domain access

A system is provided. The system comprises a processor, a memory, and an authorization application stored in the memory that, when executed by the processor, receives a first message from a first client device associated with a first domain, the first message containing a request to emulate a second client device associated with a second domain. The system also determines authorization for the first device to emulate the second device in the second domain. The system also associates an electronic cookie with a browser session initiated by the first device, the electronic cookie associated with access to the second domain. The system also provides the first device authorization to emulate the second device in the second domain using a generic login account wherein the second domain provides the first device limited cross-domain access based on the electronic cookie to targeted information associated with the second device.

  • Pub Date: 2011/27/01
  • Number: 08875243
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud based master data management

A cloud based service provides Master Data Management (MDM) services to clients. A client may create/modify MDM workflows that are hosted by the cloud based service to assist in meeting their needs. An interface is provided at points within the workflow that is hosted by the cloud based service. The cloud based service utilizes a flexible pipeline that executes predefined configurable blocks. A user can create or customize an existing workflow based on the predefined set of blocks (e.g. execution blocks, conditional blocks, loop blocks). The blocks are configured to receive, process and send information relating to the master data according to a predefined schema. Clients may publish master data changes and/or subscribe to master data changes made by other clients.

  • Pub Date: 2011/27/01
  • Number: 09128768
  • Owner: Microsoft Technology Licensing, LCC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud based master data management architecture

A cloud based service architecture is used in providing Master Data Management (MDM) services to clients. The MDM cloud based architecture comprises a client architecture and a server architecture. The client architecture includes synchronization services that are used to interact with the MDM cloud based service. The server architecture comprises a public Application Programming Interface (API) and a portal for accessing different MDM functionality. For example, a client may access the server architecture to create/modify MDM workflows that are hosted by the cloud based service. The cloud based service architecture also provides access to different MDM services including MDM workflows, validation, transformation, and storage relating to master data. The cloud based architecture may be used to publish master data and/or subscribe to master data.

  • Pub Date: 2011/27/01
  • Number: 09584949
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for network security including detection of man-in-the-browser attacks

A method is performed in a network security system implemented in a computer or electronic device that is coupled to secured online resources for detecting unauthorized accesses of those secured online resources. The method includes monitoring a user activity session. It is determined whether the user activity session is indicative of a hidden session by an attacker, where the determination includes comparing the user activity session to an average user activity session.

  • Pub Date: 2011/26/01
  • Number: 09021583
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for enabling secure transactions using flexible identity management in a vehicular environment

A method in one embodiment includes detecting an event for a transaction on an on-board unit (OBU) of a vehicle, where the event has a trigger associated with an agent. The method also includes determining whether the transaction is authorized, identifying network credentials in an identity profile that corresponds to the agent, providing network credentials to a transaction application corresponding to the transaction, and accessing a remote network using the network credentials. Certain embodiments include selecting the network credentials from a plurality of available network credentials corresponding to the agent. In more specific embodiments, the network credentials include one or more virtual subscriber identity modules (VSIMs) of a plurality of VSIMs provisioned on the OBU. In specific embodiments, the network credentials are mapped to a combination of two or more of the agent, the transaction application, and a predefined current location of the vehicle.

  • Pub Date: 2011/26/01
  • Number: 08863256
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for dynamically regulating order entry in an electronic trading environment

A system and method are provided for trading a trading strategy defined for at least one tradeable object in an electronic trading environment. More specifically, one example method includes using a first pay-up tick value to determine a first acceptable price level for an order associated with the trading strategy, automatically modifying the first pay-up tick to a second pay-up tick value in response to detecting a predefined condition, and using the second pay-up tick value to determine a second acceptable price level for the order associated with the trading strategy.

  • Pub Date: 2011/26/01
  • Number: 08019676
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing a radio frequency interface resource

Applications may seek access to a radio frequency interface resource on a processor-based system that exceeds the available capacity of that resource. When more than one application needs access to an RF interface resource at the same time and the available capacity of the RF interface resource does not permit all these requests to be granted, contention resolution may be provided. In one embodiment, the contention resolution may involve determining the priority of each application seeking RF interface resource access and granting access based on that priority.

  • Pub Date: 2011/26/01
  • Number: 08165631
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Secure payment card transactions

Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal, payment data from the POS terminal, transmitting the payment data from the POS security layer to a server security application installed on a POS server, and providing false payment data from the POS security layer to a POS terminal application installed on the POS terminal. The false payment data in various embodiments is processed as if it were the payment data, such that the POS terminal transmits an authorization request to the POS server using the false payment data. In addition, the authorization request may be transmitted from the POS server to a payment gateway.

  • Pub Date: 2011/26/01
  • Number: 08328095
  • Owner: SHIFT4 Corporation
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Patient selectable joint arthroplasty devices and surgical tools

Disclosed herein are methods, compositions and tools for repairing articular surfaces repair materials and for repairing an articular surface. The articular surface repairs are customizable or highly selectable by patient and geared toward providing optimal fit and function. The surgical tools are designed to be customizable or highly selectable by patient to increase the speed, accuracy and simplicity of performing total or partial arthroplasty.

  • Pub Date: 2011/26/01
  • Number: 09381025
  • Owner: ConforMIS, Inc.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Network-network interface

In one embodiment, a method includes receiving at a first portal of a first node data for communication from a first network to a second network that belong to a particular one of a first set of service classes of the first network; determining at the first portal a particular one of a second set of service classes of the second network for the data; and directing the data from the first portal to a second portal of a second node residing at least in part in the second network.

  • Pub Date: 2011/26/01
  • Number: 08850015
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Migrating a web hosting service via a virtual network from one architecture to another

An automated tool for migrating a website hosting service from a first website hosting architecture to a second website hosting architecture, wherein a virtual network is used during migration to facilitate keeping the services available during the movement of IP addresses from one architecture to the other architecture.

  • Pub Date: 2011/26/01
  • Number: 08595338
  • Owner: Endurance International Group, Inc
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent adaptive index density in a database management system

Adaptive index density in a database management system is provided, which includes receiving a number of partitions for an index for a database table, the index subject to creation. The adaptive index density also includes selecting a column from the database table, the column selected based upon an estimated frequency of execution of database queries for the column. The adaptive index density further includes calculating an estimated cost of executing each of the database queries for the column, and determining data to reside in each of the partitions of the index responsive to the estimated cost.

  • Pub Date: 2011/26/01
  • Number: 08566308
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Hydroelectric power optimization service

A non-linear power equation may be solved in linear form by locking a variable or variables and iteratively solving to provide a Web service for accurately and quickly estimating optimized power solutions for hydroelectric power stations. Additionally, these iterative calculations may provide for long term water resource planning and more accurate estimation models. Further, such optimized power solutions may be usable to create accurate and timely water management models for the operation and planning of hydroelectric power stations.

  • Pub Date: 2011/26/01
  • Number: 08626352
  • Owner: Avista Corporation
  • Location: Spokane, US
  • Details: Visit USPTO

Visit USPTO Page


Document workflow architecture

A method () and a computer readable medium for implementing a document workflow () are provided. The method includes receiving a document file () from a device () via a device application program interface (API) (). The device () can be connected to a network (). The document file () can include information content (). The method also includes image-processing the document file () via a document-processing API () to extract the information content () from the document file (). The method further includes invoking document services () via the document-processing API () to provide the extracted information content () to a service application () on the network ().

  • Pub Date: 2011/26/01
  • Number: 09591061
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Bifunctional metnase/intnase inhibitors and related compositions and methods of treatment of cancer

This invention relates to novel cancer treatment compositions and associated therapeutic methods. More particularly, this invention relates in part to small chemical bifunctional inhibitors of DNA replication and repair proteins Metnase and/or Intnase (also termed Gypsy Integrase, Gypsy Integrease-1, Gypsy Retransposon Integrase 1, or GIN-I) that simultaneously damage DNA, and to a therapeutic method that utilizes the inhibitors to increase the effectiveness of cancer treatment protocols, including radiation therapy. In preferred embodiments, compounds, compositions and methods of treatment of the invention are used to treat a patient suffering from leukemia (e.g. acute myeloid leukemia (AML) and related cancers. In certain aspects of such treatments, compounds, compositions and methods of treatment of the invention are administered as a monotherapy (in some cases, to patients who have exhibited resistance to Topo IIalpha inhibitors such as VP-16), or are co-administered with a Topo IIalpha inhibitor or other anti-cancer agents as otherwise described herein or in combination with radiation therapy.

  • Pub Date: 2011/26/01
  • Number: 08889689
  • Owner: STC.UNM
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic method and system for formulating and transforming representations of context used by information services

An information retrieval system for automatically retrieving information related to the context of an active task being manipulated by a user. The system observes the operation of the active task and user interactions, and utilizes predetermined criteria to generate a context representation of the active task that are relevant to the context of the active task. The information retrieval system then processes the context representation to generate queries or search terms for conducting an information search. The information retrieval system reorders the terms in a query so that they occur in a meaningful order as they naturally occur in a document or active task being manipulated by the user. Furthermore, the information retrieval system may access a user profile to retrieve information related to the user, and the select information sources or transform search terms based on attributes related to the user, such as the user's occupation, position in a company, major in school, etc.

  • Pub Date: 2011/26/01
  • Number: 08978033
  • Owner: Northwestern University
  • Location: Evanston, US
  • Details: Visit USPTO

Visit USPTO Page


Patient selectable joint arthroplasty devices and surgical tools

Disclosed herein are methods, compositions and tools for repairing articular surfaces repair materials and for repairing an articular surface. The articular surface repairs are customizable or highly selectable by patient and geared toward providing optimal fit and function. The surgical tools are designed to be customizable or highly selectable by patient to increase the speed, accuracy and simplicity of performing total or partial arthroplasty.

  • Pub Date: 2011/25/01
  • Number: 09408615
  • Owner: ConforMIS, Inc.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Migrating a web hosting service between a dedicated environment for each client and a shared environment for multiple clients

An automated tool for migrating a website hosting service from a first website hosting architecture to a second website hosting architecture, the first architecture comprising a server architecture that serves the services necessary for a client's web sites from a dedicated machine and the second web hosting architecture comprising a server architecture that serves a plurality of unrelated clients from a plurality of shared servers.

  • Pub Date: 2011/25/01
  • Number: 09071553
  • Owner: Endurance International Group, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Method for inspecting a physical asset

A method of inspecting a physical asset using a mobile computing device is disclosed. Data regarding the asset and its condition is collected on the mobile device by a user, and may include photographs, audio or video recordings, text or other types of data. The data is automatically annotated with the current time and the geo-location of the device. The data is transmitted to a server and saved in a manner such that it may not be modified. This allows for auditing, as well as tracking of the asset over time by comparing data entered at one time with data entered at another time. Reports may be automatically generated from the saved data when desired. Pre-defined fields for data entry may be presented for ease of use. In some embodiments, the asset being inspected is a building, house or apartment.

  • Pub Date: 2011/25/01
  • Number: 09064290
  • Owner: JKADS LLC
  • Location: Walnut Creek, US
  • Details: Visit USPTO

Visit USPTO Page


Fixed position multi-state interactive advertisement

Computer-based systems and methods for a multi-state advertisement displayed at a fixed position on a primary display space of a display device. The fixed position advertisement remains in its fixed position in view of the user as the user scrolls the web page in various directions. A plurality of events trigger a change in the state of the multi-state advertisement, with the change in state resulting in a change of the advertisement content, shape, size, style and appearance. An embodiment deploys an initial video in combination with a billboard. When the interstitial video ends, the fixed position advertisement is sized down to a less obtrusive size, with the billboard and the interstitial video replaced with a navigation bar.

  • Pub Date: 2011/25/01
  • Number: 09208500
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Enabling external access to a private-network host

Network address translation allows hosts within a private network (“internal hosts”) to access the Internet through a single or a limited number of public IP addresses. When an internal host accesses the Internet, NAT translates the internal host's private IP address into a temporary public IP address for a given session. A method and media are provided for enabling a host external to the private network (“external host”) to initiate communication with an internal host. The internal host requests that a global address be mapped to its private address. The internal host receives the global address and sends it to a server where it is available to an external host. The mapping between the private address and the global address is maintained in a NAT system so that an inbound connection request from an external host can be forwarded to the internal host.

  • Pub Date: 2011/25/01
  • Number: 08683019
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatuses, methods and systems for a digital conversation management platform

The APPARATUSES, METHODS AND SYSTEMS FOR A DIGITAL CONVERSATION MANAGEMENT PLATFORM (“DCM-Platform”) transforms digital dialogue from consumers, client demands and, Internet search inputs via DCM-Platform components into tradable digital assets, and client needs based artificial intelligence campaign plan outputs. In one implementation, The DCM-Platform may capture and examine conversations between individuals and artificial intelligence conversation agents. These agents may be viewed as assets. One can measure the value and performance of these agents by assessing their performance and ability to generate revenue from prolonging conversations and/or ability to effect sales through conversations with individuals.

  • Pub Date: 2011/25/01
  • Number: 08977584
  • Owner: Newvaluexchange Global AI LLP
  • Location: Reading, Berkshire, GB
  • Details: Visit USPTO

Visit USPTO Page


System and method for message processing and routing

A message routing system that allows applications at either end of the system to run as-is without modification. The system functions in a multithreaded environment and is capable of handling complex routing rules and message transformation. It is also capable of learning and executing new routing rules and message transformations in formats previously unrecognized by the system. The system enables precise and reliable logging of messages throughout processing and supports publication of enterprise-wide broadcast messages. The system further preferably employs cooperating inbound and outbound transport processes for consuming, routing, processing, safely storing and publishing messages in batches of logical units of work to ensure that the logical units of work are not lost in system transactions. The system also preferably utilizes a replay server for preserving and replaying messages that might otherwise fail to reach their intended destinations.

  • Pub Date: 2011/24/01
  • Number: 08255471
  • Owner: Goldman, Sachs & Co.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for adding dynamic information to digitally signed mobile applications

Described are systems and methods for adding information to a mobile application. A mobile application is downloaded from a server to a mobile device using a web browser. A web browser cookie associated with the mobile application is stored on the mobile device. A request is sent from the mobile application to the server, where the request includes information from the stored web browser cookie. Mobile application data associated with the stored web browser cookie from the server is received by the mobile application in response to the request. The mobile application is then provided with access to the mobile application data.

  • Pub Date: 2011/24/01
  • Number: 08126963
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Selective allocation of dedicated channel (DCH) resources within a wireless communications system

In an embodiment, a UE determines to transmit a message (e.g., an alert message, a call initiation message). Based on the type of the message to be transmitted, the UE selectively transmits supplemental data configured to prompt an access network to transition the UE to a dedicated channel state (DCS). In another embodiment, an application server configured to arbitrate communication sessions between UEs receives a message for transmission to a target UE. Based on the type of the message to be transmitted to the target UE, the application server selectively transmits, to a serving access network of the target UE, supplemental data configured to prompt the serving access network to transition the target UE to the DCS. In another embodiment, the access network selectively transitions a target UE to the DCS based on whether differently sized messages are received at the access network for transmission to the target UE.

  • Pub Date: 2011/24/01
  • Number: 08780744
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Runtime machine supported method level caching

A computer system includes a disk space comprising at least one type of memory and an operating system for controlling allocations and access to the disk space. A runtime machine runs applications through at least one of the operating system or directly on at least one processor of the computer system. In addition, the runtime machine manages a selected runtime disk space allocated to the runtime machine by the operating system and manages a separate method cache within the selected virtual disk space. The virtual machine controls caching within the method cache of a separate result of at least one method of the application marked as cache capable. For a next instance of the method detected by the runtime machine, the runtime machine accesses the cached separate result of the method in lieu of executing the method again.

  • Pub Date: 2011/24/01
  • Number: 08131925
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Inhibitors of PI3 kinase

  • Pub Date: 2011/24/01
  • Number: 09073927
  • Owner: FUNDACION CENTRO NACIONAL DE INVESTIGACIONES ONCOLOGICAS CARLOS III
  • Location: Madrid, ES
  • Details: Visit USPTO

Visit USPTO Page


Coordinating sync points between a non-volatile memory and a file system

Systems and methods for coordinating sync points between a non-volatile memory (“NVM”) and a file system are provided. In some embodiments, a file system can issue one or more commands to control circuitry of a NVM, which can indicate whether a transaction is journaled or non-journaled. This way, the control circuitry can maintain a list of journaled transactions and corresponding LBA(s). By keeping track of journaled transactions, the control circuitry can ensure that sync points are not prematurely erased during a garbage collection process. In addition, upon detecting device failure events, the control circuitry can roll back to sync points corresponding to one or more journaled transactions.

  • Pub Date: 2011/24/01
  • Number: 08458133
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Assisted state transitions of a user equipment within a wireless communications system

In an embodiment, a user equipment (UE) determines to initiate a communication session with at least one other UE to be arbitrated by an application server. The UE determines a type of the communication session (e.g., delay-sensitive, PTT, etc.) and/or a size of a call message to be sent by the UE for requesting initiation of the communication session by the application server. The UE selects a reverse-link channel on which to transmit the call message based at least in part upon the determined type of the communication session and/or the determined size of the call message. The UE transitions to a given state (e.g., CELL_FACH, CELL_DCH, etc.) that supports transmissions upon the selected reverse-link channel. The UE transmits the call message on the selected reverse-link channel after the UE is transitioned to the given state.

  • Pub Date: 2011/24/01
  • Number: 08848553
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Assisted state transition of a user equipment (UE) for delay sensitive applications within a wireless communications system

In an embodiment, an application server receives a call message, from an originating user equipment (UE), that is configured to request initiation of a communication session, to be arbitrated by the application server, between the originating UE and at least one target UE. The application server selectively sends, in response to the call message, dummy data to a serving access network of a given UE associated with the communication session in order to facilitate a transition of the given UE to a dedicated-channel state. For example, the application server can selectively send the dummy data based on a size of the call message and/or based on a type of the communication session.

  • Pub Date: 2011/24/01
  • Number: 08873479
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing a platform for the trade of financial instruments

The present invention is a system and method for providing a trading platform for the trade of F.I.s. According to some embodiments of the present invention, there may be provided a server or server cluster including at least one Interfacing Server adapted to interface with a user, possibly via a distributed data network such as the interne. The IS1 may be adapted to present to a user a trading platform, to receive from a user trade instructions, via the platform, and execute them. The trading platform may include innovative trade options including mid-trade options (e.g. trade insurance), batch trade options, series trade options, parlay trade options and “close now”/“extend” options.

  • Pub Date: 2011/23/01
  • Number: 08346655
  • Details: Visit USPTO

Visit USPTO Page


Migrating a web hosting service between a one box per client architecture and a cloud computing architecture

An automated tool for migrating a website hosting service from a first website hosting architecture to a second website hosting architecture, the first architecture comprising a server architecture that serves the services necessary for a specific website from a single machine and the second web hosting architecture comprising a server architecture that serves a plurality of common services from a plurality of machines to a plurality of unaffiliated websites using a cloud computing architecture.

  • Pub Date: 2011/23/01
  • Number: 09071552
  • Owner: Endurance International Group, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for monitoring components of a remote access server farm

The present application is related methods to monitor a state of one or more components of a remote access server farm by an intermediary to distinguish between operating and functional components and improve farm availability for user application requests. The intermediary may be deployed between a client and the remote access server farm and forwards client requests to functional components of the remote access server farm.

  • Pub Date: 2011/21/01
  • Number: 08832260
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for netbackup data decryption in a high latency low bandwidth environment

A system and method for efficient transfer of encrypted data over a low-bandwidth network. A backup server and a client computer are coupled to one another via a first network. The backup server is coupled to a remote data storage via another network, such as the Internet, also referred to as a cloud. The backup server encrypts received data for backup from the client computer. Cryptography segment and sub-segment sizes may be chosen that are aligned on a byte boundary with one another and with selected backup segment and sub-segment sizes used by backup software on the remote data storage. A selected cryptography algorithm has a property of allowing a given protected sub-segment with the cryptography sub-segment size to be decrypted by initially decrypting an immediate prior protected sub-segment that has the same cryptography sub-segment size. Therefore, the size of data transmitted via the cloud may be smaller than the cryptography segment size.

  • Pub Date: 2011/21/01
  • Number: 08713300
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Offloading the processing of signals

A server computer that is connected over a network to one or more remote client computers includes specialized hardware for handling computationally-intensive signal processing operations involving video, audio, and/or other signals. As a result, users of the client computers experience little or no delay when accessing over the network applications that are hosted on the server.

  • Pub Date: 2011/21/01
  • Number: 08886699
  • Owner: Cloudium Systems Limited
  • Location: Limerick, IE
  • Details: Visit USPTO

Visit USPTO Page


Network aware firewall

Among other things, one or more systems and/or methods for a network aware firewall are disclosed. A method comprises accessing a first network connection from a client computer system and determining whether the first network connection is a first network type or a second network type. The method further comprises dynamically modifying security parameters associated with a firewall local to the client computer system in response to determining whether the network connection is the first network type or the second network type.

  • Pub Date: 2011/21/01
  • Number: 08321927
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and apparatus for displaying the multimedia information from wireless communication networks

Video signals for a mobile terminal are converted to accommodate reproduction by an alternative display terminal. The video signal is processed to provide a converted video signal appropriate for an alternative display terminal that is separate from the mobile terminal. This converted video signal is then provided for the alternative display terminal to accommodate the corresponding video display on a screen provided by the alternative (e.g., external) display terminal.

  • Pub Date: 2011/21/01
  • Number: 08050711
  • Owner: SellerBid, Inc.
  • Location: Arlington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for shape-memory alloy wire control

A method for controlling a device using a shape-memory alloy wire is disclosed. The method includes determining an ontime for the shape-memory alloy wire based on a target volume to be pumped by a pump plunger, determining the temperature of the shape-memory alloy wire and adjusting the ontime based on the temperature of the shape-memory alloy wire.

  • Pub Date: 2011/21/01
  • Number: 08852164
  • Owner: DEKA Products Limited Partnership
  • Location: Manchester, US
  • Details: Visit USPTO

Visit USPTO Page


Gas filled hollow fiber laser

Apparatus, systems, and methods using an optically pumped gas filled hollow fiber laser can be implemented in a variety of applications. In various embodiments, operation of an optically pumped gas filled hollow fiber laser is based on population inversion in the gas. Additional apparatus, systems, and methods are disclosed.

  • Pub Date: 2011/21/01
  • Number: 09106055
  • Details: Visit USPTO

Visit USPTO Page


Distributed document co-authoring and processing

A method and a device are disclosed including plug-in software components that are integrated with document processing software suites. The plug-in software components provide a set of integrated interfaces for collaborative document processing in conjunction with multiple remote file, data, and application service providers. The set of interfaces enable coauthoring a document, document merging, discovering and displaying context-sensitive metadata on a software dashboard based on permissions associated with the metadata and/or a client computing device, caching, symmetric distributed document merge with the multiple service providers, and integrated search and insertion of multimedia data in documents, among others. The documents typically include, but are not limited to formatted text documents, spreadsheet documents, and slide presentation documents.

  • Pub Date: 2011/21/01
  • Number: 09367530
  • Details: Visit USPTO

Visit USPTO Page


Customizing automated process management

Embodiments of an event-driven process management and automation system are disclosed. Such system may be particularly appropriate for a multi-tenant environment so that a single process handling flow may be generated for a given process. Because in a multi-tenant environment many different entities may desire to customize or optimize this process handling flow for their particular usage, modifications to the process flow may be easily handled by a non-technical user to realize process modification without incurring additional development costs. Using a multi-level hierarchical inheritance model in accordance with an embodiment of the present invention, a process may be standardized, with focused customization available on a macro and/or micro level.

  • Pub Date: 2011/21/01
  • Number: 08839249
  • Owner: Rackspace US, Inc.
  • Location: San Antonio, US
  • Details: Visit USPTO

Visit USPTO Page


Verification of portable consumer devices

Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.

  • Pub Date: 2011/20/01
  • Number: 08827154
  • Owner: Visa International Service Association
  • Location: San Francisco, unknown
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for updating printing device capabilities

Systems and methods that generate initial printing device capabilities data including one or more initial printing device capabilities based on the initial print ticket markup language data, receive second print ticket markup language data, generate updated printing device capabilities data including one or more updated printing device capabilities based on the second print ticket markup language data, and generate one or more changed printing device capabilities markup language data based on the initial printing device capabilities data and the updated printing device capabilities data, wherein the one or more changed printing device capabilities markup language data includes one or more changed printing device capabilities that indicate differences between the one or more initial printing device capabilities and the one or more updated printing device capabilities.

  • Pub Date: 2011/20/01
  • Number: 08994985
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Software architecture for validating C++ programs using symbolic execution

Particular embodiment compile a C++ program having one or more input variables to obtain bytecode of the C++ program; compile a C++ library to obtain bytecode of the C++ library; symbolically execute the bytecode of the C++ program and the bytecode of the C++ library, comprising assign a symbolic input to each input variable of the C++ program; determine one or more execution paths in the C++ program; and for each execution path, construct a symbolic expression that if satisfied, causes the C++ program to proceed down the execution path; and generate one or more test cases for the C++ program by solving the symbolic expressions.

  • Pub Date: 2011/20/01
  • Number: 08869113
  • Owner: Fujitsu Limited
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Programmatically enabling user access to CRM secured field instances based on secured field instance settings

Access to customer relationship management (CRM) secured field instances is enabled based on field settings. A requester's identity determines action paths to be executed in order to enable access to fields. A client application's user privileges are inherited to enable access to secured fields. Such access through a granted privilege is provided through an API intermediating inheritance of user's privileges from client application.

  • Pub Date: 2011/20/01
  • Number: 08805882
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Patient selectable joint arthroplasty devices and surgical tools

Disclosed herein are methods, compositions and tools for repairing articular surfaces repair materials and for repairing an articular surface. The articular surface repairs are customizable or highly selectable by patient and geared toward providing optimal fit and function. The surgical tools are designed to be customizable or highly selectable by patient to increase the speed, accuracy and simplicity of performing total or partial arthroplasty.

  • Pub Date: 2011/20/01
  • Number: 09220517
  • Owner: ConforMIS, Inc.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing libraries for validating C++ programs using symbolic execution

Particular embodiments optimize a C++ function comprising one or more loops for symbolic execution, comprising for each loop, if there is a branching condition within the loop, then rewrite the loop to move the branching condition outside the loop. Particular embodiments may further optimize the C++ function through simplified symbolic expressions and adding constructs forcing delayed interpretation of symbolic expressions during the symbolic execution.

  • Pub Date: 2011/20/01
  • Number: 08943487
  • Owner: Fujitsu Limited
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for utilizing activity data with clustered events

The present disclosure relates to methods and systems for clustering individual items of web content, and then utilizing activity and profile data to both select clusters of content items for presentation to a user, and determining how the selected clusters of content items are presented to the user of an online social network service. With some embodiments, the activity data are derived by monitoring and detection interactions with the individual items of web content by an individual user, or other users with whom the individual user is related, as established via, and defined by, the social network service.

  • Pub Date: 2011/20/01
  • Number: 08949239
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for recommending a context based on content interaction

The present disclosure relates to methods and systems for recommending a context to a user of a social network service, based on detecting an interaction with some item of web content. With some embodiments, after detecting an interaction with a web document, a topic to which the web document is related is determined. A context, such as an online or offline forum, known to be associated with the topic is then identified. Finally, the identified context is presented to the user as a recommendation for a content source that is likely to be of interest to the user.

  • Pub Date: 2011/20/01
  • Number: 09172762
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Map handling for location based services in conjunction with localized environments

The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for map handling for location based services in conjunction with localized environments. For certain example implementations, a method may comprise storing map information corresponding to a particular localized environment that is associated with a particular location context identifier, with the particular localized environment comprising an indoor environment corresponding to at least a portion of a building structure; receiving update information applicable to the map information corresponding to the particular localized environment, with the update information being associated with the particular location context identifier; updating the map information corresponding to the particular localized environment based at least partly on the update information so as to produce updated map information; and providing the updated map information to one or more mobile devices that are located at the particular localized environment. Other example implementations are described herein.

  • Pub Date: 2011/20/01
  • Number: 09389085
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical routing and interface selection for multi-processor multimode network devices

The embodiments simplify the development of applications for current and future wireless communication devices, resolving the deficiencies of current methods by providing a hierarchical routing layer which abstracts the actual proximity of the network connection. An application can request and receive a type of network connection without having to address details of the actual connection established. A hierarchical routing layer is provided within the software architecture of each processor within the computing device. The hierarchical routing layer abstracts the actual proximity of the network connectivity on the modem from the applications using proxy network interfaces. The hierarchical routing layers on each processor cooperate to identify a best network interface for an application network request. The routing layer enables response to an application request for a network interface in a simple manner regardless of whether the network interface is provided on the application host processor or another processor.

  • Pub Date: 2011/20/01
  • Number: 09411647
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Group III nitride semiconductor devices with silicon nitride layers and methods of manufacturing such devices

Methods of fabricating transistor in which a first Group III nitride layer is formed on a substrate in a reactor, and a second Group III nitride layer is formed on the first Group III nitride layer. An insulating layer such as, for example, a silicon nitride layer is formed on the second Group III nitride layer in-situ in the reactor. The substrate including the first Group III nitride layer, the second group III nitride layer and the silicon nitride layer is removed from the reactor, and the silicon nitride layer is patterned to form a first contact hole that exposes a first contact region of the second Group III nitride layer. A metal contact is formed on the first contact region of the second Group III nitride layer.

  • Pub Date: 2011/20/01
  • Number: 08481376
  • Owner: Cree, Inc.
  • Location: Durham, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic transfer of selected business process instance state

Business processes that may be affected by events, conditions or circumstances that were unforeseen or undefined at modeling time (referred to as unforeseen events) are modeled and/or executed. Responsive to an indication of such an event during process execution, a transfer is performed from the process, in which selected data is stored and the process is terminated. The selected data may then be used by a target process. The target process may be, for instance, a new version of the same process, the same process or a different process. The target process may or may not have existed at the time the process was deployed.

  • Pub Date: 2011/20/01
  • Number: 09003430
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Common service web hosting architecture with CRM plus reporting

A CRM system enables access to data for client and agent interactions with any component of an unaffiliated web domain hosting common service pool platform, wherein the CRM system includes a module for reporting data relevant to a business function.

  • Pub Date: 2011/20/01
  • Number: 08935314
  • Owner: Endurance International Group, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Accelerate copying of virtual machine images

A system, program product, and method are provided for copying a virtual machine image. An image library comprising a plurality of system images is provided by a target data processing system. A source image selection is received at the target data processing system. A given image from the image library is selected by the target system based on the received source image. The selected given image is transformed into a copy of the virtual machine image by receiving blocks from a source system that are part of the virtual machine image but not a part of the selected given image, such that only the blocks missing from the selected given image are transferred from the source system to the target system in order to form the copy of the virtual machine image. The source image is preferably a virtual data processing system image.

  • Pub Date: 2011/20/01
  • Number: 08615588
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Stabilized retinal imaging with adaptive optics

A system provides an optical image of an object. A first module tracks a reference feature of the object. A second module includes a source for an imaging beam, a scanning device to move the imaging beam along a portion of the object and a detection device receives a signal associated with an image of the portion of the object. The first module controls the position of the imaging beam relative to the reference feature to correct for the motion of the object. A third module detects a distortion of the object and compensates for the distortion.

  • Pub Date: 2011/19/01
  • Number: 08444268
  • Owner: Physical Sciences, Inc.
  • Location: Andover, US
  • Details: Visit USPTO

Visit USPTO Page


Global account reconciliation tool

A global reconciliation software tool is provided to standardize reconciliation processes across various corporate lines of business. The reconciliation tool provides standard templates for entering transaction and account data. In this manner, open accounting items are more readily identified and reconciled. The software tool includes a plurality of components allowing for greater scalability and operability across various computer systems and accounting programs.

  • Pub Date: 2011/19/01
  • Number: 08150746
  • Owner: American Express Travel Related Services Company, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptable user interface for business software

An adaptable user interface is formed based on a role assumed by a user and the identification of tasks in a process that need to be performed. For each role assumed by the user, a set of tasks assigned to the role is identified. Each task is evaluated to determine if it is an active task that needs to be performed in one or more processes. For each active task, an element is added to the user interface.

  • Pub Date: 2011/19/01
  • Number: 09224127
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Smooth rewind media playback

Systems and methods for smooth rewind playback of streamed media are provided. The media includes relatively-encoded frames and independently-encoded frames. The method includes receiving a rewind request indicating a rewind speed for rewind playback of the media, selectively dropping relatively-encoded frame(s) based on a receipt constraint and a decoding constraint to form a subset of the media, and receiving frames of the subset. The method further includes selecting, in a reverse order, a selected group of pictures (GOP) included within the subset, and decoding relatively-encoded frame(s) of the GOP in a forward sequential frame order. The method further includes caching relatively-encoded frame(s) of the GOP in the forward sequential frame order, and when caching, dropping and overwriting relatively-encoded frame(s) of the GOP selectively according to a memory constraint and/or a display constraint. The method further includes displaying relatively-encoded frame(s) of the GOP in a reverse sequential frame order.

  • Pub Date: 2011/18/01
  • Number: 08391688
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Conductive film and method for its production

A method for producing a conductive film comprising a step of placing a template (B), having openings in a mesh structure running from the side that is to contact a substrate (A) through to the back side, on the surface of the substrate (A), and spreading a dispersion (D) of conductive particles (P) on the surface of the substrate (A) on which the template (B) has been placed, and drying it, thereby forming a mesh-like structure (C) of the conductive particles (P) near the points of contact between the substrate (A) and the template (B), and then removing the template (B) from the substrate (A) to form a mesh-like structure (C) of the conductive particles (P) on the surface of the substrate (A).

  • Pub Date: 2011/18/01
  • Number: 09125315
  • Owner: Mitsubishi Rayon Co., Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Business constructs

Various systems, processes, tools and techniques are provided for managing and processing data within a computing environment including a data warehouse component. Certain embodiments of the business construct of the invention can provide an interim stage for mapping data prior to loading the data into the data warehouse. When embodied as standard interface files, each of the business constructs can represent a business object that is of importance to a corporate entity or other enterprise.

  • Pub Date: 2011/18/01
  • Number: 08370371
  • Owner: The PNC Financial Services Group, Inc.
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Generating a supplemental output for a slot machine

A method for generating supplemental slot machine output content has been developed. The method includes providing primary slot machine output content that has been tested by a gaming commission prior to offering the slot machine for public use. Additionally, the method includes providing slot machine output content that has not been tested by the gaming commission when providing the supplemental output content is approved by the gaming commission. This negates the requirement for the gaming commission to test the supplemental slot machine output content.

  • Pub Date: 2011/17/01
  • Number: 08628411
  • Details: Visit USPTO

Visit USPTO Page


Endpoint-based parallel data processing with non-blocking collective instructions in a parallel active messaging interface of a parallel computer

Methods, apparatuses, and computer program products for endpoint-based parallel data processing with non-blocking collective instructions in a parallel active messaging interface (‘PAMI’) of a parallel computer are provided. Embodiments include establishing by a parallel application a data communications geometry, the geometry specifying a set of endpoints that are used in collective operations of the PAMI, including associating with the geometry a list of collective algorithms valid for use with the endpoints of the geometry. Embodiments also include registering in each endpoint in the geometry a dispatch callback function for a collective operation and executing without blocking, through a single one of the endpoints in the geometry, an instruction for the collective operation.

  • Pub Date: 2011/17/01
  • Number: 08892850
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Decoding digital information included in a hand-formed expression

Embodiments include a method, a manual device, a handheld manual device, a handheld writing device, a system, and an apparatus. An embodiment provides a device. The device includes an imaging circuit operable to acquire digital information encoded in a hand-formed analog expression marked on a surface by a handheld writing device. The device also includes a translator circuit operable to decode the digital information. The device further includes a correlation circuit operable to generate a signal indicative of the decoded digital information.

  • Pub Date: 2011/17/01
  • Number: 08897605
  • Owner: The Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Data communications in a parallel active messaging interface of a parallel computer

Data communications in a parallel active messaging interface (‘PAMI’) of a parallel computer composed of compute nodes that execute a parallel application, each compute node including application processors that execute the parallel application and at least one management processor dedicated to gathering information regarding data communications. The PAMI is composed of data communications endpoints, each endpoint composed of a specification of data communications parameters for a thread of execution on a compute node, including specifications of a client, a context, and a task, the compute nodes and the endpoints coupled for data communications through the PAMI and through data communications resources. Embodiments function by gathering call site statistics describing data communications resulting from execution of data communications instructions and identifying in dependence upon the call cite statistics a data communications algorithm for use in executing a data communications instruction at a call site in the parallel application.

  • Pub Date: 2011/17/01
  • Number: 08584141
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Web hosting service based on a common service architecture and third party services

A website hosting service provides a plurality of services to each of a plurality of unrelated websites, each of the plurality of services being adapted to contribute to a distinct service package for at least a plurality of unrelated websites, at least one of the plurality of services serving a third party interface that allows access to a third party service in the distinct service package.

  • Pub Date: 2011/14/01
  • Number: 08843571
  • Owner: Endurance International Group, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Vehicle user interface systems and methods

A control system for mounting in a vehicle and for providing information to a portable electronic device for processing by the portable electronic device is shown and described. The control system includes a first interface for communicating with the portable electronic device and a memory device. The control system also includes a processing circuit communicably coupled to the first interface and the memory device, the processing circuit configured to extract information from the memory device and to provide the information to the first interface so that the first interface communicates the information to the portable electronic device. The processing circuit is further configured to determine the capabilities of the portable electronic device based on data received from the portable electronic device via the first interface and to determine whether or not to communicate the information to the portable electronic device based on the determined capabilities.

  • Pub Date: 2011/14/01
  • Number: 08447598
  • Owner: Johnson Controls Technology Company
  • Location: Holland, US
  • Details: Visit USPTO

Visit USPTO Page


Unaffiliated web domain hosting service based on a common service architecture

A website hosting service provides a plurality of services, from a common service architecture, to each of a plurality of unrelated websites, the common service architecture being adapted to provide a different package of services to at least a plurality of unrelated websites.

  • Pub Date: 2011/14/01
  • Number: 08762484
  • Owner: Endurance International Group, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for data storage and retrieval using algebraic relations composed from query language statements

Systems and methods for storing and accessing data. A query language statement may reference a plurality of data sets and a plurality of algebraic relations between the data sets may be composed from the query language statement. The algebraic relations may be used to define new data sets and to optimize access to data sets. A store of algebraic relations may be accumulated over time. Alternative collections of algebraic relations may be generated and evaluated to determine an optimized collection of algebraic relations to use in calculating and providing a requested data set. The optimization may be performed using the algebraic relations rather than retrieving underlying data sets from storage. As a result, optimization may be performed at processor speeds to minimize the amount of time required for data to be retrieved from slower storage.

  • Pub Date: 2011/14/01
  • Number: 08032509
  • Owner: Algebraix Data Corporation
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for adaptive copy on write

In one embodiment, a user or client device communicates with a distributed file system comprised of one or more physical nodes. The data on each of the physical nodes store metadata about files and directories within the file system. Some of the embodiments permit a user to take a snapshot of data stored on the file system. The snapshot may include a single file, a single directory, a plurality of files within a directory, a plurality of directories, a path on the file system that includes nested files and subdirectories, or more than one path on the file system that each includes nested files and directories. In some embodiments, systems and methods intelligently choose whether to use copy-on-write or point-in-time copy when saving data in a snapshot version of a file whose current version is being overwritten. In some embodiments, systems and methods allow snapshot users to return from a snapshot directory to the immediate parent directory from which the user entered into the snapshot.

  • Pub Date: 2011/14/01
  • Number: 08200632
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for transactional and fault-tolerant distribution of digital assets over multi-tiered computer networks

Provided herein is a system and computer program product for distributing at least one infrastructure description record (IDR) over at least one tier of a network. The system includes at least one network interface that receives the infrastructure description records (IDRs) and the IDRs being enqueued on at least one incoming, transactional, persistent queue (ITPQ), at least one transactional, persistent store, and at least one transactional process that dequeues the IDR from the ITPQ and accesses the IDR to create an accessed IDR, the accessed IDR being stored in the transactional, persistent store in the system.

  • Pub Date: 2011/14/01
  • Number: 08650226
  • Owner: OP40 Holdings, Inc.
  • Location: Somers, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for message processing and routing

A message routing system that allows applications at either end of the system to run as-is without modification. The system functions in a multithreaded environment and is capable of handling complex routing rules and message transformation. It is also capable of learning and executing new routing rules and message transformations in formats previously unrecognized by the system. The system enables precise and reliable logging of messages throughout processing and supports publication of enterprise-wide broadcast messages. The system further preferably employs cooperating inbound and outbound transport processes for consuming, routing, processing, safely storing and publishing messages in batches of logical units of work to ensure that the logical units of work are not lost in system transactions. The system also preferably utilizes a replay server for preserving and replaying messages that might otherwise fail to reach their intended destinations.

  • Pub Date: 2011/14/01
  • Number: 08266229
  • Owner: Goldman, Sachs & Co.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for automated testing of software applications with dynamic user interfaces spanning multiple technologies

The present disclosure provides a system, method and computer program product that uses abstraction to enable the definition, development and maintenance of testing libraries for both simple and complex user interface controls. The system and method hide the granular details from the test designer while still promoting reuse. Using the system and method, designers can define a library of functionality for common controls that map 1-to-1 with visual controls, which may be re-implemented across many APIs or programming languages.

  • Pub Date: 2011/14/01
  • Number: 08997053
  • Owner: Worksoft, Inc.
  • Location: Addison, US
  • Details: Visit USPTO

Visit USPTO Page


Returning from power saving mode upon receiving a packet other than switch inhibiting packets classified as having interval shorter than switch waiting time to power saving mode

In a multifunctional device, a packet analysis unit determines whether a received packet contributes to inhibition of a power saving mode, stores the time at which a packet is received and information indicating whether a packet is received during the power saving mode as information about the packet determined as contributing to the inhibition thereof, and calculates a period of access by a plurality of packets based on the stored information about the packet and a factor analysis unit classifies the access of which the calculated period is shorter than the waiting time of the power saving mode into an access inhibiting a shift to the power saving mode and classifies the access of which the period is not shorter than the waiting time of the power saving mode and which is made by the packet received during the power saving mode, into an access returning from the power saving mode.

  • Pub Date: 2011/14/01
  • Number: 08671297
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Network communications over shared links in a virtualized environment

A physical host executes a virtual machine monitor (VMM) that instantiates a plurality of virtual machines (VMs). The VMM supports processing of a virtual link manager (VLM) that deploys and configures a plurality of Layer 2 virtual links sharing bandwidth of a Layer 2 physical link between the physical host and an access switch. The VMM communicates parameters of the plurality of virtual links with the access switch.

  • Pub Date: 2011/14/01
  • Number: 08582462
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods to generate security profile for restricting resources used by a program based on entitlements of the program

In response to a request for launching a program, a list of one or more application frameworks to be accessed by the program during execution of the program is determined. Zero or more entitlements representing one or more resources entitled by the program during the execution are determined. A set of one or more rules based on the entitlements of the program is obtained from at least one of the application frameworks. The set of one or more rules specifies one or more constraints of resources associated with the at least one application framework. A security profile is dynamically compiled for the program based on the set of one or more rules associated with the at least one application framework. The compiled security profile is used to restrict the program from accessing at least one resource of the at least one application frameworks during the execution of the program.

  • Pub Date: 2011/14/01
  • Number: 08473961
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of treating pulmonary hypertension

Methods of treating pulmonary hypertension are disclosed. Particular methods comprise the administration of a tryptophan hydroxylase inhibitor and a prostacyclin. Pharmaceutical formulations are also disclosed.

  • Pub Date: 2011/14/01
  • Number: 08410121
  • Owner: Lexicon Pharmaceuticals, Inc.
  • Location: The Woodlands, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of treating female subjects in need of in vitro fertilization

Described herein are methods of treating a female subject in need of in vitro fertilization to become pregnant by detecting a loss of non-atretic follicles in the female subject and providing in vitro fertilization to the female subject.

  • Pub Date: 2011/14/01
  • Number: 09267111
  • Owner: The General Hospital Corporation
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for managing authority designation of graphical user interfaces

According to one aspect, a graphics management system receives a first message from a first process for granting one or more rights to a second process for accessing a GUI element owned by the first process. In response, the graphics management system transmits a second message to the second process, the second message offering the one or more rights to the second process. The graphics management system receives a third message from the second process indicating an acceptance of the offer. Thereafter, the graphics management system restricts access of the GUI element by the second process based on the one or more rights accepted by the second process.

  • Pub Date: 2011/14/01
  • Number: 08365192
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for radioablation of regular targets such as sympathetic nerves

Techniques for radioablation of sympathetic nerves include positioning a subject on a support in view of a volume imaging system and an ionizing radiation source; and collecting volume image data. Location of a treatment portion of a sympathetic nerve in the subject is determined based on the volume image data. Movement of the source is determined to apply a therapeutic radiation dose to the treatment portion based on the location of the treatment portion and relative location of the source to the volume imaging system. The source is operated to deliver the therapeutic radiation dose. An apparatus includes a mounting structure, an X-ray source and a shield. The source produces an X-ray beam with photon energy above one million electron volts (MeV) and not above six MeV. The shield is mounted in opposition to the source to block the X-ray beam with photon energies not greater than about six MeV.

  • Pub Date: 2011/14/01
  • Number: 09072894
  • Owner: The Board of Trustees of the Leland Stanford Junior University
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Management apparatus, system, and management method

A management apparatus transmits a reservation request for specifying time for turning off power supply of an image processing apparatus in response to determination that current time is in a time period for turning off the power supply of image processing apparatus if a start-up request is received from the image processing apparatus, transmits a start-up response for permitting start-up of functions other than a communication function provided in the image processing apparatus when a reservation response, to the reservation request from the image processing apparatus, including specified time for turning off the power supply of the image processing apparatus is received, and transmits a command for turning off the power supply of the image processing apparatus at the time specified by the reservation response, to the image processing apparatus.

  • Pub Date: 2011/14/01
  • Number: 08854656
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Dynamic service discovery

When an application is launched, a framework scanning module scans a plurality of frameworks linked against by the application to generate a list of available services. When the application makes a request of a particular service, a service verification module compares the requested service to the list of available services and if the requested service is found in the list of available services, sends a signal to the application, the signal allowing access to the requested service for the application. Otherwise, access to the requested service is denied.

  • Pub Date: 2011/14/01
  • Number: 08671416
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Data staging for results of analytics

Data staging for results of analytics according to an example method includes maintaining current results from the analytics in a first data structure, the first data structure having a label identifying first data structure as a target for queries. The method also includes maintaining prior results from the analytics in at least one other data structure. The method also includes changing the label of the first data structure after a predetermined time. The method also includes assigning the label to one of the other data structures, wherein the label identifies the one of the other data structures as the target for queries.

  • Pub Date: 2011/14/01
  • Number: 09251215
  • Owner: Hewlett Packard Enterprise Development LP
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Common services web hosting architecture with multiple branding and OSS consistency

A website hosting service provides a plurality of services, from a common service architecture, to each of a plurality of unrelated websites, each of the plurality of services being adapted to contribute to a distinct service package for at least a plurality of unrelated websites, wherein the web hosting service is marketed through a plurality of marketing sites, each one of the plurality of marketing sites offering a different market specific offering and wherein a client hosting account initiated through a specific market specific offering is maintained under a consistent look and feel associated with the specific market specific offering when presenting client account service user interfaces.

  • Pub Date: 2011/14/01
  • Number: 08762463
  • Owner: Endurance International Group, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Carbon fibrous aggregator, method for manufacturing thereof, and composite material including thereof

Carbon fibrous aggregator obtained by a chemical vapor phase growing method, which comprises plural granular parts, and plural carbon fibers which are mutually independently extended outwardly from their respective granular parts so that each granular part is associated with two or more of carbon fibers, wherein the carbon fibers show a three dimensional expansion in all; and

  • Pub Date: 2011/14/01
  • Number: 08309227
  • Owner: Hodogaya Chemical Co., Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Application programming interfaces for synchronization

The application programming interface operates in an environment with user interface software interacting with multiple software applications or processes in order to synchronize animations associated with multiple views or windows of a display of a device. The method for synchronizing the animations includes setting attributes of views independently with each view being associated with a process. The method further includes transferring a synchronization call to synchronize animations for the multiple views of the display. In one embodiment, the synchronization call includes the identification and the number of processes that are requesting animation. The method further includes transferring a synchronization confirmation message when a synchronization flag is enabled. The method further includes updating the attributes of the views from a first state to a second state independently. The method further includes transferring a start animation call to draw the requested animations when both processes have updated attributes.

  • Pub Date: 2011/14/01
  • Number: 08553038
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Animations

At least certain embodiments of the present disclosure include a method for animating a display region, windows, or views displayed on a display of a device. The method includes starting at least two animations. The method further includes determining the progress of each animation. The method further includes completing each animation based on a single timer.

  • Pub Date: 2011/14/01
  • Number: 08531465
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Thiazolopyrimidine PI3K inhibitor compounds and methods of use

  • Pub Date: 2011/13/01
  • Number: 08158626
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of quota accounting

Embodiments of the invention relate generally to incremental computing. Specifically, embodiments of the invention include systems and methods that provide for the concurrent processing of multiple, incremental changes to a data value while at the same time monitoring and/or enforcing threshold values for that data value. For example, a method is provided that implements domain quotas within a data storage system.

  • Pub Date: 2011/13/01
  • Number: 08195905
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for integrating a service access gateway with billing and revenue management systems

Systems and methods are described for integrating a gateway in a telecom network environment with charging and payment functionality. The gateway is provided with three points of integration with charging and billing servers. These three points include a payment service, a charging data record listener and a credit control interceptor. The payment service provides an interface for client applications that reside outside of the telecom network to invoke a charging request, to translate the charging request and to relay it to the billing server. The charging data record listener listens for charging data records generated within the gateway and issues offline charging requests to the billing server upon detecting that a particular charging data record has been generated. The credit control interceptor intercepts requests in the communication traffic flowing through the gateway and initiates online charging requests to the billing server upon intercepting said requests.

  • Pub Date: 2011/13/01
  • Number: 09432825
  • Owner: ORACLE INTERNATIONAL CORPORATION
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for merging disparate virtual universes entities

A migration tool for merging disparate virtual universes by selecting a source region or source account, selecting a destination edge or destination account, retrieving and storing virtual universe information for the source region or account, inserting the virtual universe resources of the source region or account into the destination region or account, activating the inserted resources, and deleting the source resources from the source region or account.

  • Pub Date: 2011/13/01
  • Number: 08019797
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for interacting with a set-top box using widgets

An approach is provided for enabling direct user interaction with specific items of content as presented by a content delivery system. Content is presented via a set-top box concurrently with a widget, indicating one or more items specified in content. User input relating to selection of one of the items is received. An interactive platform, in response to the input, generates a request specifying the selected item for purchase.

  • Pub Date: 2011/13/01
  • Number: 08984562
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Extending a processor system within an integrated circuit and offloading processes to process-specific circuits

A method of extending a processor system within an integrated circuit (IC) can include executing program code within the processor system implemented within the IC, wherein the IC includes a programmable fabric. The processor system further can be coupled to the programmable fabric. A process can be performed using a process-specific circuit implemented within the programmable fabric in lieu of using the processor system. A result of the process from the process-specific circuit can be made available to the processor system.

  • Pub Date: 2011/13/01
  • Number: 09135213
  • Owner: XILINX, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Continuous biomolecule separation in a nanofilter

This invention provides a method and an apparatus for quickly continuously fractionating biomolecules, such as DNAs, proteins and carbohydrates by taking advantage of differential bidirectional transport of biomolecules with varying physico-chemical characteristics, for example size, charge, hydrophobicity, or combinations thereof, through periodic arrays of microfabricated nanofilters. The passage of biomolecules through the nanofilter is a function of both steric and electrostatic interactions between charged macromolecules and charged nanofilter walls, Continuous-flow separation through the devices of this invention are applicable for molecules varying in terms of any molecular properties (e.g., size, charge density or hydrophobicity) that can lead to differential transport across the nanofilters.

  • Pub Date: 2011/13/01
  • Number: 08783466
  • Owner: Massachusetts Institute of Technology
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Compounds for the treatment of autism

A compound which inhibits the importation of chloride into neurons and a compound which improve the outflow of chloride from neurons for the use in treatment of autism, a pharmaceutical composition for use in the treatment of autism including such compound and a pharmaceutically acceptable carrier are described.

  • Pub Date: 2011/13/01
  • Number: 09415028
  • Owner: CHU DE BREST
  • Location: Brest, FR
  • Details: Visit USPTO

Visit USPTO Page


Techniques for sensor based attack reflection

Techniques for sensor based attack reflection are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for sensor based attack reflection comprising detecting an attack at a sensor, identifying a portion of memory associated with the attack, redirecting at least the identified portion of memory to a secure network using an access point, extracting data associated with the attack on the secure network, redirecting a response to the attack from the secure network to the sensor, transmitting the response from the sensor to a network location associated with the attack, receiving a subsequent attack communication based on the response at the access point, redirecting the subsequent attack communication to the secure network, and analyzing the subsequent attack communication.

  • Pub Date: 2011/12/01
  • Number: 09185132
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing recategorization of financial transactions using collaborative filtering

A method to optimize recategorization of financial transactions using collaborative filtering involves obtaining a set of financial transactions of a set of users with a merchant. The method also involves determining, using a processor, a first portion of the set of financial transactions assigned to each recategorization value of a set of recategorization values; determining, using the processor, a second portion of the set of financial transactions where the each recategorization value is different from an initial category; generating, using the processor, a recategorization index for each recategorization value using the first portion of each recategorization value and the second portion; and determining, using the processor, an alternative categorization candidate based on the recategorization index of the each recategorization value.

  • Pub Date: 2011/12/01
  • Number: 08538967
  • Owner: Intuit Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Non-invasive treatment of neurodegenerative diseases

Methods and devices for the non-invasive treatment of neurodegenerative diseases through delivery of energy to target nervous tissue, particularly the vagus nerve. In certain embodiments, the devices include a magnetic stimulator having coils with toroidal windings, which are in contact with an electrically conducting medium that is adapted to conform to the contour of a target body surface of a patient. The coils induce an electric current and/or an electric field within the patient, thereby stimulating nerve fibers within the patient. The stimulation brings about reduction of neuroinflammation in patients suffering from conditions comprising Alzheimer's Disease, Parkinson's Disease, Multiple Sclerosis, postoperative cognitive dysfunction and postoperative delirium.

  • Pub Date: 2011/12/01
  • Number: 08868177
  • Owner: Electrocore, LLC
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-tenant audit awareness in support of cloud environments

A cloud enablement aggregation proxy (CEAP) receives and processes audit data from audited resources before such data is stored in a database. The CEAP manages log data for resources hosted in a multi-tenant shared pool of configurable computing resources (e.g., a compute cloud). A method for managing log data begins by the proxy aggregating and normalizing log information received from a plurality of the resources. The aggregated and normalized log information is then parsed to identify a tenant associated with each of a set of transactions. For each of the set of transactions, the CEAP annotates log data associated with the tenant and the particular transaction to include a tenant-specific identifier. An optional tenant separation proxy (TSP) separates the annotated log data on a per tenant basis prior to storage, and the tenant-specific log data may be stored in per tenant data structures or dedicated tenant log event databases to facilitate subsequent compliance or other analysis.

  • Pub Date: 2011/12/01
  • Number: 09460169
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Ink ejection mechanism with thermal actuator coil

A micro-electromechanical ejection mechanism is disclosed for ejecting an ink droplet. The mechanism has a wafer substrate and an ink chamber formed on the wafer substrate. The ink chamber has an ink ejection nozzle formed in a roof thereof and an ink inlet port formed in a floor thereof. A paddle device is arranged inside the ink chamber between the inlet port and the ejection nozzle A bi-layer thermal actuator coil is also included with a first end thereof fast with the substrate and a second end connected to the paddle device. Heating of the thermal actuator coil displaces the paddle device, causing ejection of an ink droplet through the ink ejection nozzle.

  • Pub Date: 2011/12/01
  • Number: 08029101
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing multiple entities with access to account information

A user may log into a system containing data pertaining to a jointly owned funding account of which he is a co-owner. The user may view information directed to the jointly owned funding account, such as his bills and bills associated with other co-owners. The user may pay bills or schedule payments of bills from the funding account. A co-owner of the funding account may set up an account with a biller and enable other co-owners of the funding account to use this information, thereby providing the other co-owners with the same or similar functionality when they log into the system using their own login information. The information that the co-owner may set up with a biller may be ported over to the information maintained by the system that is directed to the other co-owners.

  • Pub Date: 2011/11/01
  • Number: 08341082
  • Owner: United Services Automobile Association (USAA)
  • Location: San Antonio, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing transactions with a portable computing device

A method and system include verifying credentials for gaining access to a transactional controller with the portable computing device. The transactional controller may receive a merchant identifier corresponding to a merchant and then it may compare the merchant identifier against loyalty account data stored in a database. The transactional controller may also receive product scan data and compare the product scan data against one of offer data and coupon data in a database. After these comparisons, any matches of product scan data to offer data or coupon data may be sent to the PCD and the POS controller. Similarly, any matches of the merchant identifier to loyalty account data may be transmitted to the POS controller. During or after the purchase transaction, a message may be generated by the transaction controller which lists one or more preferred payment options that may be selected using the PCD to complete a purchase.

  • Pub Date: 2011/11/01
  • Number: 08660948
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for event-driven inventory disposition

A method and system for event-driven inventory disposition are disclosed. According to one embodiment, a method may include detecting a disposition event associated with a given one of a number of inventory items. The method may further include evaluating each of a number of disposition channels with respect to the given item in response to detecting the disposition event, and dependent upon the evaluation, selecting a particular disposition channel through which to dispose of the given item. In one particular implementation of the method, detecting the disposition event may include detecting an indication that an expected profitability of the given item is less than a threshold value.

  • Pub Date: 2011/11/01
  • Number: 08463665
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Multimedia communication system and method

Systems and methods are disclosed for creating, editing, sharing and distributing high-quality, media-rich web-based communications. The communications are created in a layered fashion that integrates user-selected text, colors, background patterns, images, sound, music, video, or other media. The systems and methods are used to generate, edit, broadcast, and track electronic presentations, brochures, advertisements (such as banner advertisements on highly trafficked media websites), announcements, and interactive web pages, without the need for the user to understand complex programming languages.

  • Pub Date: 2011/11/01
  • Number: 08356253
  • Owner: Impact Engine, Inc.
  • Location: La Jolla, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for energy efficient routing and network services

A method and system of an embodiment may include identifying a power source used by a network element, determining a carbon footprint of a unit of power usage from the power source, identifying one or more components associated with the network element used for a network operation performed by the network element, determining the power usage of the one or more identified components during the process, and calculating the carbon footprint of the process performed by the network element.

  • Pub Date: 2011/11/01
  • Number: 08271647
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols

The disclosure provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one variation, the disclosure describes retaining compatibility with conventional Secure Sockets Layer (SSL) and SOCKS protocols, such that secure UDP datagrams can be transmitted between a proxy server and a client computer in a manner analogous to conventional SOCKS processing. Further, the disclosure describes a network arrangement that employs a cache having copies distributed among a plurality of different locations. SSL/TLS session information for a session with each of the proxy servers is stored in the cache so that it is accessible to at least one other proxy server. Using this arrangement, cached SSL/TLS communication session information may be retrieved and used by a second proxy server to accept a session with the client device when the client device switches proxy servers.

  • Pub Date: 2011/11/01
  • Number: 08533457
  • Owner: Aventail LLC
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for an itinerary planner

A method and apparatus for providing an itinerary planner is described. The itinerary planner generates itineraries for visiting locations which are personalized to the user's preferences. Unknown conditions are handled by contingency plans that the itinerary planner generates in an anytime manner. The first itineraries are derived in a short time, and as more computation time is allowed, additional itineraries that better suit the preferences of the user are obtained.

  • Pub Date: 2011/11/01
  • Number: 08050949
  • Owner: Sony Electronics Inc.
  • Location: Park Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Evaluating public records of supply transactions for financial investment decisions

A platform facilitates buyers, sellers, and third parties in obtaining information related to each other's transaction histories, such as a supplier's shipment history, the types of materials typically shipped, a supplier's customers, a supplier's expertise, what materials and how much a buyer purchases, buyer and shipper reliability, similarity between buyers, similarity between suppliers, and the like. The platform aggregates data from a variety of sources, including, without limitation, customs data associated with actual import/export transactions and facilitates the generation of reports as to the quality of buyers and suppliers, the reports relating to a variety of parameters that are associated with buyer and supplier quality.

  • Pub Date: 2011/11/01
  • Number: 08423425
  • Owner: Panjiva, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Enforcing universal access control in an information management system

A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

  • Pub Date: 2011/11/01
  • Number: 08464314
  • Owner: NextLabs, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Device driver for use in a data storage system

A device driver includes an aggregator aggregating data blocks into one or more container objects suited for storage in an object store; and a logger for maintaining in at least one log file for each data block an identification of a container object wherein the data block is stored with an identification of the location of the data block in the container object.

  • Pub Date: 2011/11/01
  • Number: 09256383
  • Owner: AMPLIDATA NV
  • Location: Lochristi, BE
  • Details: Visit USPTO

Visit USPTO Page


Data communicating apparatus and method for managing memory of data communicating apparatus

An IC card has a mechanism to securely manage information for each of a plurality of service providers in a memory area of the IC card. The IC card is shared by the plurality of service providers. File systems of the service providers are allocated in the memory area, and a single information recording medium is shared by the plurality of service providers. The memory area is separated into the file systems. A border between the file systems functions as a firewall, thus appropriately preventing one of the file systems from being intruded by the other file systems. Furthermore, by using a function of separating the memory area into a plurality of file systems together with a security code verification function of each file system, the security of each file system is independently managed.

  • Pub Date: 2011/11/01
  • Number: 08215547
  • Owner: Sony Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Crowdsourced multi-media data relationships

The present disclosure describes a data association and retrieval facility. Attribute resources, such as metadata tags, that are not to be rendered along with a file, and content resources, such as annotations and commentary, which are to be rendered along with a file are associated with files, in particular multi-media files. The attribute and content resources may be searched and filtered against, and statistics on of file and resource accesses are tracked. Attribute and content resources may also be aggregated and redistributed. Altogether, these facilities constitute a platform to develop crowd-sourced applications and content packages. Finally, various user interfaces supporting particular applications are disclosed.

  • Pub Date: 2011/11/01
  • Number: 09477667
  • Owner: Mobdub, LLC
  • Location: Brooklyn, US
  • Details: Visit USPTO

Visit USPTO Page


Connecting patients with emergency/urgent health care

A computer network-based service provides search capabilities and mechanisms for connecting potential patients with emergency, urgent, and convenient care facilities. Patients make informed decisions regarding their treatment options by reviewing search results regarding facility wait times, geographic proximities of facilities, quality ratings of facilities for particular specialties, etc. Upon selecting a facility, patients may electronically transmit a notification to the facility indicating their medical condition(s) and estimated arrival time. The facility may approve or deny the treatment request by sending an electronic response. The facility may also request further information to triage the patient before his/her actual arrival and/or may provide instructions to assist the patient while en route. Navigation satellite systems may identify the patient's location for processing search requests and determining the proximity of facilities. Further, contact mechanisms, e.g., phone numbers, for contacting facilities directly may be accessed from the search service and tracked.

  • Pub Date: 2011/11/01
  • Number: 09171342
  • Owner: Healthgrades Operating Company, Inc.
  • Location: Denver, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic story summarization from clustered messages

A set of stories may be related in a set of messages (e.g., news articles, weblog posts, or messages exchanged in a social network). Presented herein are techniques for automatically generating a summary of respective stories that may be used as a headline or title. These techniques involve identifying the entities referenced in each message, clustering the messages based on similarly referenced entities to generate a cluster of messages associated with each story, and identifying facts of the story that appear in many of the messages, which may be used to generate a perspective-independent summary of the story. Additionally, metadata regarding each message may be detected (e.g., the entities involved in each story, a meta-story of the story, and the perspective of the author in relating the story), and may be used to fulfill requests to filter the set of stories and/or messages based on these criteria.

  • Pub Date: 2011/11/01
  • Number: 08990065
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Automated method and system for collecting and reporting API performance profiles

A method to measure the performance of an Application Programming Interface (API) includes selecting a target API and tracking memory allocation for the functional calls of the selected API to generate a list of functions called by the API. The individual functions are then called within the API in isolation and timing and memory allocation data for each are collected and recorded. The recorded results are then bucketized according to a log base 2 method and made accessible by API users to indicate the performance of specific APIs.

  • Pub Date: 2011/11/01
  • Number: 09027000
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Agency management system and content management system integration

An agency management and content management integration system links agency management system domain entities (such as clients, policies, claims, vendors) to content management system content hierarchical structures (such as client files, policy folders, claims folders, vendor files). End users can quickly navigate to the appropriate content management system structure or structures when working with an entity in the agency management system via button integration. The agency management and content management integration system automatically creates and updates the content management system when changes are made to the agency management system. This may include providing multiple mappings between the entities of the insurance agency management system and content hierarchical structures, a preview of changes to the content hierarchical structures, a testing environment to test the content hierarchical structure changes, and troubleshooting logs resulting from testing of the content hierarchical structure. Also provided are systems to create appropriate initial content management system hierarchical structures when the agency management system already exists, and to update existing structures en masse if desired.

  • Pub Date: 2011/11/01
  • Number: 09384198
  • Owner: Vertafore, Inc.
  • Location: Bothell, US
  • Details: Visit USPTO

Visit USPTO Page


Verifying file versions in a networked computing environment

Embodiments of the present invention provide an approach for identifying a most recent version of an electronic file (e.g., prior to or while the electronic file is being opened). In one embodiment, an application programming interface (API), plug-in, or the like, can enable both file management tools and on-line repositories to exchange file information. Along these lines, this approach can be especially useful for common business assets such as textual documents, spreadsheets, and presentations. Moreover, this approach is a “pro-active” function in that it does not require the user to consciously seek out and determine if a newer version is available. The implementation of the method performs this function automatically.

  • Pub Date: 2011/10/01
  • Number: 09037597
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for voice and data communications including a scalable TDM switch/multiplexer

A method for operating a communications system is disclosed. At a first point in time, the communications system is operated using a first TDM switch/MUX controlling a first set of TDM streams operating at a first frequency. At a second point in time, a second TDM switch/MUX is installed in the communications system which controls the first set of TDM streams operating at the first frequency and also controls a second set of TDM streams operating at a second frequency that is different as compared to the first frequency. The second TDM switch/MUX couples TDM streams to and from the communications system at the first frequency, while concurrently coupling TDM streams to and from the communications system at the second frequency, and an upgradable switch/MUX capability is provided in the communications system.

  • Pub Date: 2011/10/01
  • Number: 08369317
  • Owner: Converged Data Solutions, Inc.
  • Location: Marshall, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for secure host resource management

Systems and methods are described herein to provide for secure host resource management on a computing device. Other embodiments include apparatus and system for management of one or more host device drivers from an isolated execution environment. Further embodiments include methods for querying and receiving event data from manageable resources on a host device. Further embodiments include data structures for the reporting of event data from one or more host device drivers to one or more capability modules.

  • Pub Date: 2011/10/01
  • Number: 08510760
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Smoking article with a restrictor

A smoking article filter includes a flow restrictor and a cavity downstream of the flow restrictor. The flow restrictor includes an orifice or flow channel for directing smoke into the cavity. The filter is attached to the tobacco rod with tipping paper and includes an air-admissible ventilating zone at a location downstream of the restrictor.

  • Pub Date: 2011/10/01
  • Number: 09060546
  • Owner: Philip Morris USA Inc.
  • Location: Richmond, US
  • Details: Visit USPTO

Visit USPTO Page


Managing online composite image content

A method includes receiving an upload request to retrieve a master image. The method further includes retrieving the master image in response to the upload request. The method also includes storing the retrieved master image. The method further includes generating a composite image file using the retrieved master image. The composite image file can be used to create a plurality of images derived from the master image.

  • Pub Date: 2011/10/01
  • Number: 08732266
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Friction fabrication tools

The present invention relates to tooling and methods for disposing, coating, building up, repairing, or otherwise modifying the surface of a metal substrate using frictional heating and compressive loading of a consumable metal material against the substrate. Embodiments of the invention include friction-based fabrication tooling comprising a non-consumable member with a throat and a consumable member disposed in the throat, wherein the throat is operably configured such that during rotation of the non-consumable member at a selected speed, the throat exerts normal forces on and rotates the consumable member at the selected speed; and comprising means for dispensing the consumable member through the throat and onto a substrate using frictional heating and compressive loading. Embodiments of the invention also include fabrication methods using the tools described herein.

  • Pub Date: 2011/10/01
  • Number: 08632850
  • Owner: Schultz-Creehan Holdings, Inc.
  • Location: Blacksburg, US
  • Details: Visit USPTO

Visit USPTO Page


Computerized system and method of recording communications between parties using telecommunications devices

A computerized system of recording communications between a first party and a second party automatically notifies the second party to the recording of the communication. A request is received at a first telecommunications device, utilized by the first party, to initiate the communications between the parties, either by receiving or placing a call or text message. A unique identifier identifying a second communications device, utilized by the second party, is received by the first telecommunications device. A warning message is then automatically sent to the second communications device that the communications are being recorded. The communications between the devices is then recorded.

  • Pub Date: 2011/10/01
  • Number: 08406740
  • Owner: Kohorts IT Services, LLC
  • Location: Brighton, US
  • Details: Visit USPTO

Visit USPTO Page


Visualizing communications within a social setting

A method is provided for visualizing communications in a social setting. A graphical virtual social venue is provided. Users of one or more social networks are invited to enter the venue and to participate in and share a social experience. Users are graphically represented within the virtual social venue and are able to communicate with each other. When users communicate with each other, the communications are tracked and visually represented in the virtual social venue with visual overlays. The visual overlays signify communicatively active parts of the social venue while keeping private the contents of the communication.

  • Pub Date: 2011/07/01
  • Number: 08667402
  • Owner: Javelin XIP, LLC
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Synchronizing development code and deployed executable versioning within distributed systems

The disclosure provides a solution for associating deployed executables with source code. In the solution, source code of a development environment can be mapped to a deployed executable of a runtime environment. The mapping can ensure that a version of source code from which the deployed executable was produced is always known. The mapping can occur within digitally encoded data stored in a non-transient storage medium. The development environment and the runtime environment can be two distinct and separate computing environments that are isolated from each other.

  • Pub Date: 2011/07/01
  • Number: 08683430
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Premium access to open application programming interface systems and methods

A method and system for granting premium access to a service application stored within a service provider (SP) computer system through an open API platform is provided. The method includes receiving a request for premium access to the service application from a developer of a developer application wherein the developer application is configured to request data from the service application, assigning a production key to the developer application, sending an electronic message to a service owner (SO) associated with the service application requesting premium access to the service application, granting premium access to the service application by the SO for the developer application, updating the production key at the open API platform to include premium access to the service application, and notifying the developer of the granting of the premium access to the service application for the developer application.

  • Pub Date: 2011/07/01
  • Number: 08458808
  • Owner: MasterCard International Incorporated
  • Location: Purchase, US
  • Details: Visit USPTO

Visit USPTO Page


Polling cable diagnostic and monitoring system that aggregates responses from multiple terminals

A cable television diagnostic method for a cable television network sends a polling message to a plurality of television set top boxes from a cable television headend; wherein the polling message instructs the cable television set top boxes to obtain at least one operational parameter of each of the television set top boxes; receiving a plurality of response messages from the cable television set top boxes, each containing the at least one operational parameter; determining that one of the operational parameters is outside of a specified range of values; and aggregating the operational parameters of the plurality of set top boxes to determine if the same operational parameter is outside the range of specified values for more than the one of the television set top boxes.

  • Pub Date: 2011/07/01
  • Number: 08352995
  • Owner: Sony Electronics Inc.
  • Location: Park Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile wireless communications device for validating access to an application based upon a validation request and related methods

A mobile wireless communications device may include a wireless transceiver and a controller coupled to the wireless transceiver. The controller may be configured to determine if an email address is associated with the mobile wireless communications device. The controller may further be configured to wirelessly send a validation request to a validation server based upon the email address, and wait for a validation email to be wirelessly received from the validation server based upon the validation request if the email address is associated with the wireless communications device, and if the validation email is wirelessly received, then validate access an application based upon the validation email.

  • Pub Date: 2011/07/01
  • Number: 08893296
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for throttling calls to a service application through an open API

A method and system for throttling a volume of request messages to a service application stored within a service provider (SP) computer system through an open application programming interface (API) platform is provided. The SP computer system is in communication with a memory device. The method includes storing a throttling profile for a developer application within the memory device wherein the throttling profile includes at least a throttling amount threshold and a throttling time period, receiving at the API platform a request message initiated by the developer application wherein the request message is included within a volume of request messages initiated by the developer application, identifying the request message as being associated with the developer application, retrieving the throttling profile for the developer application, and validating the volume of request messages as complying with the throttling profile.

  • Pub Date: 2011/07/01
  • Number: 08671385
  • Owner: MasterCard International Incorporated
  • Location: Purchase, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing, by a remote machine, access to graphical data associated with a resource provided by a local machine

A method for providing, by a remote machine, access to graphical data associated with a resource provided by a local machine includes initializing, by a remote agent on a remote machine, a proxy icon handler. The proxy icon handler receives, from an icon handler on a local machine, data associated with an icon for a resource provided by the local machine. The proxy icon handler modifies a window in a remote desktop environment displaying a plurality of icons including at least one icon associated with a resource provided by the remote machine and the icon associated with the resource provided by the local machine. The remote agent transmits, to the local machine, window attribute data associated with the modified window and graphical data representing the window displaying the plurality of icons. The local agent displays the received graphical data in a window formed according to the received window attribute data.

  • Pub Date: 2011/07/01
  • Number: 08296352
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing programmed applications in an open API environment

A method and system for an open application programming interface (API) dashboard system for monitoring and managing one or more developer programmed applications configured to use one or more services provided by a service owner are provided. The system includes an application area associated with a corresponding programmed application, each application area including a call metrics group configured to display summarized metrics, a services used group configured to display a listing of each service called by the programmed application and metrics associated with each service, and a key management group configured to prompt a developer of the programmed application to request or revoke a key, wherein the key includes a developer identification, a programmed application identification, and signed certificates relating to services used by the programmed application.

  • Pub Date: 2011/07/01
  • Number: 08707276
  • Owner: MasterCard International Incorporated
  • Location: Purchase, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for generating an API request message

A method and system for generating an application programming interface (API) request message for an API service application is provided. The API service application is stored within a service owner (SO) computer device and includes a memory device for storing data and a service provider (SP) computer system that includes a processor and an open API platform. The SP computer system in communication with the memory device and the SO computer device. The SP computer system is programmed to receive from a developer a plurality of selections of parameters defining an API service request, generate an API request message for a specific API service using the received parameter selections, the API request message including the received parameter selections in a predetermined format required by the specific API service, generate a response to the generated API request message, and display the generated API request message and response on a single webpage.

  • Pub Date: 2011/07/01
  • Number: 08677308
  • Owner: MasterCard International Incorporated
  • Location: Purchase, US
  • Details: Visit USPTO

Visit USPTO Page


Cooperative memory management

A method and an apparatus for selecting one or more applications running in a data processing system to reduce memory usage according to information received from the applications are described. Notifications specifying the information including application specific memory management capabilities may be received from the applications. A status of memory usage indicating lack of available memory may be determined to notify the selected applications. Accordingly, the notified applications may perform operations for application specific memory management to increase available memory.

  • Pub Date: 2011/07/01
  • Number: 08892827
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Content security for real-time bidding

A real-time-bidding process that includes security mechanisms that limits access to various aspects of the bidding process including communications between bidders, the user browser, and the auctioneer, and the content of bids received and utilized by the user browser.

  • Pub Date: 2011/07/01
  • Number: 08554683
  • Owner: Fox Audience Network, Inc.
  • Location: Los Angeles, US
  • Details: Visit USPTO

Visit USPTO Page


Conserving memory by using objects that are selectably mutable during runtime

Techniques are disclosed for providing support for objects that are selectably mutable during runtime. In one embodiment, an application programming interface (API) is provided that includes procedures for sealing and unsealing an object during runtime. Applications may use the API to prevent the object from being inadvertently modified, without having to create defensive copies of the object. Accordingly, processing and/or memory costs associated with executing the application may be reduced.

  • Pub Date: 2011/07/01
  • Number: 08589951
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Cable television viewing statistics

A cable television method for a cable television network involves sending a polling message to a modem forming a part of a television set top box from a cable television headend via a cable television cable connection to the set top box; wherein the polling message instructs the cable television set top box to report a currently tuned channel of the television set top box; receiving a response message from the cable television set top box transmitted by the modem and containing the currently tuned channel of the television set top box; and compiling the currently tuned channel information from a plurality of set top boxes received in response messages to determine actual program viewing statistics for a television time slot during which the polling responses were sent. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.

  • Pub Date: 2011/07/01
  • Number: 08413200
  • Owner: Sony Electronics Inc.
  • Location: Park Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Various methods and apparatuses for effective yield enhancement of good chip dies having memories per wafer

A method and apparatus are described in which an optimal configuration of memory instances is determined. The optimal configuration of memory instances to be fabricated with built-in repair capacity and memory instances that are non-repairable may provide a maximum number of good chip dies per wafer. An amount of memory instances to be fabricated with built-in repair capacity as well as a remaining amount of memory instances to be fabricated without any built-in repair components in the integrated circuit design is determined relative to achieving the maximum number of good chip dies per wafer for a given defect density and wafer area. The amount of good dies produced per fabricated wafer for a populated amount of memories with built-in repair components is determined to be between an amount established by a minimum limit for the die area up to the amount established by a maximum limit for the die area.

  • Pub Date: 2011/06/01
  • Number: 08359553
  • Owner: Synopsys, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for provisioning cloud computing environment resources based on social media analysis

A technique for provisioning computing environment resources based on social media analysis includes monitoring, using a data processing system, references (e.g., hyperlinks) provided by a first website to detect an anticipated flash crowd for a web-accessible resource (e.g., second website). The technique also includes generating, using the data processing system, a notice to allocate resources associated with the web-accessible resource to service the anticipated flash crowd.

  • Pub Date: 2011/06/01
  • Number: 08578028
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for monitoring a vehicle's energy source

One or more embodiments may include a method for remotely obtaining information about an energy source of a vehicle. Information identifying one or more vehicles and one or more drivers of the vehicles may be received at one or more computing devices remote from a vehicle. Instructions from the one or more remote computing devices may be transmitted requesting information from the identified vehicle(s) about a status of an energy source for the identified vehicle(s). The status information may be received at the remote computing device(s). Based on the energy source status information and the driver identifying information, a vehicle energy source status with respect to one or more attributes of the vehicle drivers may be calculated. Additionally, the vehicle energy source status may be displayed at the one or more devices.

  • Pub Date: 2011/06/01
  • Number: 08849499
  • Owner: Ford Global Technologies, LLC
  • Location: Dearborn, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for routing messages of a positioning protocol in a wireless network

Methods and apparatuses are provided that facilitate routing of messages of a positioning protocol, such as long term evolution (LTE) positioning protocol annex (LPPa). A positioning server can determine a network area identifier of one or more messages based at least in part on an identifier of a base station associated with the one or more messages. Based at least in part on the network area identifier, the positioning server can provide the one or more messages to an intermediate network node corresponding to the one or more base stations, such as a mobility management entity (MME). MME can similarly provide the one or more messages to an optional gateway between it and the one or more base stations based at least in part on receiving the network area identifier in the one or more messages. In addition, a base station can update positioning information with the positioning server.

  • Pub Date: 2011/06/01
  • Number: 09270587
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Irrigation system with ET based seasonal watering adjustment and soil moisture sensor shutoff

An irrigation system includes at least one environmental sensor, such as a solar radiation sensor, that is installed on an irrigation site, and a soil moisture sensor that is also installed on the irrigation site. Programming allows an estimated ET value to be calculated based at least in part on the output signal of the environmental sensor. A pre-programmed watering schedule is automatically modified based on the estimated ET value to thereby conserve water while maintaining the health of plants on the irrigation site. The system automatically inhibits irrigation when an output signal of the soil moisture sensor indicates an amount of moisture in the soil is above a predetermined threshold.

  • Pub Date: 2011/06/01
  • Number: 08606415
  • Owner: Hunter Industries, Inc.
  • Location: San Marcos, US
  • Details: Visit USPTO

Visit USPTO Page


Home energy management system incorporating a pool pump

An energy management system for a home network is provided. The energy management system includes one or more power consuming devices, including at least a pool pump system having a motor and a filter with a filtration cycle, a central controller operatively connected to the power consuming devices and configured to receive and process a signal indicative of the current state of an associated utility, including at least a peak demand state and an off-peak demand state, and a display. The central controller is configured to operate the pool pump system in one of a plurality of operating modes, including at least a normal operating mode and an energy savings mode, and to provide pool pump usage information to a user via a user interface on the display.

  • Pub Date: 2011/06/01
  • Number: 08489242
  • Owner: General Electric Company
  • Location: Schenectady, US
  • Details: Visit USPTO

Visit USPTO Page


Diffusion-based magnetic resonance methods for characterizing bone structure

A method of in vitro or in vivo nuclear magnetic resonance and/or magnetic resonance imaging, to determine bone properties by measuring the effects of molecular diffusion inside the bone specimen to derive parameters that are related to the structure of the trabecular bones. The method is a non-invasive probe that provides topological information on trabecular bone without requiring a full high-resolution image of its structure, and is compatible with clinical use.

  • Pub Date: 2011/06/01
  • Number: 08473046
  • Owner: Schlumberger Technology Corporation
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Completion processing for data communications instructions

Completion processing of data communications instructions in a distributed computing environment with computers coupled for data communications through communications adapters and an active messaging interface (‘AMI’), injecting for data communications instructions into slots in an injection FIFO buffer a transfer descriptor, at least some of the instructions specifying callback functions; injecting a completion descriptor for each instruction that specifies a callback function into an injection FIFO buffer slot having a corresponding slot in a pending callback list; listing in the pending callback list callback functions specified by data communications instructions; processing each descriptor in the injection FIFO buffer, setting a bit in a completion bit mask corresponding to the slot in the FIFO where the completion descriptor was injected; and calling by the AMI any callback functions in the pending callback list as indicated by set bits in the completion bit mask.

  • Pub Date: 2011/06/01
  • Number: 08775531
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic key programming

Methods are disclosed for programming shortcut keys on a computing device, such as a digital telephony device. One method comprises extracting user context information for a user from a server in communication with the digital telephony device. Key feature grouping information can be created based on the user context information. A key mapping layout can be generated for the digital telephony device by applying rules to designate an order in which selected groups in the key feature grouping information are assigned to selected keys on the digital telephony device to generate a key mapping layout. The keys on the digital telephony device can be programmed using the key mapping layout.

  • Pub Date: 2011/06/01
  • Number: 08315371
  • Owner: Mitel Networks Corporation
  • Location: Ottawa, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Added features of HEM/HEG using GPS technology

A GPS-based energy management system for a home network is provided that includes a plurality of energy consuming devices. The system comprises a central controller operatively connected to each energy consuming device, and one or more GPS-enabled devices configured to communicate with the central controller. The central controller is programmed to modify the behavior of the energy consuming devices based on the location of at least one member of a home network.

  • Pub Date: 2011/06/01
  • Number: 08798804
  • Owner: General Electric Company
  • Location: Schenectady, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program product for gathering device information to enable identification of potential risks in a network environment

According to one embodiment, a system for creating a list of related defects in a network environment includes a processor, and a computer readable storage medium having computer readable program code embodied therewith. The computer readable program code includes computer readable program code that, when executed by the processor, causes the system to acquire a device list related to devices in multiple paths of a network, computer readable program code that, when executed by the processor, causes the system to query one or more information sources using the device list to retrieve defect data from the one or more information, sources, computer readable program code that, when executed by the processor, causes the system to create a list of related defects based on the retrieved defect data, and computer readable program code that, when executed by the processor, causes the system to output the list of related defects.

  • Pub Date: 2011/05/01
  • Number: 08677184
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for communicating data between an application server and an M2M device

Systems and methods for communication data between an application server and at least one machine-to-machine (M2M) device via an internet network and a network are provided. An example system includes a network element configured to schedule delivery of the data between the application server and at least one M2M device based on network information. The network element is located on a boundary between the network and the intern et network to which the application server communicates with the at least one M2M device.

  • Pub Date: 2011/05/01
  • Number: 09071925
  • Owner: Alcatel Lucent
  • Location: Boulogne-Billancourt, FR
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for oilfield data repository

The invention relates to a method for performing operations of an oilfield having at least one wellsite, a surface network, and a process facility, each wellsite having a wellbore penetrating a subterranean formation for extracting fluid from an underground reservoir therein. The method includes storing oilfield data associated with a plurality of oilfield entities in a first data repository, obtaining a first target metamodel comprising structural description of a first plurality of data entities of the first data repository, obtaining a domain metamodel interleaved with a first mapping specification, the domain metamodel comprising structural description of a domain model for representing the plurality of oilfield entities in an application programming interface, obtaining a mapping specification associating the first target metamodel with the domain metamodel and forming the application programming interface based on the domain metamodel, the first target metamodel, and the first mapping specification using a computer implemented method.

  • Pub Date: 2011/05/01
  • Number: 08326888
  • Owner: Schlumberger Technology Corporation
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for development and use of a credit score based on spend capacity

Share of Wallet (“SOW”) is a modeling approach that utilizes various data sources to provide outputs that describe a consumers spending capability, tradeline history including balance transfers, and balance information. These outputs can be appended to data profiles of customers and prospects and can be utilized to support decisions involving prospecting, new applicant evaluation, and customer management across the lifecycle. A SOW score focusing on a consumer's spending capability can be used in the same manner as a credit bureau score.

  • Pub Date: 2011/05/01
  • Number: 08315942
  • Owner: American Express Travel Related Services Company, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for detach handling in multiple access wireless communications

Methods and apparatuses are provided that facilitate detaching one of a plurality of network connections to ensure state information is retained at one or more network nodes. For a device initiated detach, the device can transmit a handover message related to performing a handover of one network connection to another active network connection, as opposed to explicitly detaching the network connection. This can cause at least some state information, such as a gateway identifier, to be retained in one or more network nodes. For a network initiated detach, a gateway can provision state information to a state information server following receiving a routing tunnel termination message to ensure state information deleted as a part of the detach is re-provisioned to the state information server.

  • Pub Date: 2011/05/01
  • Number: 08774090
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system and method for detecting malicious code

Provided are an apparatus, system and method for detecting malicious code inserted into a normal process in disguise. The apparatus includes a malicious code detection module for extracting information on a thread generated by a process running on a computer system to identify code related to the thread, preliminarily determining whether or not the identified code is malicious and extracting the code preliminarily determined to be malicious; and a forcible malicious code termination module for finally determining the code as malicious code based on an analysis result of behavior of the extracted code executed in a virtual environment and forcibly terminating execution of the code.

  • Pub Date: 2011/05/01
  • Number: 08955124
  • Owner: Electronics and Telecommunications Research Institute
  • Location: Daejeon, KR
  • Details: Visit USPTO

Visit USPTO Page


Transferring web data between operating system environments

An electronic device having a multi-environment operating system (OS) is disclosed. The electronic device creates a web session and/or updates a browser configuration in a first OS environment based on a web session and/or a browser configuration in a second OS environment. The web session is created and/or the browser configuration is updated when a primary OS environment transitions from the second OS environment to the first OS environment. The transition may occur when the device transitions from a docked mode to a mobile mode, or from a mobile mode to a docked mode.

  • Pub Date: 2011/04/01
  • Number: 08782258
  • Owner: Motorola Mobility LLC
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Summarizing portlet usage captured responsive to trigger events in a portal page

A portal summary controller monitors usage metadata indicating current usage of at least one portlet within at least one portal page for one of multiple events specified to trigger storage of the usage metadata. Responsive to detecting one of the multiple events within the usage metadata which triggers storage, the portal summary controller stores the detected usage metadata at a current time of at least one instance of at least one portlet application within the at least one portal page. Subsequent to storing separate detected usage metadata at multiple different times, the portal summary controller dynamically creates a summary portal page displaying a separate instance of the at least one portlet application for at least one of each of the multiple different times specified according to the separate usage metadata stored at each of the multiple different times, such that the summary portal page provides a summary of at least a selection of previous usage metadata selected by a user of the at least one portal page based on usage metadata stored responsive to trigger events.

  • Pub Date: 2011/04/01
  • Number: 08615711
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Social television

A system may include a media content processing subsystem configured to provide media content to a display device. The system may further include an adjunct computing device in communication with the media content processing subsystem and configured to receive interactive program guide data, receive social information associated with an account on a social network, and display the interactive program guide data augmented with the social information.

  • Pub Date: 2011/04/01
  • Number: 08863185
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Real time electronic commerce telecommunication system and method

An auction system and method, which identifies at least one lot to be auctioned, having a plurality of units within the lot and associated auction parameters; transmits a remaining quantity of units within the lot from a central server to a plurality of remote locations; receives bid identifications for remaining units within the lot at the contemporaneous offering price from the plurality of remote locations; and decrements the offering price over time. The decrement may be adaptive to a bid activity pattern, and the bid activity pattern may be stored in a database. A local server may be provided to communicate between the central server and remote locations while changing the format of the information communicated. The packets preferably include compressed information, and preferably include quantity remaining information for a plurality of auction lots.

  • Pub Date: 2011/04/01
  • Number: 08200547
  • Owner: Voyager Technologies, Inc.
  • Location: Longwood, US
  • Details: Visit USPTO

Visit USPTO Page


Query-aware compression of join results

A method is provided for compressing results of a join query. A join order of a result set comprising multiple tuples is determined from the join query, and a nested hierarchy of dictionaries is maintained based on the join order. The nested hierarchy of dictionaries is used to encode each of the tuples of the result set so as to produce an encode tuple, and each of the encoded tuples is transmitted to a client system. Also provided is a method for decompressing results of a join query.

  • Pub Date: 2011/04/01
  • Number: 08423522
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile communications resource management system

A mobile communications resource manager including a smart card configured to accept and store a user's personal information suitable for use in commercial transactions (physical tap or electronically) and communications operations, a cellular radio modem, at least one non-cellular radio modem and a controller. The controller is configured for establishing a short-range wireless connection via said non-cellular modem to at least one user accessible electronic device with human interface functionality and accepting a service request from the at least one user accessible electronic device and making a modem selection by selecting either a cellular or a non-cellular connection via a modem resident in the mobile communications resource manager to provide the communications link for the service request, based on a rule resident in the mobile communications resource manager.

  • Pub Date: 2011/04/01
  • Number: 08666437
  • Owner: Iota, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Leveraging passive networks

System and methods for leveraging passive networks are disclosed. In one embodiment, a method includes receiving, from a first data source, a first data descriptor, wherein the first data descriptor identifies an instance of contact between at least two persons. The method also includes determining a connection between the at least two persons, wherein the connection is based on an instance of contact between the at least two persons identified in the first data descriptor. The method further includes determining, with a processor, a first contact count for the connection, the first contact count based on a number of instances of contact between the at least two persons associated with the connection. The method also includes calculating, with the processor, a connection score for the connection, wherein the connection score is based at least in part on the first contact count.

  • Pub Date: 2011/04/01
  • Number: 08572242
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Call intercept methods, such as for customer self-support on a mobile device

A method for intercepting calls from a remote or mobile device for customer self-support detects when users or subscribers dial one or more predetermined numbers. If the number corresponds to one of the predetermined numbers (such as a customer support number), the phone may intercept the call and display a list of potential solutions to the subscriber's problems. Various other features and embodiments art disclosed.

  • Pub Date: 2011/04/01
  • Number: 08285263
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Automatically and securely configuring and updating virtual machines

A method and program product for automatically and securely updating software on a virtual machine (VM). A VM coming online in a virtualized server is detected. A current version of the software that is installed on the VM is determined. The current version is determined to not match an updated version of the software available from a remote update server via a network. The updated version of the software is received from the remote update server and via the network without the VM being connected to the network. A confirmation is received indicating that the updated version of the software is installed on the VM. In response to receiving the confirmation, the VM is connected to the network.

  • Pub Date: 2011/04/01
  • Number: 08578376
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Alert event platform

Various systems, processes, tools and techniques are provided for managing and processing alerts associated with different business events that impact a corporate entity. In various aspects, the system may employ an event-driven architecture to process business events and then provide customers and other system users with a mechanism for having have visibility into those business events through a subscription process, for example. Subscribers may be offered the ability to tap into different streams of business events, filter the event streams to obtain information only for events of interest, and then receive alerts associated with the events via one or more communication media or channels.

  • Pub Date: 2011/04/01
  • Number: 08856807
  • Owner: The PNC Financial Services Group, Inc.
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Zero-copy direct memory access (DMA) network-attached storage (NAS) file system block writing

A method is provided for a network-attached storage (NAS) server to directly write data to a disk or block device within a storage subsystem. A NAS server Ethernet interface receives a file, and writes the file data into kernel space as PDU segments. A TCP/IP stack maps the file data in kernel space RAM as sequentially ordered segments. The NAS/CIFS server application sends a call specifying file storage data. A zero-copy DMA application receives the call, maps a file offset to a Logical Block Address (LBA) in the block device, and requests that the block device DMA application transfer the file data. Without rewriting the file data in the system RAM, the block driver DMA application transfers the file data, in units of file system blocks, directly from kernel space RAM to the block device, with each file system block written in a single write operation.

  • Pub Date: 2011/03/01
  • Number: 09092426
  • Owner: Applied Micro Circuts Corporation
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Web-based recruitment system

A method and system for facilitating the hiring and recruitment of candidates for a particular position. The system would include information relating to the skill level and expertise of various candidates irrespective of a particular job. The candidates will have their various skills assessed through the use of an anonymous assessor. The assessor would provide the system with a rating of each candidate's various assessed skills. The candidate has the option to have this assessment evaluated by a disinterested third party. A client or employer would access the system for the purpose of receiving a listing of potential candidates, their skill levels as well as assessments. The client will provide the system with a list of potential candidates to the position. The clients would utilize this information to hire a particular candidate.

  • Pub Date: 2011/03/01
  • Number: 08655793
  • Details: Visit USPTO

Visit USPTO Page


Tools enabling preferred domain positioning on a registration website

The present inventions may be implemented by tools enabling preferred domain positioning on a registration website. An example may comprise a computer-readable media storing instructions that, when executed by a server computer, cause the server to receive a bid from a registry seeking such preferred placement for a domain (that may be administered by the registry), generate a quality score for the domain, and determine the preferred placement based upon the bid and the quality score.

  • Pub Date: 2011/03/01
  • Number: 08620761
  • Owner: Go Daddy Operating Company, LLC
  • Location: Scottsdale, US
  • Details: Visit USPTO

Visit USPTO Page


Secure electronic mail system with for your eyes only features

An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. An exemplary method for communicating e-mail messages includes receiving an e-mail message from a sender addressed to a recipient, receiving a request for access to the e-mail message from an e-mail client associated with the recipient, and providing the e-mail client with access to the e-mail message. The method further includes receiving a navigation notification indicating a navigation away from the e-mail message followed by a navigation return to the e-mail message, and in response, withholding access to the e-mail message by the e-mail client, and providing the e-mail client with a message placeholder.

  • Pub Date: 2011/03/01
  • Number: 08688790
  • Owner: Email2 SCP Solutions Inc.
  • Location: Vancouver, British Columbia, CA
  • Details: Visit USPTO

Visit USPTO Page


Managing cache memory in a parallel processing environment

An apparatus comprises a plurality of processor cores, each comprising a computation unit and a memory. The apparatus further comprises an interconnection network to transmit data among the processor cores. At least some of the memories are configured as a cache for memory external to the processor cores, and at least some of the processor cores are configured to transmit a message over the interconnection network to access a cache of another processor core.

  • Pub Date: 2011/03/01
  • Number: 08200901
  • Owner: Tilera Corporation
  • Location: Westborough, US
  • Details: Visit USPTO

Visit USPTO Page


Detecting user-mode rootkits

A method and system for determining whether resources of a computer system are being hidden is provided. The security system invokes a high-level function of user mode that is intercepted and filtered by the malware to identify resources. The security system also directly invokes a low-level function of kernel mode that is not intercepted and filtered by the malware to identify resources. After invoking the high-level function and the low-level function, the security system compares the identified resources. If the low-level function identified a resource that was not identified by the high-level function, then the security system may consider the resource to be hidden.

  • Pub Date: 2011/03/01
  • Number: 08661541
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Closing a video stream object

Techniques are provided for facilitating processing of interlaced video images for progressive video displays. A method receives from a renderer a query for a graphics device driver to a graphics processing capability that can be performed by an associated graphics device in de-interlacing video data, communicating the query to the graphics device driver, receiving from the graphics device driver a response to the query that identifies the graphics processing capabilities to the renderer, and communicating the response to the renderer. The method includes receiving from the renderer a further query for the graphics device driver to at least one input requirement associated with the identified graphics processing capability, communicating the further query to the graphics device driver, receiving from the graphics device driver a further response to the further query that identifies the input requirement(s) associated with the graphics processing capability, and communicating the further response to the renderer.

  • Pub Date: 2011/03/01
  • Number: 08176500
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


If you have any questions about these patents, or know of other patents that I should have listed here, please feel free to reach out and submit a Github issue. I'm always looking for new patents, as well as legacy patents, or more important patent litigation that is occurring, and I depend on my audience and network to help keep me in tune.