FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Den patents



      
           
This page is updated frequently with new Den-related patent applications. Subscribe to the Den RSS feed to automatically get the update: related Den RSS feeds. RSS updates for this page: Den RSS RSS


Date/App# patent app List of recent Den-related patents
10/23/14
20140317788
 Non-transgenic tomato varieties having increased shelf life post-harvest patent thumbnailNon-transgenic tomato varieties having increased shelf life post-harvest
A series of independent human-induced, non-transgenic mutations found in at least one non-ripening (nor) gene of tomato; tomato plants having these mutations in at least one of their nor genes; and a method of creating and identifying similar and/or additional mutations in the nor gene by screening pooled and/or individual tomato plants. The tomato plants of the present invention exhibit fruit that ripen more slowly, rot more slowly, are firmer, and have a longer shelf life post-harvest as a result of non-transgenic mutations in at least one of their nor genes..
10/23/14
20140317787
 Non-transgenic tomato varieties having increased shelf life post-harvest patent thumbnailNon-transgenic tomato varieties having increased shelf life post-harvest
A series of independent human-induced, non-transgenic mutations found in at least one non-ripening (nor) gene of tomato; tomato plants having these mutations in at least one of their nor genes; and a method of creating and identifying similar and/or additional mutations in the nor gene by screening pooled and/or individual tomato plants. The tomato plants of the present invention exhibit fruit that ripen more slowly, rot more slowly, are firmer, and have a longer shelf life post-harvest as a result of non-transgenic mutations in at least one of their nor genes..
10/23/14
20140317781
 Isolated polynucleotides and polypeptides, transgenic plants comprising same and uses thereof in improving abiotic stress tolerance, nitrogen use efficiency, biomass, vigor or yield of plants patent thumbnailIsolated polynucleotides and polypeptides, transgenic plants comprising same and uses thereof in improving abiotic stress tolerance, nitrogen use efficiency, biomass, vigor or yield of plants
Methods of improving abiotic stress tolerance, nitrogen use efficiency, biomass, vigor or yield of a plant are provided. According to an aspect the method comprising expressing within the plant an exogenous polynucleotide having a nucleic acid sequence at least 90% identical to seq id nos: 103, 101-102, 104-216, 223-227, 264-416, wherein the nucleic acid sequence is capable of regulating abiotic stress tolerance of the plant, thereby improving abiotic stress tolerance, nitrogen use efficiency, biomass, vigor or yield of the plant.
10/23/14
20140317774
 Genetic markers associated with drought tolerance in maize patent thumbnailGenetic markers associated with drought tolerance in maize
The presently disclosed subject matter relates to methods and compositions for identifying, selecting, and/or producing drought tolerant maize plants or germplasm. Maize plants or germplasm that have been identified, selected, and/or produced by any of the methods of the presently disclosed subject matter are also provided..
10/23/14
20140317773
 Yield traits for maize patent thumbnailYield traits for maize
Methods for introgressing an allele of interest of a locus associated with a yield trait into zea mays germplasm are provided. In some embodiments, the methods include providing a zea mays plant that contains an allele of interest of a locus associated with a yield trait, wherein the locus associated with the yield trait is identifiable by pcr amplification of a zea mays nucleic acid with a pair of oligonucleotides primers as disclosed herein, and introgressing the allele of interest into zea mays germplasm that lacks the allele.
10/23/14
20140317761
 Securing shipment information accessed based on data encoded in machine-readable data blocks patent thumbnailSecuring shipment information accessed based on data encoded in machine-readable data blocks
Example embodiments provide a shipment preparation system (“sps”), which facilitates the preparation of shipments, such as by producing shipping labels. In one embodiment, the sps is configured to receive shipment preparation information from a bar code or other machine-readable data block in a packing list.
10/23/14
20140317759
 Method and apparatus for processing document in touch-sensitive device patent thumbnailMethod and apparatus for processing document in touch-sensitive device
A method and apparatus are provided for processing a document in a touch-sensitive device by performing a document locking function in order not to expose a specific portion that contains significant content requiring security or confidentiality in a document, and by unlocking a locked portion of a document. In the method, when a document locking input is detected from a displayed document, the displayed document is folded in a direction of a first drag input.
10/23/14
20140317758
 Focused personal identifying information redaction patent thumbnailFocused personal identifying information redaction
Personal information is retrieved from at least one data source and personal information associated with a first individual is identified. A document is generated that is a version of a first document, wherein the personal information associated with the first individual cannot be discerned..
10/23/14
20140317756
 Anonymization apparatus, anonymization method, and computer program patent thumbnailAnonymization apparatus, anonymization method, and computer program
This anonymization apparatus includes record extracting means for extracting, with respect to history information including a plurality of records each of which includes unique identification information associated with at least a quasi-identifier and sensitive information, on the basis of smallness of ambiguity of a property existing between the plurality of records that are able to satisfy desired anonymity and share a specific unique identifier, a record with other unique identifier different from the specific unique identifier from the history information and anonymizing means for giving commonality to and thereby abstracting the quasi-identifier each included in the plurality of records, so that an individual attribute in the plurality of records extracted by the record extracting means satisfies the desired anonymity.. .
10/23/14
20140317754
 Detecting unauthorised changes to website content patent thumbnailDetecting unauthorised changes to website content
Methods, apparatus, systems are provided for use in detecting unauthorised changes to websites of web operators. Authorised content policy sets for each of a multiplicity of websites from web operators are collected and stored.
10/23/14
20140317751
Systems and methods for assessing security risk
Systems and methods for providing identification tests. In some embodiments, a system and a method are provided for generating and serving to a user an animated challenge graphic comprising a challenge character set whose appearance may change over time.
10/23/14
20140317750
Systems and methods for assessing security risk
Systems and methods for providing identification tests. In some embodiments, a system and a method are provided for generating and serving to a user an animated challenge graphic comprising a challenge character set whose appearance may change over time.
10/23/14
20140317745
Methods and systems for malware detection based on environment-dependent behavior
The present disclosure is directed to methods and systems for malware detection based on environment-dependent behavior. Generally, an analysis environment is used to determine how input collected from an execution environment is used by suspicious software.
10/23/14
20140317744
Device, system, and method of user segmentation
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The methods include monitoring of user-side input-unit interactions, in general and in response to an interference introduced to user-interface elements.
10/23/14
20140317742
Hypervisor-based buffer overflow detection and prevention
Technologies for securing an electronic device include determining addresses of one or more memory pages, injecting for each memory page a portion of identifier data into the memory page, storing an indication of the identifier data injected into each of the memory pages, determining an attempt to access at least one of the memory pages, determining any of the identifier data present on a memory page associated with the attempt, comparing the indication of the identifier data with the determined identifier data present on the memory page, and, based on the comparison, determining whether to allow the access.. .
10/23/14
20140317741
Automatic generation of different attribute values for detecting a same type of web application layer attack
According to one embodiment, a computing device is coupled to a web application layer attack detector (ad), which itself is coupled between an http client and a web application server. The computing device automatically learns a new condition to detect a first type of web application layer attack.
10/23/14
20140317740
Community-based defense through automatic generation of attribute values for rules of web application layer attack detectors
According to one embodiment, a computing device is coupled to a set of web application layer attack detectors (ads), which are coupled between http clients and web application servers. The computing device automatically learns a new condition shared by a plurality of alert packages reported by the set of ads due to a triggering of one or more rules that is indicative of a web application layer attack.
10/23/14
20140317739
Iterative automatic generation of attribute values for rules of a web application layer attack detector
According to one embodiment, a computing device is coupled to a set of web application layer attack detectors (ad), which are coupled between http clients and web application servers. The computing device learns a new set of attribute values for a set of attribute identifiers for each of a sequence of rules through an iterative process having a plurality of iterations.
10/23/14
20140317738
Automatic generation of attribute values for rules of a web application layer attack detector
According to one embodiment, a web application layer attack detector (ad) is coupled between an http client and a web application server. Responsive to receipt of a set of packets from the http client carrying a web application layer message that violates a condition of a security rule, the ad transmits an alert package to an automatic attribute value generation and rule feedback module (avgrfm).
10/23/14
20140317734
Adaptive observation of behavioral features on a mobile device
Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources..
10/23/14
20140317732
Categorizing social networking system users based on user connections to objects
When a social networking system receives a report of malicious activity, the social networking system calculates disabled connectivity score for a user reporting the activity or identified by the report. The disabled connectivity score indicates how strongly the user is associated with other objects that have been disabled by the social networking system.
10/23/14
20140317727
Extensible deployment system
An extensible deployment system is disclosed that provides for flexible deployment and centralized management of a scalable communication system. The scalable communication system may be segmented into multiple groups of services, e.g.
10/23/14
20140317726
Device, system, and method of detecting user identity based on inter-page and intra-page navigation patterns
Systems, devices, and methods for detecting identity of a user of an electronic device, and for determining whether or not an electronic device is being used by a fraudulent user; as well as for detecting identity of a user based on inter-page and intra-page navigation patterns. A method includes: during a first session of a user, who utilizes a pointing device and a keyboard for interacting with a computerized service, monitoring pointing device dynamics and gestures and keystrokes of the user; analyzing the monitored pointing device dynamics and gestures and keystrokes, in relation to (a) state and context of the computerized service, and (b) user interface elements displayed by the computerized service; generating a user-specific biometric trait indicating a user-specific service usage pattern, which includes at least one of: a user-specific inter-application usage pattern, and a user-specific intra-application usage pattern..
10/23/14
20140317724
Color pattern unlocking techniques for touch sensitive devices
Techniques are disclosed for providing a color pattern unlock mode in electronic touch sensitive devices. The color pattern unlock mode can display an unlock screen to the user, prompting the user to arrange or create a specific color pattern in order to unlock the device.
10/23/14
20140317723
Image pattern unlocking techniques for touch sensitive devices
Techniques are disclosed for providing an image pattern unlock mode in electronic touch sensitive devices. The image pattern unlock mode can display an unlock screen to the user, prompting the user to arrange or create or otherwise select a specific image pattern in order to unlock the device.
10/23/14
20140317719
Cloud-based gateway security scanning
Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device.
10/23/14
20140317702
Sharing user credentials to access services
A method and system to share credentials of the user automatically with the selected external wireless device in the wireless network is disclosed. The method selects the external wireless device based on the parameters and avail the services of the external wireless device in the user home wireless device.
10/23/14
20140317699
User authentication using unique hidden identifiers
Systems and methods are provided for user authentication using hidden unique identifiers in networks. In some example embodiments these systems and methods only require a single human readable identifier be provided and minimize personal information exposure in the event of a network breach..
10/23/14
20140317698
Intelligent task assignment and authorization systems & methods
The present disclosure relates to computer-implemented methods and systems for intelligent task management. An example method may include identifying one or more authorized entities.
10/23/14
20140317696
Nextdoor neighborhood social network method, apparatus, and system
A method and system an online neighborhood social network designed to create private websites to facilitate communication among neighbors and build stronger neighborhoods. The private websites are embodied in a website having a domain name of nextdoor.com.
10/23/14
20140317694
Digital content retrieval utilizing dispersed storage
A method begins by a ds processing module, when operable within a computing device, causing the computing device to receive a request for retrieval of a set of encoded content data slices from a dispersed storage network (dsn) memory, wherein the request includes at least the identity of the set of encoded content data slices. The method continues by determining user access rights based on a content timestamp.
10/23/14
20140317693
System and method for conveying event information based on varying levels of administrative privilege under multiple levels of access controls
An improved system and method for defining an event based upon an object location and a user-defined zone and managing the conveyance of object location event information among computing devices where object location events are defined in terms of a condition based upon a relationship between user-defined zone information and object location information. One or more location information sources are associated with an object to provide the object location information.
10/23/14
20140317690
Method and system for allowing access to a protected part of a web application
The present invention relates to a system and method for allowing access to a protected part of a web application, comprising providing a data carrier with a unique stored carrier-id and a stored personal property, providing a reader for the data carrier and a reader for reading a personal property, visiting a web application, the web application which can be identified by a web application-id, issuing a session-id for the visit, reading the personal property by means of the reader, comparing the read personal property with the stored personal property, sending the combination of the session-id and the web application-id to the validating authority when the personal properties match, sending an access permission notification back to the web application by the validating authority when the session-id and web application-id properties match and allowing access to the protected part of the website based on the access permission notification.. .
10/23/14
20140317689
System and method for verifying the identity of an internet user
A system and method for verifying the identity of an internet user are disclosed. In at least one embodiment, a central computing system is configured for receiving and processing data related to the user.
10/23/14
20140317682
Plug-in based policy evaluation
A device may include an interface to send authentication information to a plug-in, where the authentication information is related to a client device. The interface may send a policy identifier to the plug-in, where the policy identifier identifies a policy, and may receive a policy result from the plug-in, where the policy result is produced using the authentication information and a policy requirement identified by the policy identifier, and where the policy result identifies whether the client device complies with the policy..
10/23/14
20140317679
System and method for creating secure applications
A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions.
10/23/14
20140317677
Framework for coordination between endpoint security and network security services
Systems and techniques are described for virtual machine security. A described technique includes operating one or more virtual machines each in accordance with a respective security container, wherein the respective security container is associated with a respective rule that specifies transfer of the virtual machine from the respective security container to a quarantine container based on one or more criteria.
10/23/14
20140317676
Utilizing a social graph for network access and admission control
Technologies for providing access control for a network are disclosed. The method may include receiving a request from a user to access a network, receiving a plurality of data associated with the user, the plurality of data comprising a plurality of social data associated with the user's relationship to a social circle, identifying an electronic security policy based at least on the plurality of social data, and authenticating the user to the network if the electronic security policy permits authentication based at least on the plurality of social data..
10/23/14
20140317671
Method and system for transmitting network video
Embodiments of the present invention disclose a method includes: sending, by a terminal device, video server name information in video request information to a local domain name server; receiving, by the terminal device, address information of a buffer sent by the local domain name server, and sending the video request information to the buffer according to the address information of the buffer; detecting whether a video resource corresponding to video identification information in the video request information exists in the buffer; and if the video resource corresponding to the video identification information exists in the buffer, sending, by the buffer, the video resource to the terminal device. The present invention is applicable to transmission of a network video resource..
10/23/14
20140317670
Method and apparatus for reproducing contents in multimedia system
A method and an apparatus for reproducing content by a terminal in a multimedia system are provided. The method includes receiving segment information from a first content provider for providing a first content, and reproducing a second content at a specific time point in a reproduction period of the first content based on the received segment information.
10/23/14
20140317666
Recipient specific lists for distribution of media content
There is provided a system and method of recipient specific lists for distribution of media content. The method comprises obtaining at least one unique identifier (uid), wherein the at least one uid identifies a content, and wherein the at least one uid identifies a recipient location and presentation data, generating a recipient specific list (rsl) using the at least one uid, wherein the rsl includes at least one content identifier, and wherein the rsl includes at least one recipient identifier, and transmitting the rsl to an encoded content transport stream creator for creation of an encoded content transport stream.
10/23/14
20140317665
Method and an apparatus for processing a broadcast signal including an interactive broadcast service
A method of processing a broadcast signal including an interactive broadcast service at a transmitter is disclosed. The method comprises generating an parameter table containing metadata about applications and interactive broadcast events targeted to the applications, dividing the parameter table into a plurality of parameter blocks, inserting each of the parameter blocks into each of a plurality of parameter table sections, generating a trigger which is a signaling element to identify signaling and establish timing of playout of the interactive broadcast events, inserting the trigger into a closed caption channel of the broadcast signal, transmitting the broadcast signal including the closed caption channel and a specific channel carrying the plurality of parameter table sections, wherein the trigger includes location information specifying a location of the parameter table in the broadcast signal..
10/23/14
20140317664
Method and apparatus for transmitting media data in multimedia transport system
A method for transmitting media data in a moving picture experts group (mpeg) media transport (mmt) system is provided. The method includes receiving a media processing unit (mpu) fragmented into one or more media fragment units (mfus), generating one or more multimedia data packets each including a packet header and a payload, based on the mpu, and transmitting the one or more multimedia data packets to a terminal.
10/23/14
20140317661
Meta channel based media system control technology
Meta-channels identify content entries and indicate an order with which to experience the content entries. The meta-channels may include a multi-source meta-channel that includes at least a first content entry that relates to first content broadcast by a first content provider at a specific time and a second content entry that relates to second content made available, over a network, by a second content provider in response to user requests.
10/23/14
20140317658
Methods and computer program products for subcontent tagging and playback
A method for tagging subcontent includes creating a first begin tag for a program to be delivered over a network, wherein the first begin tag corresponds to a first video segment of the program. A first video frame is identified for the first video segment, the first video frame representing content of the first video segment, the first video frame is displayable as a first thumbnail.
10/23/14
20140317657
Zone control methods and apparatus
Methods and apparatus for providing control over targeted secondary content based on a zone associated with a user. In one exemplary embodiment, a user request for primary content from a non-legacy device results in the delivery of the same secondary content which would have been provided had the request been generated at a legacy device (so-called “zone preservation”).
10/23/14
20140317651
Electronic device, information processing method, and information processing program
According to one embodiment, the purpose of this invention is to provide an electronic device which can output information in accordance with a schedule of each person. The electronic device of the embodiments has a manager, an identifier, and a controller.
10/23/14
20140317644
Monetizing product placement, consumer, and vendor data
A method and a non-transitory machine-readable medium are used to monetize product placements integral with video programs. A promotion company obtains information identifying products placed in a program and provides it to a viewer on a second screen having a graphical user interface.
10/23/14
20140317640
Server side macro method, apparatus and computer readable medium
A computer-implemented method of managing computer macros is disclosed. The method includes storing code for a computer macro at an internet-accessible hosted computer system and associating the stored code with a user account on the hosted computer system.
10/23/14
20140317628
Memory apparatus for processing support of long routing in processor, and scheduling apparatus and method using the memory apparatus
Provided are a scheduling apparatus and method for effective processing support of long routing in a coarse grain reconfigurable array (cgra)-based processor. The scheduling apparatus includes: an analyzer configured to analyze a degree of skew in a data flow of a program; a determiner configured to determine whether operations in the data flow utilize a memory spill based on the analyzed degree of skew; and an instruction generator configured to eliminate dependency between the operations that are determined to utilize the memory spill, and to generate a memory spill instruction..
10/23/14
20140317615
Systems and methods for installing applications
Systems and methods are provided for installing an application on a mobile terminal. For example, one or more first drivers are obtained based on at least information associated with identification of a first mobile terminal; the first drivers are installed on an information-processing device; a network connection between the information-processing device and the first mobile terminal is established based on at least information associated with the first drivers; one or more local parameters of the first mobile terminal are queried through the network connection; an application-installation package is obtained based on at least information associated with the local parameters; and an application is installed on the first mobile terminal using the network connection based on at least information associated with the application-installation package..
10/23/14
20140317608
Method for optimizing binary code in language having access to binary coded decimal variable, and computer and computer program
A method for optimizing binary code in a language having access to binary coded decimal variable. The method includes: generating a first compiler expression of the binary code; analyzing a use-definition and/or a definition-use for the first compiler expression; generating a second compiler expression by identifying logical binary coded decimal (bcd) variables in the first compiler expression; assigning temporary variables to the logical bcd variables, wherein the second compiler expression includes packed decimal operations and the assigned temporary variables; and converting a packed decimal operation in the second compiler expression and an assigned temporary variable to a decimal floating point (dfp) if sign information and precision information are not lost during conversion from bcd to dfp, wherein identifying logical bcd variables includes: in the use-definition and/or definition-use of operands, regarding an operand of definition and an operand of use as the same logical bcd variables..
10/23/14
20140317607
Optimizing intermediate representation of script code by eliminating redundant reference count operations
Disclosed here are methods, systems, paradigms and structures for optimizing generation of intermediate representation (ir) for a script code by eliminating redundant object reference count operations from the ir. An ir of the script includes (a) a set of first code that increments a reference count of an object when a programming construct refers to the object, and (b) an associated set of second code which decrements the reference count of the object when a reference to the object is removed.
10/23/14
20140317606
Error list and bug report analysis for configuring an application tracer
Error logs, bug reports, and other databases identifying problems with a tracer system may be mined to determine how a tracer may interact with a given function, module, or other group of functions. Based on such reports, a tracer may be configured to avoid certain functions or to trace such functions in a specific manner.
10/23/14
20140317604
Real time analysis of tracer summaries to change tracer behavior
Real time analysis of tracing data may identify functions for which tracing may be enhanced or reduced. A tracer that generates function-level data may have an aggregator that summarizes the data.
10/23/14
20140317601
System and method for creating variants in a test database during various test stages
System and methods for creating one or more variants of test data during various test stages are disclosed. The system and methods facilitate a user to create a primary variant for test data and to store the primary variant of the test data in a test data variant repository.
10/23/14
20140317592
Enforcing alignment of approved changes and deployed changes in the software change life-cycle
On a host, host content change requests are intercepted in real-time. In a tracking mode, the change requests are logged and allowed to take effect on the host.
10/23/14
20140317588
Timing operations in an ic with configurable circuits
Some embodiments provide a method that identifies a first physical design solution for positioning several configurable operations on several reconfigurable circuits of an integrated circuit (ic). The method identifies a second physical design solution for positioning the configurable operations on the configurable circuits.
10/23/14
20140317582
Race logic synthesis for esl-based large-scale integrated circuit designs
Techniques for performing race logic synthesis on an integrated circuit (ic) are described herein. According to one aspect of the invention, esl (electronic system level) and any hdl (hardware description language) design source files of an ic design are compiled into a design database.
10/23/14
20140317573
Display apparatus and method of displaying a context menu
A method of displaying a context menu of a display apparatus is provided. The method includes displaying a content list including at least one menu; displaying a menu identification icon that indicates on a menu of the at least one menu the existence of the context menu; and in response to any one menu of the at least one menu being focused, displaying the at least one context menu included in a focused menu.
10/23/14
20140317567
Systems and methods for graphically depicting people and interests
A system of graphically depicting people and interests can comprise an anchor structure having a dimensional area, an identity icon adapted to be positioned on or adjacent to the anchor structure, and a plurality of interest icons adapted to be positioned on or adjacent to the anchor structure and having a graphical relationship to the identity icon. The identity icon can be prepared so that it has an area no larger than 25% of the dimensional area of the anchor structure.
10/23/14
20140317566
Information processing system, information processing method, information processing program, computer-readable recording medium storing the same program, data structure, information processing server,and information processing terminal
Methods and apparatus operate to: execute one application; store group information, the group information being associated with a plurality of pieces of execution status information each of which represents one of a plurality of execution statuses of the execution, a plurality of pieces of content information each of which represents one of the contents of the plurality of pieces of execution status information, and group identification information identifying groups to which the plurality of pieces of execution status information and the plurality of pieces of content information belong; and generate, based on the group information, menu information which displays the content information included in at least one of the groups. The at least one application is executed using the execution status information associated with at least one piece of the content information included in the menu information..
10/23/14
20140317560
Map display control device and navigation device using the same
A map display control device includes an instruction input unit capable of receiving input of a user instruction including an instruction to change display to a map according to purpose, an information drawing unit that acquires a map information including map display information to be displayed on a display, is capable of automatically setting a density of the map display information according to the purpose of the map, and processing the map information in accordance with the map and the density of the map display information set according to the purpose of the map, on the basis of the instruction to change display, and a display controller outputting an instruction signal on the basis of an instruction from the information drawing unit to display the map as changed on the display at the density of the map display information that is set according to the purpose of the map.. .
10/23/14
20140317553
Information processing apparatus and non-transitory recording medium storing program
An information processing apparatus includes a processor and a memory storing instructions. The instructions instruct the processor to execute acquiring start time data identified based on first stroke data input by handwriting, acquiring end time data identified based on second stroke data input by handwriting, first correcting the start time data by entering first numerical value corresponding to a first unit that is the unit of time for which the numerical value is not identified, based on the end time data, when a numerical value corresponding to a unit of time cannot be identified, and second correcting the end time data by entering second numerical value corresponding to a second unit that is the unit of time for which the numerical value is not identified, based on the start time data, when a numerical value corresponding to a unit of time cannot be identified..
10/23/14
20140317552
Metadata templates for electronic healthcare documents
A computing device according to one example embodiment includes one or more processing devices configured to display an interface to a user for entry of metadata values and identification of corresponding metadata fields, to create a metadata template from entered metadata values and identified corresponding metadata fields, and to store the created metadata template as default metadata for a non-dicom electronic healthcare document to be submitted to an electronic repository.. .
10/23/14
20140317551
Method and terminal for controlling switching of desktop container pages
A method and a terminal for controlling switching of desktop container pages are provided, which are used to replace a conventional operation of moving a component based on a touch operation on an intelligent terminal. The method includes: obtaining, by a terminal, movement determination information when a component-based moving event is activated; identifying, by the terminal, a movement state of the terminal according to the movement determination information; and switching, by the terminal, a currently displayed desktop container page according to the movement state, and moving a component, on which the moving event is based, to a desktop container page displayed after the switching..
10/23/14
20140317546
Logic visualization machine
A logic visualization machine that uses dynamic physical analog pictograms to illustrate logical argument structures. With this approach, an analysis of alternative hypotheses is presented in a side-by-side comparison in which each hypothesis is visualized by a similar physical analog pictogram.
10/23/14
20140317541
Electronic device having touch screen and method for zooming in
A method for zooming in content displayed on a touch screen comprises detecting the touch track of a touch on the touch screen and determining whether the touch track encloses a graphic. A current display mode of the touch screen when the touch track does enclose a graphic is identified and the content within the bounds of the enclosed graphic according to the current display mode of the touch screen is magnified.
10/23/14
20140317528
Methods and systems for generating customized user plans
A customized user plan is provided based on corresponding creator plans and user data. The creator plans may be generated by experts in their respective fields, by businesses, or by users of the system.
10/23/14
20140317526
Intelligent display of information in a user interface
User interfaces such as web pages may be customized in terms of appearance and content based on user interests. For example, information items may be arranged such that items corresponding to strong user interests are displayed in more visually identifiable locations while items corresponding to weaker user interests are displayed in less visually valuable positions.
10/23/14
20140317525
System and method of presenting media content
A method includes monitoring media content at media content locations to identify media content items. The media content locations are identified in social network data stored by a set-top box device.
10/23/14
20140317524
Automatic magnification and selection confirmation
According to one disclosed embodiment, an approach is provided in which a user input is detected at a first location on a display screen, such as a finger selection on a touch-enabled display screen. A number of visual controls that are proximate to the detected location are identified.
10/23/14
20140317519
Automated content scheduler and displayer
A method for providing content via a communications network on a user's computer, obtained from a plurality of resources in an organized arrangement is provided. The method includes creating a show structure of nodes, each node identifying a resource from a plurality of accessible resources, at least some of which are network accessible resources.
10/23/14
20140317513
Automated content scheduler and displayer
A method for providing content via a communications network on a user's computer, obtained from a plurality of resources in an organized arrangement is provided. The method includes creating a show structure of nodes, each node identifying a resource from a plurality of accessible resources, at least some of which are network accessible resources.
10/23/14
20140317512
Display of user comments to timed presentation
A method and system to dynamically display a presentation of a time duration are described. The method includes receiving comments associated with the presentation, the comments arranged in a first ordering.
10/23/14
20140317509
System and method of presenting media content
A method includes monitoring media content at media content locations to identify media content items. The media content locations are identified in social network data stored by a set-top box device.
10/23/14
20140317503
Method and apparatus for a textural representation of a guidance
A method comprising receiving an indication of a first input associated with an information item, determining that the first input corresponds with a first part of an invocation input associated with invocation of display of, at least part of, content associated with the information item, identifying a second part of the invocation input, the second part of the invocation input being immediately subsequent to the first part of the invocation input, and causing rendering, on a variable texture surface, of a textural representation of a guidance indicative of the second part is disclosed.. .
10/23/14
20140317495
Retroactive word correction
An electronic device is configured for retroactive word correction. The device includes memory, a processor, a network interface and display.
10/23/14
20140317491
Displaying a document file
A document file is displayed on a display device. A first display unit, which is a unit in which the document file is displayed, is divided into a plurality of areas.
10/23/14
20140317490
Non-transitory computer-readable storage medium storing document management program and information processing apparatus
Users can upload files (or folders) managed by a file system of an operating system or the like to a desired folder included in a hierarchical folder structure displayed by a rich internet application executed on a web browser, by executing a drag and drop operation. A first extended program displays a hierarchical folder structure managed by a document management server in a display area on the web browser, determines whether a pointing device overlaps with any folder displayed on the web browser based on mouse event information set by the web browser, and sets information about the folder overlapping with the pointing device in the web browser.
10/23/14
20140317488
System and method for annotating and manipulating electronic documents
A method, system, and computer program product allow a user to annotate and manipulate a plurality of electronic documents. The user loads a first electronic document comprising electronic content, which content may be annotated or otherwise manipulated by the user and which annotations are made using a user-defined indication means.
10/23/14
20140317476
Apparatus and method for transmitting and receiving forward error correction packet
A method and an apparatus for transmitting and receiving a packet in a broadcasting and communication system are provided. The method includes splitting a source packet block including source packets into a plurality of source packet subblocks, converting the source packet subblocks to source symbol subblocks, respectively, generating a plurality of first repair symbol blocks by encoding the source packet subblocks using a first error correction code, configuring an error correction source packet by adding a source error correction payload identifier (id) to source symbols included in the source symbol subblocks and configuring an error correction repair packet by adding a repair error correction payload id to repair symbols included in the first repair symbol subblocks, and transmitting the error correction source packet and the error correction repair packet..
10/23/14
20140317473
Implementing ecc redundancy using reconfigurable logic blocks
A method, system and computer program product are provided for implementing ecc (error correction codes) redundancy using reconfigurable logic blocks in a computer system. When a fail is detected when reading from memory, it is determined if the incorrect data is in the data or the ecc component of the data.
10/23/14
20140317460
Memory device with background built-in self-repair using background built-in self-testing
A memory device with a background built-in self-repair module (bbisrm) includes a main memory, an arbiter, and a redundant memory to repair a target memory under test (tmut). The memory device also includes a background built-in self-test module (bbistm) to identify portions of memory needing background built-in self-repair (bbisr).
10/23/14
20140317454
Tracer list for automatically controlling tracer behavior
A tracing system may use an evaluation mechanism to determine which functions to include or exclude during tracing. The architecture may evaluate functions when functions or groups of functions may be loaded for execution, as well as each time a function may be encountered.
10/23/14
20140317450
Pretest setup planning
A computer-implemented method comprising: obtaining a description of a test suite which comprises a plurality of tests, wherein each test of the test suite is described by values of functional attributes, wherein at least a portion of the functional attributes are setup-related attributes, wherein a combination of values of the setup-relates attributes potentially indicate a setup activity to be performed prior to executing the test to set up a test environment for the test. Identifying, based on the description of the test suite, a setup activity that is associated with two or more tests, wherein the setup activity is configured to set up a component of the test environment, wherein the identifying is performed by a processor.
10/23/14
20140317445
Recovery of storage device in a redundant array of independent disk (raid) or raid-like array
A method for managing storage devices in a storage subsystem having an array of storage devices, according to one embodiment, includes determining that a storage device in an array of storage devices has failed. A first candidate storage device having storage device characteristics that match storage device characteristics of the failed storage device is identified.
10/23/14
20140317435
Electronic device and method for testing capacitors of motherboard of electronic device
In a method for testing the locations and identities of capacitors of a motherboard of an electronic device, register addresses of the capacitors of the motherboard are detected and a notification is generated if all the detected register addresses are correct. Each capacitor having an incorrect register address is reconfigured with a correct register address.
10/23/14
20140317430
Method, apparatus, and system for energy efficiency and energy conservation including optimizing c-state selection under variable wakeup rates
A processor may include power management techniques to, dynamically, chose an optimal c-state for the processing core. The measurement of real workloads on the oses exhibit two important observations (1) the bursts of high interrupt rate are interspersed between the low interrupt rate periods and long periods of high activity levels; and (2) the interrupt rate may, suddenly, fall below an interrupt rate (of 1 milli-second, for example) that is typical of the current operating systems (os).
10/23/14
20140317414
Context sensitive dynamic authentication in a cryptographic system
A system for performing authentication of a first user to a second user includes the ability for the first user to submit multiple instances of authentication data which are evaluated and then used to generate an overall level of confidence in the claimed identity of the first user. The individual authentication instances are evaluated based upon: the degree of match between the user provided by the first user during the authentication and the data provided by the first user during his enrollment; the inherent reliability of the authentication technique being used; the circumstances surrounding the generation of the authentication data by the first user; and the circumstances surrounding the generation of the enrollment data by the first user.
10/23/14
20140317412
Method for securely searching, finding, reproducing, recovering, and/or exporting of electronic data
A method for securely searching, finding, reproducing, recovering, and/or exporting electronic data from at least two systems which can be found in a network and which are organized in a functionally identical and decentralized manner. The individual systems include a system certificate and a corresponding serial number by the manufacturer and can carry out an authentication process using said system certificate and serial number.
10/23/14
20140317408
Data backup and service encryption key management
Disclosed are an apparatus and method of using encryption to access remote online application servers. One example method of operation may include applying an encryption key to an application server access operation.
10/23/14
20140317400
System and method for validation and enforcement of application security
A system and method for validation and enforcement of application security, wherein the user credentials and the integrity of a target application are verified before the target application is permitted to execute.. .
10/23/14
20140317386
Techniques for determining instruction dependencies
One embodiment sets forth a method for efficiently determining memory resource dependencies between instructions included in a software application. For each instruction, a dependency analyzer uses overlapping search techniques to identify one or more overlaps between the memory elements included in the current instruction and the memory elements included in previous instructions.
10/23/14
20140317385
Techniques for determining instruction dependencies
One embodiment sets forth a method for efficiently determining memory resource dependencies between instructions included in a software application. For each instruction, a dependency analyzer uses overlapping search techniques to identify one or more overlaps between the memory elements included in the current instruction and the memory elements included in previous instructions.
10/23/14
20140317384
Data processing apparatus and method for pre-decoding instructions to be executed by processing circuitry
A hierarchical cache with at least a unified cache is used to store both instructions and data values, and a further cache coupled between processing circuitry and a unified cache. The unified cache has a plurality of cache lines identified as an instruction cache line or a data cache line.
10/23/14
20140317377
Vector frequency compress instruction
A processor core that includes a hardware decode unit to decode a vector frequency compress instruction that includes a source operand and a destination operand. The source operand specifying a source vector register that includes a plurality of source data elements including one or more runs of identical data elements that are each to be compressed in a destination vector register as a value and run length pair.
10/23/14
20140317375
System and method to prioritize large memory page allocation in virtualized systems
The prioritization of large memory page mapping is a function of the access bits in the l1 page table. In a first phase of operation, the number of set access bits in each of the l1 page tables is counted periodically and a current count value is calculated therefrom.
10/23/14
20140317371
Method and system for access based directory enumeration
Method and system for access based directory enumeration is provided. When a directory is enumerated for a first time, user credentials are verified against an access control list (acl) entry that is referenced by an acl inode (referred to as xnode).
10/23/14
20140317363
System and method for optimizing memory usage in a universal controlling device
A method for optimizing memory usage in a device having a universal controlling application includes receiving into the device data for use in configuring the universal controlling application wherein the data is used to identify from within a library of command code sets stored in a memory of the device a command code set that is appropriate for use in commanding functional operations of the appliance and causing a non-identified one or more of the command code sets of the library of command code sets stored in the memory of the device to be discarded to thereby create freed space in the memory of the device.. .
10/23/14
20140317357
Promoting transactions hitting critical beat of cache line load requests
A processor includes a cache memory, a first core including an instruction execution unit, and a memory bus coupling the cache memory to the first core. The memory bus is operable to receive a first portion of a cache line of data for the cache memory, the first core is operable to identify a plurality of data requests targeting the cache line and the first portion and select one of the identified plurality of data requests for execution, and the memory bus is operable to forward the first portion to the instruction execution unit and to the cache memory in parallel..
10/23/14
20140317346
Redundant array of independent disks systems that utilize spans with different storage device counts for a logical volume
Methods and structure are provided for defining span sizes for redundant array of independent disks (raid) systems. One embodiment is a raid controller that includes a control system and a span manager.
10/23/14
20140317333
Direct memory access controller with hybrid scatter-gather functionality
A direct memory access (dma) controller stores a set of dma instructions in a list, where each entry in the list includes a bit field that identifies the type of the entry. Based on the bit field, the dma controller determines whether each dma instruction is a buffer pointer or a jump pointer.
10/23/14
20140317330
Two wire serial voltage identification protocol
In one embodiment a system comprises an integrated circuit, a plurality of voltage regulators; and a data bus coupled to the integrated circuit and the plurality of voltage regulators. In some embodiments the integrated circuit comprises logic to embed a timing signal on the data bus.
10/23/14
20140317317
Assigning priorities to data for hybrid drives
A hybrid drive includes multiple parts: a performance part (e.g., a flash memory device) and a base part (e.g., a magnetic or other rotational disk drive). A drive access system, which is typically part of an operating system of a computing device, issues input/output (i/o) commands to the hybrid drive to store data to and retrieve data from the hybrid drive.
10/23/14
20140317311
Communication routing plans that are based on communication device contact lists
In a communication system, a processing system receives contact lists with contact items from wireless communication devices and processes the contact lists to identify a redundant contact item. In response, the processing system transfers a notification to a master wireless communication device.
10/23/14
20140317307
Period labeling in dynamic adaptive streaming over hypertext transfer protocol
A method of dynamic adaptive streaming over hypertext transfer protocol (http) (dash) comprising receiving an asset that comprises a media presentation described in a media presentation description (mpd), wherein the media presentation comprises one or more periods, and wherein each period comprises at least one adaptation set, and identifying the asset on a period level using one or more asset identifiers specified in the mpd.. .
10/23/14
20140317302
Virtual collaboration session access
Methods are provided that include receiving a request to couple a first client device to a communication session, wherein the request includes user identification information. The method may include determining a number of client devices coupled to the communication session and comparing the number of client devices coupled to the communication session to a maximum number of client devices to determine whether the maximum number of client devices are coupled to the communication session.
10/23/14
20140317298
Asset sharing within an enterprise using a peer-to-peer network
An approach for sharing an asset in a peer-to-peer network is provided. After determining a locally stored first list does not include meta data specifying the asset, a new node is identified.
10/23/14
20140317293
App store portal providing point-and-click deployment of third-party virtualized network functions
In one embodiment, a method comprises receiving by an apparatus, via a wide area network, a request for deployment of a selected one of available virtualized network services advertised by the apparatus, the request identifying a host service provider to deploy the one virtualized network service; identifying, by the apparatus, virtualized network functions required by the host service provider for implementation of the one virtualized network service, each virtualized network function having a corresponding and distinct virtualized container specifying attributes for defining execution of the corresponding virtualized network function within one or more physical machines of the host service provider; and sending to the host service provider, by the apparatus, a service container specifying instructions for deploying the one virtualized network service, the service container including instructions for deploying the virtualized network functions as interdependent for implementation of the one virtualized network service by the host service provider.. .
10/23/14
20140317285
Information processing system
A system that displays the content of games in accordance with the impact on each of the games resulting from network states including an execution unit that executes at least one application from among multiple applications, a sending unit that sends to a terminal the result of the execution, a communication information acquisition unit that acquires communication information representing the communication states between the sending unit and the terminal, a suitability information storage unit that stores suitability information representing the suitability of executing each of the applications in relation to application identification information identifying each of the applications and to the scope of the communication information, a suitability information acquisition unit that acquires the suitability information based on the acquired communication information, and a display that generates display information for displaying part or all of the content of the multiple applications in accordance with the acquired suitability information.. .
10/23/14
20140317282
Techniques for measuring above-the-fold page rendering
Techniques for measuring above-the-fold (atf) page rendering are provided. Visible objects for an atf portion of a browser page are identified.
10/23/14
20140317279
Identification of the paths taken through a network of interconnected devices
The invention relates to a computer implemented method of identifying in a network of interconnected devices a path through the network from a source device to a final destination device, the path comprising a connected sequence of devices, the method comprising at a monitor computer connected to the network: identifying a first device connected to the source device; transmitting a first query to the first device, the query including a destination identifier and requesting identification of an egress port for messages addressed to the destination identified by the destination identifier when the query is received at the first device; receiving a result message identifying the egress port and identifying the second device connected to the first device based on a network topology accessible by the monitor computer; and addressing a next query to the second device and receiving a next result message identifying an egress port from the second device; and identifying from the network topology a third device connected to the second device, wherein the path is identified to include the first, second and third devices.. .
10/23/14
20140317278
Traffic analysis for http user agent based device category mapping
A traffic analysis system monitors data traffic in a communication network. In the data traffic, flows are detected which are based on the hypertext transfer protocol (http).
10/23/14
20140317276
Application based data traffic routing using network tunneling
Various implementations described herein relate to routing network data traffic using network tunnels. In some implementations, one or more tunnels are established between a remote gateway device and a central gateway device central gateway system.
10/23/14
20140317273
Datacenter border-issued analytics for monitoring federated services
Technologies are generally described for providing datacenter border-issued analytics for monitoring federated services. In some examples, a deployment manager, which manages placement of application deployment instances across a federation and thus already knows which datacenter each instance is in, may register a package trigger with a gateway at each datacenter when an application is placed in each datacenter.
10/23/14
20140317270
Systems, methods, and apparatus to identify media devices
Systems, methods, and apparatus to identify media devices are disclosed. An example method includes determining an internet protocol address of a requesting device of a received network communication.
10/23/14
20140317269
Installation and enforcement of dynamic and static pcc rules in tunneling scenarios
A policy and charging enforcement function (pcef) device of a network having a policy and charging rules function (pcrf) device. The pcef device includes a processing unit that detects a tunneled packet and the packet's internet protocol version type and determines whether activation of pcc rules in accordance with the ip version type of the tunneled packet is required from the pcrf device.
10/23/14
20140317267
High-density server management controller
The described embodiments include a system management controller for managing servers on a plurality of sled devices. The system management controller includes a processing mechanism and a plurality of internal interfaces coupled to the processing mechanism.
10/23/14
20140317266
Identification of consumers based on a unique device id
Machines, systems and methods for identification of a consumer are provided. The method comprises capturing a unique identifier (id) associated with a computing device, wherein the computing device is configured to access content stored on one or more content servers; and associating the unique id with tracking data associated with the computing device, wherein when the computing device submits a request to a content server to access content, wherein in response to retrieving at least one of the unique id or the tracking data of the computing device, the computing device is identified and content pages accessed by the computing device are tracked by a machine that is aware of the association between the unique id and the tracking data for the computing device..
10/23/14
20140317263
Identity management in a networked computing environment
An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user.
10/23/14
20140317261
Defining interdependent virtualized network functions for service level orchestration
In one embodiment, a method comprises identifying, by an orchestrator executed by a physical machine, a plurality of virtualized network functions required for implementation of a virtualized network service for a customer, each virtualized network function having a corresponding and distinct virtualized container specifying attributes for defining execution of the corresponding virtualized network function within one or more physical machines; and setting by the orchestrator an interdependency indicator within each virtualized container based on association with the virtualized network service, enabling identification of each of the virtualized network functions as interdependent for coordinated execution of the virtualized network service.. .
10/23/14
20140317259
Advertisement of adjacency segment identifiers
Various techniques can be used to advertise adjacency segment identifiers (ids) within a segment routing (sr) network. For example, a method, performed by a first node, can involve identifying an adjacency segment between a first node and a second node; assigning an identifier to the adjacency segment; and sending an intermediate-system-to-intermediate-system (is-is) hello (iih) message to another node.
10/23/14
20140317247
Computer system, method for starting a server computer, server computer, management station, and use
A computer system includes a server computer including a processor, a main memory and a system management chip, a management station that manages server profiles and selects a server profile from server profiles and associates it with the server computer, and at least one data network via which the server computer and the management station are coupled to interchange data, wherein the system management chip of the server computer is set so that, when the system management chip activates, it sends an inquiry regarding a server profile associated by the management station to the management station, so that, if a management connection can be set to the management station, it configures a component of the server computer by using a network identifier transmitted by the management station, and to otherwise prevent starting of the server computer with a network identifier transmitted by the management station previously.. .
10/23/14
20140317246
Group communication system arrangement
A group communication system arrangement is provided. The group communication system arrangement includes a configuration of nodes, which are uniquely identified by corresponding identifiers (id).
10/23/14
20140317243
Method and system for prediction of software data consumption patterns
A method including downloading a streaming model file and at least one initial execution file from a server via a conventional download protocol without using a specialized streaming protocol. When executed, the initial execution file only partially implements an application.
10/23/14
20140317236
Delegated services platform system and method
System and method for delegating to a local appliance some or all tasks traditionally performed by a central service endpoint in responding to a request from an end-consumer for content, an application, or a service. The local appliance is typically a computer server with associated local storage.
10/23/14
20140317231
Method and system for pacing, acking, timing, and handicapping (path) for simultaneous receipt of documents having trader markups
A computing device determines impactful content in transmittable content. The computing device assigns the impactful content to one or more impactful block units.
10/23/14
20140317218
Communication device, control method, program product and communication system
A communication device that communicates with a plurality of different target devices compliant with different specifications of data communication. The communication device receives request data to control operations of the plurality of different target devices; identifies a specific target device for which operation is to be controlled among the plurality of different target devices; identifies command content to be performed by the specific target device according to the received request data; identifies a specification of data communication employed by the specific target device; identifies an operation command corresponding to the identified command content based on the identified specification of data communication employed by the specific target device; and sends the operation command to the specific target device.
10/23/14
20140317215
System and method for analyzing communications
The invention provides a system and method for analyzing a collection of communication messages. The communication messages may be any one of a collection of electronic mail messages, voicemail messages, instant messaging dialogues and other forms of communications.
10/23/14
20140317214
Sending out-of-band instant messages from a game networking system
Techniques for sending out-of-band messages from a game networking system are described. For example, a machine identifies a friend of a user of a game networking system.
10/23/14
20140317213
Method, server and sns system for message interaction
A method for message interaction includes: receiving, at a server, a first multi-media message recorded and published by a first terminal when the server detects that the first terminal in a social network service (sns) system carries out a message publishing operation; performing, at the server, a transcoding process on the first multi-media message to generate at least one second multi-media message, and storing the first multi-media message and the at least one second multi-media messages; and allocating, at the server, a publishing identifier and sending the publishing identifier to the first terminal to inform the first terminal that the message publishing operation is successful. Further, a server and a sns system are also described.
10/23/14
20140317211
Messaging stamp authority
Electronic messages may be processed using a stamp authority by receiving an electronic message, identifying a stamp associated the message, determining if the stamp is valid, and, if the stamp is determined to be valid, distinguishing the message from messages with which a valid stamp is not identified.. .
10/23/14
20140317208
Correlating messaging text to business objects for business object integration into messaging
Embodiments of the present invention address deficiencies of the art in respect to messaging and provide a method, system and computer program product for business object integration with messaging. In an embodiment of the invention, a method for messaging integration of a business object can be provided.
10/23/14
20140317206
Switched direct attached shared storage architecture
Various embodiments for implementing a switched direct attached shared storage architecture as disclosed herein include: providing a plurality of compute nodes, each compute node having integrated compute capabilities, data storage, and a network interface controller (host nic), the plurality of compute nodes being in data communication with each other via a local area network, the plurality of compute nodes each including distributed storage processing software resident thereon; providing a plurality of physical data storage devices in data communication with a storage controller; and enabling data communications in a data store switch fabric between the plurality of compute nodes and the plurality of physical data storage devices via the host nic and the storage controller, the data store switch fabric encapsulating data requests from the plurality of compute nodes into data frames for transport to corresponding physical data storage devices.. .
10/23/14
20140317201
Event determination and template-based invitation generation
A computer creates an invitation on a social network. The computer receives data from a social networking post, and identifies in the data from the social networking post information about a future event that a first member of a social network intends to participate in.
10/23/14
20140317191
Systems and methods of viral enablement of features by peer-to-peer connection
The technology disclosed relates to identifying and notifying a user of nearby attendees at a mega attendance event who are in user's social graph by comparing the user's social graph to a list of event attendees. The identified attendees can be stratified into social graph tags that annotate, categorize and prioritize other users in the user's social graph.
10/23/14
20140317190
Session manager anti-looping
Session manager anti-looping creates a model that is an effective barrier to looping, efficiently identifying a loop condition by maintaining temporary individual call counters for header sets within temporal parameters and terminating the loop condition upon detection. The system provides an administrator with adjustable parameters for loop detection count and loop detection interval, thereby allowing protection against loop conditions, both inadvertent and intentional..
10/23/14
20140317188
Method and system for enabling theme and location based participation in a social network
A method and system for associating themes of member groups of a social networking system are associated with geographic data related to group members. Network members may self identify a locale to be associated with their online identity.
10/23/14
20140317183
Reducing real time media traffic in a network environment
An example method for reducing real time media traffic in a network environment is provided and includes examining a plurality of first requests in a first protocol to identify participants in a media session; examining a plurality of second requests in a second protocol to determine media characteristics associated with the participants; and grouping the participants into different groups based, at least in part, on the media characteristics, wherein at least some of the participants associated with substantially identical media characteristics are grouped together.. .
10/23/14
20140317181
Establishing dynamic connection
The disclosure relates to a method establishing dynamic connection. Said method comprises receiving, by a management server, a connection establishment request message sent by a client, wherein said request message carries a first property information of a service source terminal to which connection is requested to be established; sending, by the management server, a connection instruction message carrying identification information of the client and said first property information to the service source terminal, so that the service source terminal determines whether to establish a connection to the client according to the first property information..
10/23/14
20140317180
Method, device and central server for providing service for ldap client
The present invention relates to a device, a method and a central server for providing service to a lightweight directory access protocol ldap client from a central server with multiple back-ends. A ldap request for accessing a service is received from the ldap client, and the requested service is identified from the ldap request.
10/23/14
20140317178
Controlling client access to a server application
An approach is provided for controlling a rate at which requests from a client computer will be received by a server application executed on a server computer. Requests are received by the server computer at different times from the client computer and time intervals between different pairs of successive requests are measured.
10/23/14
20140317167
Distributed mapping function for large scale media clouds
The present document relates to cloud computing. In particular, the present document relates to methods and systems for cloud computing which enable the efficient and flexible placement of application components within a cloud.
10/23/14
20140317161
Matching pattern combinations via fast array comparison
Methods and arrangements for providing a compressed representation of a number sequence. An input number sequence is received, as is a stored number sequence.
10/23/14
20140317160
Systems and methods of storing and managing configuration data in telecommunications systems and devices
Systems and methods of storing and managing data, such as configuration data, in telecommunications systems and devices. The data are stored as objects, each data object having an associated type, and each object type having at least one instance of the data object.
10/23/14
20140317155
Research data collector and organizer
A data source, such as a web page, a locally retrieved document, user-entered information, etc., is made visible to a user via a display, such as a computer monitor or touch-screen tablet or smart phone screen. A data capture window, which may be in the form of a data grid, is also displayed to the user, who can select data items from the data source such that they are represented in the data grid.
10/23/14
20140317152
System and method for identifying non-event profiles
A system for avoidance records comprises an interface and a processor. An interface is configured to receive an abbreviated record associated with a non-event profile identifier.
10/23/14
20140317145
Multi-identity for secure file sharing
Techniques for controlling access to shared data files such as stored in a collaborative file sharing service. Organizations want to have access to data originated by their employees and want that access to continue even when the employees leave the company.
10/23/14
20140317143
Information processing apparatus, information processing method and program
A medical information server is provided. The medical information server includes a medical information unit configured to determine a diagnose authority to an information terminal thereby allowing a diagnosis by the information terminal to be identified by the diagnose authority.
10/23/14
20140317142
Computer implemented methods and apparatus for retrieving content related to a feed item of an online social network
Disclosed are methods, apparatus, systems, and computer-readable storage media for retrieving content related to a feed item of an online social network. In some implementations, a computing device receives a feed item to be displayed in a feed associated with a first user of an online social network.
10/23/14
20140317128
Natural language search
Embodiments are provided for natural language search. In some embodiments, a content search request for content items related to an account with a content management system may be received, at least one filter from the content search query request may be determined to identify content items based on at least one of a management function and a content interaction function performed with a content item for the account, and the at least one filter may be applied to accessible content items for the account to identify content items..
10/23/14
20140317125
Patent claim scope evaluator
Systems and methods for calculating a patent claim scope rating are disclosed. In an example embodiment, a method of calculating a patent claim scope rating includes identifying patent references cited in examination of a subject patent and storing the identified patent references as an applied art list, identifying first backward references for the patent references in the applied art list and storing the first backward references as a first backward list, identifying second backward references for the first backward references in the first backward list and storing the second backward references as a second backward list, identifying forward references for the patent references in the applied art list and storing the forward references as a forward list.
10/23/14
20140317123
Indexing of significant media granulars
Identifying significant media granulars may comprise partitioning a media document into one or more media granulars. A score may be assigned to each of the one or more media granulars.
10/23/14
20140317122
Automatic categorization of entries in a contact list
Entries within a participant list of an electronic communications system may be categorized automatically into one or more groups based on attributes of users represented in the participant list. Categorizing users includes maintaining a list of identifiers that are selected by a first user and for which online presence information is made perceivable through the list.
10/23/14
20140317120
Identification of points in a user web journey where the user is more likely to accept an offer for interactive assistance
Points in a user's website journey at which an invitation for an interactive session may be offered to users, e.g. Those points at which an invitation made to a user may have a higher propensity to be accepted by the user, are identified.
10/23/14
20140317118
Context aware dynamic sentiment analysis
A system and method to perform context aware sentiment analysis on a project that includes two or more aspects are described. The method includes identifying one or more inputs related to the project.
10/23/14
20140317116
Facilitating collaboration on a record among a group of users of a feed-based enterprise network
Disclosed are some examples of systems, methods and storage media for associating a group of users to a record and facilitating collaboration on the record by the users via a group feed of an enterprise network. In some implementations, a system includes first data associating each of a plurality of group identifiers to one or more record identifiers, and second data associating each of a plurality of feed item identifiers to a respective group identifier or record identifier.
10/23/14
20140317114
Methods and apparatus to monitor media presentations
Methods, apparatus, systems and articles of manufacture to monitor media are disclosed. An example apparatus includes a software development kit provider to provide a software development kit to enable an application developer to create an application developer to create a monitoring enabled application.
10/23/14
20140317109
Metadata templates for electronic healthcare documents
A method of creating a metadata template for a non-dicom electronic healthcare document to be submitted to an electronic repository according to one example embodiment includes creating the metadata template from received metadata values and identified corresponding metadata fields. The created metadata template is stored as default metadata for the non-dicom electronic healthcare document to be submitted to the electronic repository..
10/23/14
20140317105
Live recommendation generation
A system and/or method is provided for using a scatter gather information retrieval system for live recommendation generation. The method may include retrieving user information classified in a plurality of categories.
10/23/14
20140317103
Interface to navigate and search a concept hierarchy
A method includes receiving a concept hierarchy at a computing device. The concept hierarchy identifies concepts associated with a document corpus.
10/23/14
20140317102
System and method for providing location information for communications through an access network
A system and method for providing location information for communications through an access network in accordance with embodiments of the invention are disclosed. The system and method involve receiving a communication including a message from an origination device.
10/23/14
20140317099
Personalized digital content search
Systems and method are disclosed personalizing search results. An example method for personalizing search results may include receiving from a user, a search query for a media item, identifying search results for the search query, and generating a score for each of a plurality of media items identified in the search results.
10/23/14
20140317095
Media balancer
One or more target schedules is generated based on a single master schedule. Replacement media items are inserted into a target schedule instead of the corresponding media items from the master schedule.
10/23/14
20140317093
Facilitating dynamic creation of multi-column index tables and management of customer queries in an on-demand services environment
In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic creation of multi-column index tables and management of customer queries in an on-demand services environment in a multi-tenant environment according to one embodiment. In one embodiment and by way of example, a method includes receiving, at a computing device, a query having one or more filters relating to one or more data type columns of database at a primary table.
10/23/14
20140317089
Context aware dynamic sentiment analysis
A system and method to perform context aware sentiment analysis on a project that includes two or more aspects are described. The method includes identifying one or more inputs related to the project.
10/23/14
20140317078
Method and system for retrieving information
The present disclosures relates to a computer implemented method and system for retrieving information. The method comprises inputting data to generate one or more records.
10/23/14
20140317073
Ranking signals in mixed corpora environments
A method for retrieving information may include receiving a search query within an information retrieval system. Search results responsive to the search query may be identified from a first information corpus and a second information corpus.
10/23/14
20140317069
Indexing of significant media granulars
Identifying significant media granulars may comprise partitioning a media document into one or more media granulars. A score may be assigned to each of the one or more media granulars.
10/23/14
20140317066
Method of analysing data
The present invention disclosure provides a method of analysing data. In a first step a plurality of data records is provided, each data record having a plurality of data elements and having a property.
10/23/14
20140317065
Reference counter integrity checking
Disclosed is a method for checking the integrity of a reference counter for objects in a file system. A unique identifier can be associated with the reference referring to the object.
10/23/14
20140317060
Remote backup of large files
A method of backing up large volumes of data that includes identifying a data file for remote backup; transmitting two or more chunks of the data file in parallel through a communications network to a server to be stored by the server; streaming, compressing, and encrypting prior to transmission each chunk without generating additional data copies for each of the streaming, compressing, and encrypting; detecting an interruption in the transmission a chunk(s); checking the availability and reliability of the communications network; and restarting transmission of the interrupted chunk after a randomized pause period.. .
10/23/14
20140317057
Systems and methods for digital fulfillment of system images
In accordance with embodiments of the present disclosure, an information handling system for deploying a target image to a particular target system may include a storage medium and a processor communicatively coupled to the storage medium. The process may be configured to receive one or more target images and store the one or more target images to the storage medium, receive unique system identifiers for each of one or more target systems and store the unique system identifiers to the storage medium, generate one or more entitlements binding each of the one or more target systems to a respective target image of the one or more target images based on the one or more target images and the unique system identifiers, and deploy a target image having an entitlement for the particular target system..
10/23/14
20140317054
Techniques for administering comingled content items
Techniques for assisting owners to remotely administer their digital content items stored at non-owners' personal computing devices. The techniques involve identifying owned content items from among content items stored in a synchronization replica that is synchronized with synchronization replicas at the non-owners' personal computing devices.
10/23/14
20140317053
Selecting storage facilities in a plurality of dispersed storage networks
A method begins by receiving a data storage request and determining target operational parameters of a set of dispersed storage (ds) units of a dispersed storage network (dsn). The method continues by determining candidate ds units.
10/23/14
20140317051
Computer-implemented system and method for exploring and filtering an information space based on attributes via an interactive display
A computer-implemented system and method for exploring and filtering an information space based on attributes via an interactive display is provided. Entities related to an information space are retrieved.
10/23/14
20140317043
Map intuition system and method
A map intuition system and method that involves machine learning techniques to analyze data sets and identify mappings and transformation rules as well as machine-human interactions to leverage human intuition and intelligence to rapidly complete a map.. .
10/23/14
20140317028
Device, system, and method of detecting user identity based on motor-control loop model
Device, system, and method of detecting identity of a user based on motor-control loop model. A method includes: during a first session of a user who utilizes a pointing device for interacting with a computerized service, monitoring the pointing device dynamics and gestures of the user; based on the monitored dynamics and gestures, estimating parameters that characterize a sensorimotor control loop model of the user; storing in a database a record indicating that the user is associated with the parameters that characterize the sensorimotor control loop model of the user..
10/23/14
20140317027
Contextually-appropriate task reminders
A computing device learns over time how to identify task reminders that are most likely to be helpful to a user in different contexts. The task reminders can remind the user of activities that the user needs to do.
10/23/14
20140317020
Management method and system for a user
The invention provides a system, method, machine readable program and a graphical user interface for managing multiple accounts associated with a user. The method includes receiving a first set of information associated with identification of a user, in response to the first set of information, identifying a second set of information relating to a financial account associated with the user, the financial account being associated with a financial institution, in response to the first set of information.
10/23/14
20140317019
System and method for risk management and portfolio optimization
A processor-based analytical system accesses financial data for a group of assets over a plurality of time periods and identifies relationship characteristics for the financial data during those time periods. The system compares the relationship characteristics to compute pair-wise similarity measures, which are used to group different time periods into states.
10/23/14
20140317013
Virtual warehouse
Various implementations described herein are directed to a non-transitory computer readable medium having stored thereon computer-executable instructions which, when executed by a computer, may cause the computer to receive a request to ship a predetermined number of a type of goods to a destination location. The computer may identify a selection of goods that correspond to the requested type of goods from a database containing a plurality of goods that are physically stored in more than geographical location.
10/23/14
20140317008
Method and system for providing and controlling access to candidate information in collections of partner companies
A non-transitory computer readable medium and a method for providing employee information in response to queries by requesting companies in accord with searching rights granted by the employer includes receiving a query comprising at least readable non-transitory memory residing within at least one network-connected server. A role-based security profile relative to the partner company's employee database allows the matching of one requested attribute at the network-connected server, from the requesting company.
10/23/14
20140317007
System, method, and computer program product for realization of online virtualized objects
A system, method, and computer program product for an online transferring system where a conveying user may transfer a virtual object, representative of a real object, to a receiving user using an electronic id of the receiving user and have a real object delivered to a shipping address of the receiving user without knowledge of the shipping address by the conveying user. The system includes an electronic data store having a set of identifying information for a receiving user.
10/23/14
20140317005
Methods, devices and systems for secure transport of materials
Methods, devices, and systems for the secure transport of material are provided. A transported material may be a biological material, such as a biological sample.
10/23/14
20140317004
Systems and methods for managing digital assets
Computer-implemented systems and methods are provided for tracking the usage of digital assets is disclosed. In one implementation, a method is provided that comprises sending a request to a digital asset management system to acquire a digital asset from a digital asset provider and receiving an asset identifier for the digital asset from the digital asset management system.
10/23/14
20140317000
System and method for management of a patent portfolio
Generally discussed herein are systems and methods for performing patent analytics. In one or more embodiments, a method for performing patent analytics can include receiving an identification of a target patent, analyzing the target patent to determine a corpus of prior art references cited against the target patent, classifying a plurality of the references in the corpus of prior art references as abandoned or active, generating a value rating for the target patent based in part on the classifying, or storing the value rating in association with the target patent..


Popular terms: [SEARCH]



Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



0.8793

8106

3 - - 197