FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Den patents



      
           
This page is updated frequently with new Den-related patent applications. Subscribe to the Den RSS feed to automatically get the update: related Den RSS feeds. RSS updates for this page: Den RSS RSS


Date/App# patent app List of recent Den-related patents
12/11/14
20140366224
 Process for modifying the architecture and improving the yield of crop plants patent thumbnailProcess for modifying the architecture and improving the yield of crop plants
This invention identifies the plant miniyo (iyo) gene and the atrtr1 gene for the initiation of cell differentiation in all plant meristems and in embryogenesis. This invention relates methods for generating transgenic plants in which expression of the iyo and/or atrtr1 genes or their orthologous genes is modified to advancing or delaying the onset of differentiation in one or more meristems of the plant..
12/11/14
20140366221
 Methods of controlling seed size in plants patent thumbnailMethods of controlling seed size in plants
This invention relates to the identification of a regulator protein (termed cyp78a6, or eod3) which controls the size of plant seeds and organs in arabidopsis and other plants. Manipulation of cyp78a protein expression may useful, for example, in improving crop yield and increasing plant biomass..
12/11/14
20140366219
 Increasing soybean defense against pests patent thumbnailIncreasing soybean defense against pests
Disclosed are pest resistance genes isolated from soybean. In several embodiments, a pest resistance gene isolated from soybean includes a nucleic acid sequence at least 80% identical to seq id no: 1 or seq id no: 2 or a degenerate variant thereof, or a fragment thereof.
12/11/14
20140366214
 Molecular markers associated with soybean tolerance to low iron growth conditions patent thumbnailMolecular markers associated with soybean tolerance to low iron growth conditions
The present invention provides methods and compositions for identifying soybean plants that are tolerant or have improved tolerance, or those that are susceptible to, iron deficient growth conditions. The methods use molecular markers to identify, select, and/or introgress genetic loci modulating phenotypic expression of an iron deficiency tolerance trait in soybean plant breeding.
12/11/14
20140366160
 Application marketplace administrative controls patent thumbnailApplication marketplace administrative controls
The subject matter of this specification can be embodied in, among other things, a method that includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users.
12/11/14
20140366159
 Continuous digital content protection patent thumbnailContinuous digital content protection
Data from one or more sensors of a computing device can be employed to provide continuous protection of digital content. After user authentication and authorization, sensor data can be utilized to control access to protected content.
12/11/14
20140366158
 Using biometric verification to grant access to redacted content patent thumbnailUsing biometric verification to grant access to redacted content
Some embodiments provide an electronic device with a novel content redaction engine. The content redaction engine of some embodiments determines whether to redact content for output based on whether a user is biometrically verified.
12/11/14
20140366156
 Method and device for protecting privacy information with browser patent thumbnailMethod and device for protecting privacy information with browser
A method and device for protecting privacy information with a browser are provided. The method includes: monitoring a file to be uploaded by the browser when an uploading process of the browser is executed; determining whether the file to be uploaded includes preset identification information; and blocking the file that is determined to include the preset identification information from being uploaded.
12/11/14
20140366154
 Adaptive communication anonymization patent thumbnailAdaptive communication anonymization
A method identifies anonymized parties in a transmitted communication. A sender replaces one or more communication party identifiers in control data within a communication with one or more anonymized identifiers before transmitting the communication to one or more recipients of the communication.
12/11/14
20140366151
 Tokenized payment processing schemes patent thumbnailTokenized payment processing schemes
A data-processing system, such as a payment processing system, including a tokenizer, such as a card encryption and storage system (ces) employing a tokenization feature. In one embodiment, the present invention provides a first-computer-implemented method for preventing the transmission of confidential information between a first computer and a second computer in communication with the first computer.
12/11/14
20140366149
System and method for using digital strings to provide secure distribution of digital content
A method and system for secure distribution of digital content, using a disintegration tool under control of a distributor of the digital content to divide the digital content into protected and unprotected segments, delivering the unprotected segments to the customer along with installation software and identification information. The segments to be protected are modified using the identification information on the distribution medium and hardware information unique to a particular customer device.
12/11/14
20140366146
Interactive analysis of a security specification
Analyzing a security specification. An embodiment can include identifying a downgrader in a computer program under test.
12/11/14
20140366145
Methods and systems for evaluating software for known vulnerabilities
A vulnerability identification and resolution (vir) computer device for identifying security vulnerabilities in a computer system is provided. The vir computer device includes a memory device for storing data including data representing computing assets installed in the computer system and a processor in communication with the memory device.
12/11/14
20140366144
Multi-dimensional reputation scoring
Methods and systems for assigning reputation to communications entities include collecting communications data from distributed agents, aggregating the communications data, analyzing the communications data and identifying relationships between communications entities based upon the communications data.. .
12/11/14
20140366140
Estimating a quantity of exploitable security vulnerabilities in a release of an application
Examples disclosed herein relate to estimating a quantity of exploitable security vulnerabilities in a release of an application. Examples include acquiring a source code analysis result representing a number of source code issues identified by source code analysis in a target release of an application.
12/11/14
20140366137
System and method for detecting malicious executable files based on similarity of their resources
Disclosed are systems, methods and computer program products for detection of malicious executable files based on the similarity of various types of extractable resources of the executable files. In one aspect, the system determines a type of an executable file being analyzed and determines types of extractable resources of the executable file based on the type of the executable file.
12/11/14
20140366130
Electronic device
An electronic device includes an inertial force sensor, a memory unit, and a control unit connected to the inertial force sensor and the memory unit. The control unit includes a characteristic-waveform processor and an authenticator.
12/11/14
20140366126
Breath actuation of electronic and non-electronic devices for preventing unauthorized access
A mobile device is presented including an input module for receiving a plurality of breath samples from a user and a breath analysis module for performing a chemical analysis of the plurality of breath samples, the chemical analysis involving identification and selection of a plurality of uncommon molecules and uncommon organic compounds for deriving distinguishing breath characteristics and using such breath information to create an initial chemical breath profile associated with the user. The mobile device further includes a breath authorization module for allowing or preventing access to the mobile device in response to a comparison result derived from comparing at least one subsequently created chemical breath profile with the initial chemical breath profile..
12/11/14
20140366125
Information processing device, external device, server device, information processing method, information processing program and system
The information processing device connects with an external device by a first connection unit and a second connection unit different from each other. An identification information specific to the information processing device is transmitted from the information processing device to the external device via the first connection unit, and further transmitted from the external device to the information processing device via the second connection unit.
12/11/14
20140366124
Determination device, determination method and determination program
The determination device displays a target image specifying a random position on a screen, and obtains a designated position by the user for the target image. Then, the determination device determines whether or not the designated position coincides with the position of the target image.
12/11/14
20140366120
Systems and methods for application-specific access to virtual private networks
Described herein are systems and methods utilizing application-specific access to a virtual private network (“vpn”). A method may comprise receiving, from an application executing on a device, a request for a network data flow to a private network, comparing identification information associated with the application against a set of rules stored on a memory of the device, wherein the set of rules identifies conditions for the application to be authorized to access the private network, and establishing a connection for the network data flow upon the identification information satisfying the conditions for the application to access the private network..
12/11/14
20140366117
Method and system of managing a captive portal with a router
In one exemplary embodiment a computer-implemented method of a providing a captive portal with a router includes implementing a hotspot managed by a router. The hotspot comprises an internet-access over a wlan through a rooter communicatively coupled to an internet service provider.
12/11/14
20140366113
System and method for biometric authentication in connection with camera equipped devices
The present invention relates generally to the use of biometric technology for authentication and identification, and more particularly to non-contact based solutions for authenticating and identifying users, via computers, such as mobile devices, to selectively permit or deny access to various resources. In the present invention authentication and/or identification is performed using an image or a set of images of an individual's palm through a process involving the following key steps: (1) detecting the palm area using local classifiers; (2) extracting features from the region(s) of interest; and (3) computing the matching score against user models stored in a database, which can be augmented dynamically through a learning process..
12/11/14
20140366111
Continuous authentication confidence module
Generally, this disclosure describes a continuous authentication confidence module. A system may include user device including processor circuitry configured to determine presence data; a confidence factor including at least one of a sensor configured to capture sensor input and a system monitoring module configured to monitor activity of the user device; memory configured to store a confidence score and an operating system; and a continuous authentication confidence module configured to determine the confidence score in response to an initial authentication of a specific user, update the confidence score based, at least in part, an expectation of user presence and/or selected presence data, and notify the operating system that the authentication is no longer valid if the updated confidence score is within a tolerance of a session close threshold; the initial authentication configured to open a session, the confidence score configured to indicate a current strength of authentication during the session..
12/11/14
20140366110
Methods and systems for single sign-on while protecting user privacy
A method of enabling applications to reference user information is provided, including receiving a request for a user identifier that references a user of the application and sending a second request for the user identifier to a server. The second request may include a second user identifier that references the user and a second authentication token for the second user identifier.
12/11/14
20140366108
Digital identity management
One aspect relates to a process and associated device for managing digital id lifecycles for application programs, and abstracting application programs for multiple types of credentials through a common digital identity management system (dims) and application programming interface (api) layer.. .
12/11/14
20140366106
Apparatus and method for processing data of applet included in a plurality of secure elements
Disclosed is a method of allowing a main terminal to communicate with a portable terminal comprising first and second secure elements. The method includes: allowing the main terminal to communicate with the portable terminal by using a first applet identifier which is previously recorded in the main terminal; and allowing the main terminal to communicate with the portable terminal by using a second applet identifier which is previously recorded in the main terminal, wherein allowing the main terminal to perform the communication by using the first applet identifier and the allowing the main terminal to perform the communication by using the second applet identifier are alternately and repeatedly carried out..
12/11/14
20140366105
Configuring wireless accessory devices
This document describes, inter alia, techniques for configuring or setting up a wireless device. As an example of the features described herein, a first wireless device may be used to configure a second wireless device as follows: the first wireless device may detect that the second wireless device is available and is configurable; the first wireless device may connect to the second wireless device and transmit configuration information to the second wireless device, where the configuration information includes credentials that may be used to access a wireless network (e.g., a password to access a wi-fi network); the first wireless device and the second wireless device may then both connect to the wireless network, using the credentials; once both devices are connected to the wireless network, the first wireless device may verify that the second wireless device has been correctly configured..
12/11/14
20140366104
Information processing system, information processing method, and information processing apparatus
An information processing system includes one or more information processing apparatuses that implement an output data reception unit that receives sets of output data via a network, an identification unit that identifies a user identifier to be associated with the received sets of output data by referring to user information stored in a user information storage unit, a storage processing unit that stores the sets of output data in a data storage unit in association with individual identifiers and a common identifier when the user identifier is not identified by the identification unit, a reporting unit that reports the common identifier via the network, and a transmission unit that receives the user identifier or a combination of an individual identifier and the common identifier via the network, and sends output data associated with the received user identifier or the received combination via the network.. .
12/11/14
20140366103
Device authentication using display device irregularity
A device authentication server authenticates a remotely located device using data representing pixel irregularities of a display of the device. Since each display will deteriorate in a unique and randomized way, a unique mapping of pixel irregularities of a display of a device will be unique.
12/11/14
20140366102
Automated accounts for media playback
Content stored on a server may be selected using a user device and enabled on a central device. The identity of the central device may be authenticated without transmitting user credentials corresponding to the user, user device, user account, etc.
12/11/14
20140366100
Control method, system and method
A computer-implemented control method for a rented device, comprises providing identification data to identify the device at a server, receiving a permission data file for the device from the server on the basis of the identification data, and including data representing a set of operating permissions associated with the device, executing a device specific operation on the basis of the permission data file to restrict or enable a function of the device.. .
12/11/14
20140366099
Method of access by a telecommunications terminal to a database hosted by a service platform that is accessible via a telecommunications network
A method enabling a telecommunications terminal to access a database hosted by a service platform that can be accessed via a telecommunications network. The method includes: transmitting, to a second terminal associated with a mobile identifier of a second telecommunications network, information representing a request for the first terminal to access the database; in the second terminal, sending a response to the access request to an authentication server of the platform; in the authentication server, when a response to the access request is received, verifying the mobile identifier of the second network, and optionally validating the access of the first terminal to the database depending on the outcome of the verification..
12/11/14
20140366090
Unauthenticated access to artifacts in commerce networks
The disclosed embodiments provide a system that facilitates business interaction. During operation, the system identifies a non-registered entity associated with an interaction within a commerce network.
12/11/14
20140366089
Method, apparatus, signals, and medium for managing transfer of data in a data network
A method and apparatus for managing a transfer of data in a data network identifies data associated with a communication session between a first node and a second node in the data network. Further processing of the communication session occurs when a portion of the communication session meets a criterion and the communication session is permitted to continue when the portion of the communication session does not meet the criterion..
12/11/14
20140366086
Determining security factors associated with an operating environment
Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating environment for a computer through a wireless network. The computer identifies one or more local computers operating within range of wireless communications to the computer through a wireless network.
12/11/14
20140366085
Method and system for rapid accreditation/re-accreditation of agile it environments, for example service oriented architecture (soa)
A system and method for managing and analyzing security requirements in reusable models. At least one functional model, at least one security implementation model, at least one requirement model, and meta models of the models are read by a reader.
12/11/14
20140366081
Systems and methods for application-specific access to virtual private networks
Described herein are systems and methods utilizing application-specific access to a virtual private network (“vpn”). A method may comprise receiving, from an application executing on a device, a request for a network data flow to a private network, comparing identification information associated with the application against a set of rules stored on a memory of the device, wherein the set of rules identifies conditions for the application to be authorized to access the private network, and establishing a connection for the network data flow upon the identification information satisfying the conditions for the application to access the private network..
12/11/14
20140366080
Systems and methods for enabling an application management service to remotely access enterprise application store
A method for providing secure remote access to an enterprise application store with enterprise applications for a service running on a mobile device includes receiving an authentication request with user credentials from an access manager on the mobile device. Authentication and a valid session cookie are provided if user credentials are valid.
12/11/14
20140366077
Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same
A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel..
12/11/14
20140366076
Method of processing non-real time service and broadcast receiver
A method of receiving and processing a broadcast signal including a non-real time (nrt) service and a broadcast receiver are disclosed herein. A method of processing a non-real time (nrt) service in a broadcast receiver, the method comprises receiving and processing first signaling information including content access information and second signaling information including content detail information, receiving and processing third signaling information including content update information, receiving and storing a content including at least one file through nrt based on the first signaling information and the second signaling information, identifying update availability of the content based on the content update information included in the third signaling information, and receiving at least one file included in the content by accessing a file delivery over unidirectional transport (flute) session transmitting the content when the update is available..
12/11/14
20140366075
Publishing key frames of a video content item being viewed by a first user to one or more second viewers
A device receives key frame information for each of a plurality of key frames of a video content item and sends the key frame information from the device to a recipient while a corresponding segment of the video content item is being rendered by the device. The key frame information may include key frames of the video content item, references to the key frames of the video content item stored by one or more remote sources, or information identifying the key frames of the video content item to enable extraction of the key frames by a recipient device.
12/11/14
20140366073
Method and apparatus for content playback using multiple iptv devices
An apparatus and method for resuming playback of media content from more than one internet protocol television (iptv) device. The playback of a media asset or media content typically contains an asset id and a start time.
12/11/14
20140366067
Method of processing non-real time service and broadcast receiver
A method of receiving and processing a broadcast signal including a non-real time (nrt) service and a broadcast receiver are disclosed herein. A method of processing a non-real time (nrt) service in a broadcast receiver, the method comprises receiving and processing first signaling information including content access information and second signaling information including content detail information, receiving and processing third signaling information including content update information, receiving and storing a content including at least one file through nrt based on the first signaling information and the second signaling information, identifying update availability of the content based on the content update information included in the third signaling information, and receiving at least one file included in the content by accessing a file delivery over unidirectional transport (flute) session transmitting the content when the update is available..
12/11/14
20140366066
Method and system for providing broadcast program recommendations in a digital television system
The disclosure generally relates to media broadcast technologies, and more specifically relates to a method and system for providing broadcast program recommendations in a digital television system. In one embodiment, a processor-implemented broadcast program recommendation method is disclosed, comprising: storing a user profile including a user interest pattern; tuning to a program channel not currently provided for display, using a tuner; extracting a snippet from the program channel; comparing, using a processor, the snippet with the user interest pattern, to identify a match; determining that the match is valid; and providing by the processor a notification of the match.
12/11/14
20140366056
Transmitting/receiving system and method for processing a broadcast signal
A method and broadcast terminal for receiving an emergency alert message in a sleep mode, are discussed. In one embodiment, the method includes monitoring fast information channel (fic) wake-up indicator in an fic segment to determine if the broadcast terminal should be switched to an active mode to receive the emergency alert message; getting an fic-chunk payload responsive to the fic wake-up indicator in the fic segment, the fic-chunk payload including an emergency alert data package indicator; receiving an alert data indicated by a data package identification included in the fic-chunk payload, the emergency alert data package indicator indicating an emergency alert table describing the emergency alert message is carried in the data; and parsing the emergency alert message based on the emergency alert table..
12/11/14
20140366053
Personal base station system with wireless video capability
A personal base station (pbs) having wireless video capability. The pbs authenticates a mobile device within range for cellular services, and authenticates the user for a level of service for cable television.
12/11/14
20140366039

In one aspect, the present application is directed to a computer system, a computer-implemented method and a computer program product for processing at an application. The computer system may comprise an application operable to process incoming messages, wherein at least two of the incoming messages are correlated, wherein correlated messages need processing at the application in a required order; and a sequencing framework implemented with the application to intercept the incoming messages and comprising an internal buffer to identify the correlated messages and to buffer the correlated messages as a message group with the required order, wherein the sequencing framework interacts with the application by transferring the incoming messages from the internal buffer in the required order to the application for processing..
12/11/14
20140366037
Planning execution of tasks with dependency resolution
A computer-implemented method, program product and system for planning execution of a plurality of tasks according to a plurality of dependencies includes receiving an indication of a task type and execution time, ordering the tasks into a task list according to a primary ordering criterion, receiving an indication of a dependency type for the task type and an indication of a dependency time for the execution time of a predecessor one of the tasks, ordering the dependencies into a dependency list according to the primary ordering criterion, scanning the dependency list for resolving each current one of the dependencies, identifying the predecessor task as a current one of the tasks having the task type meeting the dependency type and the execution time meeting the dependency time, and planning the execution of the tasks according to the resolved dependencies.. .
12/11/14
20140366035
Vehicle electronic control device and data-receiving method
A vehicle electronic control device having a first microcomputer and a second microcomputer connected to an in-vehicle network. The first microcomputer includes a process load level detecting unit that detects a process load level of the first microcomputer, a table in which the process load level is associated with data identification information, and a reception data reducing unit that, in a case where the process load level becomes equal to or greater than a first threshold level, stops receiving one or more data which the first microcomputer has received before the process load level becomes greater than or equal to the first threshold value.
12/11/14
20140366033
Data processing systems
When an atomic operation is to be executed for a thread group by an execution stage of a data processing system, it is determined whether there is a set of threads for which the atomic operation for the threads accesses the same memory location. If so, the arithmetic operation for the atomic operation is performed for the first thread in the set of threads using an identity value for the arithmetic operation for the atomic operation and the first thread's register value for the atomic operation, and is performed for each other thread in the set of threads using the thread's register value for the atomic operation and the result of the arithmetic operation for the preceding thread in the set of threads, to thereby generate for the final thread in the identified set of threads a combined result of the arithmetic operation for the set of threads..
12/11/14
20140366018
Method and system for automatic assignment and preservation of network configuration for a virtual machine
The disclosure herein describes a system, which provides network configuration to a respective network adapter of a large number of cloned virtual machines. During operation, the system stores one or more network identifiers assignable to a network adapter of a cloned virtual machine in a pool of virtual machines cloned from a parent virtual machine.
12/11/14
20140366016
Software installation method, device and system
A software installation method, device and system are disclosed, which relate to computer technology. In the method, when a user requests software installation on a first mobile terminal, receive information of the user and identification info of the software sent from the first mobile terminal, look up corresponding relationships between user information and software information established in advance, and judge whether the corresponding relationships include the information of the user and the identification info of the corresponding software.
12/11/14
20140366015
Method and system for combining multiple applications into a single binary file while maintaining per process sandboxing
A method and system for combining multiple applications into a single binary file while maintaining per process sandboxing are described herein. The method can include the steps of identifying a plurality of applications for delivery to a computing device and analyzing the non-code assets of the identified applications for conflicts.
12/11/14
20140366012
Method and apparatus for providing firmware over the air service to user equipments
A method and an apparatus for providing a firmware over the air service to user equipments in a wireless network environment are provided. In one embodiment, a device management server sends a notification to a base station indicating availability of a new firmware version for associated user equipments.
12/11/14
20140366010
Enabling parallel websphere runtime on different computer
A computer implemented method, a tangible shared storage medium, and a data processing system build a runtime environment of a system. A profile manager identifies a single complete installation of the enterprise application server and constructs the required runtime environments on different general purpose computers by utilizing the files from the complete installation and the specific requirements of each runtime environment..
12/11/14
20140366005
Abstract layer for automatic user interface testing
Systems and methods for providing automatic software testing of a graphical user interface (gui) are described. The system may contain a plurality of user interface (ui) testing tools executing on a computer system.
12/11/14
20140366003
System and method for identifying and valuing software
A system and method for identifying and valuing software is realized by use of a logical structures-to-functions (lsf) model with steps for creating lsf sequences and storing them in a data storage medium for querying. Number and types of lowest abstract functional components and order of flow of logical data processing of each computer program algorithm of the computer program are identified.
12/11/14
20140366002
Searching for an entity most suited to provide knowledge regarding an object
In some example implementations, there is provided a method. The method may include receiving a message from a user interface, the message representing a request for an identity of an entity having information regarding a component of a system being developed; determining whether a cache includes the identity of the entity having the information regarding the component; accessing, from at least a repository, metadata including at least one of a version information for the component and an organization structure information, when the cache does not include the identity of the entity having the information regarding the component, and determining, based on the accessed metadata, the entity, when the cache does not include the identity of the entity having the information regarding the component.
12/11/14
20140366001
System for displaying notification dependencies between component instances
The disclosed embodiments relate to a system that facilitates developing applications in a component-based software development environment. This system provides an execution environment comprising instances of application components and a registry that maps names to instances of application components.
12/11/14
20140365996
Compiling multi-threaded applications for targeted criticalities
Methods are disclosed of compiling a software application having multiple functions. At least one of the functions is identified as a targeted function having a significant contribution to performance of the software application.
12/11/14
20140365994
Automatic source code generation
Source code statements are automatically generated from a profile including variable code elements and methods. The profile is built from an existing code base that has identified variable code elements that differ when used in different versions of the source code statements.
12/11/14
20140365992
Behavior invariant optimization of maximum execution times for model simulation
A device receives a model that includes model elements scheduled to execute in time slots on a hardware device. The device identifies time slots, of the time slots, that are unoccupied or underutilized by the model elements, and identifies a set of model elements that can be moved to the unoccupied time slots without affecting a behavior of the model.
12/11/14
20140365982
Method for making a mask with a phase bar in an integrated circuit design layout
A method for making a mask includes receiving an integrated circuit (ic) design layout and identifying at least one targeted-feature-surrounding-location (tfsl) in the ic design layout, wherein tfsl is identified by a model-based approach. The method further includes inserting at least one phase bar (pb) in the ic design layout and performing an optical proximity correction (opc) to the ic design layout having the at least one pb to form a modified ic design layout.
12/11/14
20140365972
Method for selecting multiple objects and electronic device
A method for selecting multiple objects and an electronic device are provided, and the method for selecting multiple objects is applicable to the electronic device. The electronic device includes a touch screen and a processor, and the processor executes an operating system (os).
12/11/14
20140365970
Method for executing program and electronic device thereof
A method in an electronic device, includes receiving an instruction including an implicit call, identifying at least one program corresponding to the instruction of the implicit call, when a number of the identified program is more than one, providing a first program of the identified program corresponding to the implicit call, and displaying a second program of the identified program corresponding to the implicit call during running of the first program. An electronic device includes a processor configure to create an object representing an implicit call, provide a plurality of programs to created object, determine a first program among the plurality of programs, and execute the first program when the object is selected, and provide at least one second program among the programs during executing the first program..
12/11/14
20140365962
Navigating between applications of a device
A device may detect an event during execution of a particular application of the device. As part of detecting the event, the device may detect a closing of the particular application or may detect a calendar event.
12/11/14
20140365959
Animation emulating live web page content resizing
The embodiments disclosed herein describe ways that a browser application can smoothly animate changing (i.e., decreasing, increasing) web page content width upon opening or closing of a sidebar. Methods include the browser analyzing the web page layout to identify a dominant page portion or to determine whether a centered portion layout exists, temporarily obscuring the web page with a snapshot of the page, identifying the location and size of the dominant or centered portion on the web page, and using the information to make changes to the web page in a layer hidden behind the snapshot..
12/11/14
20140365944
Location-based application recommendations
A method to share map information between an electronic device and other nearby devices using peer-to-peer communication is provided. The method receives identification of different map items such as a route, points of interest, search results, a current map view and sends to a selected nearby device.
12/11/14
20140365943
Serial number control visualization system
A method and apparatus for visualizing a group of parts in an aircraft. A volume in the aircraft is identified.
12/11/14
20140365931
Mouse cursor control method and apparatus
A method for controlling a mouse cursor in this invention includes: upon detecting an event that represents a focus was moved between plural objects displayed on a screen, identifying an object of a movement destination of the focus; identifying a position of the object of the movement destination; setting an end point to which a mouse cursor is moved, based on the identified position of the object of the movement destination; and performing first movement of the mouse cursor to a position that is nearer to the end point, plural times, until the position of the mouse cursor reaches the end point.. .
12/11/14
20140365924
Method and apparatus for accessing a chat room
Methods and apparatus for accessing a chat room are provided. A shortcut of the chat room to be accessed can be detected.
12/11/14
20140365916
Contact list with conversation point reminder
A method is provided to remind a user of a communication device of a conversation point for a future communication. The communication device has access to a contact list, with each contact list entry configured to retrieve a communication address of an entity, a name identifying the entity, and any user-inputted memo for reminding of a conversation point.
12/11/14
20140365914
Determining message data to present
Determining message data to present based on a message is disclosed, including: identifying a web address included in a message sent from a first instant messaging client to a second instant messaging client; extracting identifying information to use to identify page content from the web address; retrieving message data corresponding to the identifying information including by sending a processing request to a server; and presenting the message data within a display window of the second instant messaging client.. .
12/11/14
20140365905
Determining an image layout
In one embodiment, a method includes accessing multiple image elements that have an ordered sequence. From the ordered sequence of image elements, multiple clusters of image elements are determined, where each cluster has one or more image elements arranged in a line.
12/11/14
20140365901
Pushing map information from a device to other devices
A method of sending map related information from a device to a set of associated devices is provided. The method displays a map on a display screen of a first device.
12/11/14
20140365900
Replication of mobile rendering using computer-readable images
An example device includes one or more processors configured to generate for display, data corresponding to a selectable control, the computing device provides a pre-production web application, the selectable control is displayable in association with output of the pre-production web application, and the selectable control, when selected, causes a computer-readable image encoding a uniform resource identifier (uri) associated with the pre-production web application to be generated, to receive a selection of the selectable control, identify the uri, and generate for display the computer-readable image, where the computer-readable image is displayable to a mobile computing device, use the computer-readable image to obtain the uri, make a request to the pre-production web application using the uri, and display the output, receive, from the mobile computing device, the request, and provide to the mobile computing device, the output, such that the mobile computing device displays the output of the pre-production web.. .
12/11/14
20140365899
Systems and methods for accessing system utilities
In one embodiment, an information handling system may include a processor, a display that may provide a user interface allowing a user to select one or more system utilities to be accessed, memory that may include a plurality of memory partitions storing a plurality of system utilities, and a management controller. During a configuration of the information handling system, the management controller may receive a request from the user via the user interface to access one or more selected system utilities; identify one or more memory partitions storing the one or more selected system utilities; and cause the display to display one or more user-selectable icons corresponding to the one or more identified memory partitions to provide the user access to the one or more identified memory partitions..
12/11/14
20140365884
Voice command recording and playback
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for playing back user-defined commands is described. In one aspect, a method includes detecting that a user has initiated playback of a user-defined command on a computing device; identifying an entry that is stored in a log associated with the user-defined command, the entry including data representing a user's interactions with a user interface of the computing device and data representing an action to be performed by the computing device; determining an action that is to be performed by the computing device based on the data included in the entry; and performing the action..
12/11/14
20140365863
Multi-part and single response image protocol
This disclosure describes systems and methods for displaying images on a browser. When a user opens a page/slide in a web application, a web application client generates a unique identifier for each image on the page, combines the identifiers for each image in a url, and forwards the url to a web application server.
12/11/14
20140365860
Method and apparatus for annotating a screenplay
To facilitate the use of audio files for annotation purposes, an audio file format, which includes audio data for playback purposes, is augmented with a parallel data channel of line identifiers, or with a map associating time codes for the audio data with line numbers on the original document. The line number-time code information in the audio file is used to navigate within the audio file, and also to associate bookmark links and captured audio annotation files with line numbers of the original text document.
12/11/14
20140365858
Dynamic language translation of web site content
Methods, systems, and computer readable medium for providing content with respect to a website. A request for content is received where the request includes information related to a user.
12/11/14
20140365857
Virtual embedding of files in documents
Various embodiments herein include one or more of systems, methods, software, and data structures that provide for virtual packaging, or embedding, of electronic files in other files. For example, rather than packaging an electronic file directly in a document file, metadata may be added to the document file including a universal resource identifier (uri), such as a universal resource locator (url), referencing a location where the electronic file may be downloaded from.
12/11/14
20140365856
Improved rendering system
The present invention relates to a system that comprises a rendering server, a rendering device, and a control device. The control device and the rendering device comprise a browser.
12/11/14
20140365850
Authoring presentations with ink
Embodiments of the present disclosure provide a method and system for authoring a presentation with electronic ink data. Specifically, embodiments disclosed herein provide for receiving touch input and identifying type object(s) of presentation data that correspond to the received touch input.
12/11/14
20140365844
Cyclic redundancy check (crc) and forward error correction (fec) for ranging within communication systems
A communication device (device) includes a processor configured to generate an initial ranging ldpc coded signal based on a first ldpc code and then transmits the initial ranging ldpc coded signal to another device (e.g., via a communication interface) for use by the other device for coarse power and timing adjustment. Then, the processor processes a received transmit opportunity signal to identify a transmit opportunity time period.
12/11/14
20140365843
Error correction for entangled quantum states
A memory system comprising a qubit array configured to store therein and read one or more entangled qubit states encoded using a quantum stabilizer code. The quantum-memory system further comprises a quantum-state-refresh module configured to change an entangled qubit state in the qubit array when an error is detected therein.
12/11/14
20140365833
Capturing trace information using annotated trace output
A computer receives a first trace output, generated during a first execution of a first program, that is annotated with an indication of a first pattern of logged events and one or more second programs that identify additional logged events. The computer identifies the first pattern of logged events in a second trace output, which is generated during a second execution of the first program.
12/11/14
20140365831
Detecting intentional corruption of data in a dispersed storage network
A method begins by a dispersed storage (ds) processing module of a ds unit selecting a data slice for corruption analysis and requesting integrity information for the data slice from one or more other ds units of a dispersed storage network. When the one or more requested integrity information is received, the method continues with the ds processing module analyzing the one or more received integrity information and local integrity information of the data slice stored in the ds unit.
12/11/14
20140365830
System and method for test data generation and optimization for data driven testing
A system, medium and method for automatically generating test data to be applied to test a target software code is disclosed. Input parameter data is received from a user via a displayed user interface, wherein the input parameter data is directed to a user selected data type, the data type being a boolean, string, or integer.
12/11/14
20140365825
System for automated computer support
Systems and methods for providing automated computer support are described herein. One described method comprises receiving a plurality of snapshots from a plurality of computers, storing the plurality of snapshots in a data store, and creating an adaptive reference model based at least in part on the plurality of snapshots.
12/11/14
20140365823
Information processing device, information processing method, and computer program
An information processing device includes: a nonvolatile memory having a program area storing a program for booting a system, and backup areas each storing a backup program identical in content to the program; a process executing unit that executes the program to perform a boot process of the system; an error detection unit that performs error detection on the program in parallel with the boot process; and a reboot unit that, when the error detection unit detects an error in the program, performs a recovery process to replace the program with one of the backup programs, and reboots the system using the replaced program. In the recovery process, the reboot unit refers to history information indicating a history of replacement of the program with the backup programs, selects the backup program used for the replacement from among the backup programs, and replaces the program with the selected backup program..
12/11/14
20140365821
Independent management of data and parity logical block addresses
A data storage method includes identifying, in a set of data items associated with respective logical addresses for storage in a memory, a first subset of the logical addresses associated with the data items containing application data, and a second subset of the logical addresses associated with the data items containing parity information that has been calculated over the application data. The data items associated with the first identified subset are stored in one or more first physical memory areas of the memory, and the data items associated with the second identified subset are stored in one or more second physical memory areas of the memory, different from the first physical memory areas.
12/11/14
20140365819
Rebuilding data of a storage system
Proposed are concepts for rebuilding data in a data storage system. Embodiments rebuild data in order of priority as defined by a rebuild policy.
12/11/14
20140365813
Watchdogable register-based i/o
An apparatus comprising a data storage device to store a plurality of register tracking values, each of the plurality of register tracking values to indicate a last successful input/output (i/o) port check, an initialization module to reset a first register tracking value in the data storage device upon receipt of an initialization signal from an i/o refresh subsystem corresponding to the first register tracking value and a failure detection module to identify a second register tracking value in the data storage device that has a value indicating an expired register tracking value.. .
12/11/14
20140365795
Systems and methods for reducing energy storage requirements in a data center
A method for reducing a need for power in a backup mode of operation in a data center includes receiving a first alert from an uninterruptible power supply indicating that the uninterruptible power supply is operating in a first mode, wherein the first mode includes deriving power from a stored energy source, identifying at least one host server configured to receive power from the uninterruptible power supply in the first mode, suspending execution of at least one virtual machine on the at least one host server, receiving a second alert from the uninterruptible power supply indicating that the uninterruptible power supply is operating in a second mode, wherein the second mode includes deriving power from one of a mains power source and a generator, and resuming execution of the at least one virtual machine.. .
12/11/14
20140365792
Battery management system, and method of managing the same
A battery management system includes a plurality of slave controllers, each slave controller of the plurality of slave controllers being coupled to a respective battery module, each of the slave controllers having a slave controller identifier, the respective slave controller identifiers being allocated by a slave controller identifier allocation operation performed by the plurality of slave controllers, and a master controller, the master controller being coupled to each of the slave controllers, the master controller receiving the slave controller identifiers from the slave controllers.. .
12/11/14
20140365787
Scenario power management
One or more techniques and/or systems are provided for dynamically applying power policies to a computing environment. For example, a computing environment may comprise one or more activity components (e.g., a display driver, an audio driver, an application, etc.) that may provide status information used to identify a scenario (e.g., a video game scenario, a full screen video playback scenario, etc.) that is activated for the computing environment.
12/11/14
20140365782
Method and system for providing password-free, hardware-rooted, asic-based authentication of a human to a mobile device using biometrics with a protected, local template to release trusted credentials to relying parties
Biometric data, which may be suitably transformed are obtained from a biometric input device contained within a stand-alone computer or a mobile device, which may contain an asic chip connected to or incorporated within the stand-alone computer or mobile device and which includes the capability for capturing one or more biometric samples and for biometric feature extraction, matching and encryption. For extra security, the biometric matching is used in conjunction with a pin to authenticate the user to the stand-alone computer or mobile device.
12/11/14
20140365781
Receiving a delegated token, issuing a delegated token, authenticating a delegated user, and issuing a user-specific token for a resource
Some embodiments relate to a computer readable medium including a program code, which is configured, when running on a programmable hardware component, to receive a delegated token from a user's device, including receiving a signal indicative of at least the delegated user identifier and a delegating security pattern from the delegated user and including providing the device of the user with a signal indicative of at least a delegated user identifier, and a delegation challenge value. It is further configured to receive, from the device of the user, a signal indicative of at least, in an encrypted form, a delegated token, a user-specific token, a delegation authentication key, a user-specific delegation challenge value, and a delegation check value.
12/11/14
20140365777
Systems and methods for securing network communications
Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (ue) may establish a secure channel with an identity provider, capable of issuing user identities for authentication of the user/ue.
12/11/14
20140365775
System and method for mitigation of denial of service attacks in networked computing systems
In a method of network communication that mitigates denial of service attacks, a server broadcasts cryptographic puzzles with certain time intervals, where each puzzle is only valid for the given time interval. A client receives the puzzle, generates a solution for the puzzle, and sends a network request to the server along with the solution of the puzzle.
12/11/14
20140365773
Systems and methods for controlling a locking mechanism using a portable electronic device
Systems and methods are provided for operating a remotely operable lock. In an example embodiment, a method comprises receiving credentials at a web service from a portable electronic device, authenticating the credentials, and based on a successful authentication, issuing a command for receipt by the lock from the web service or the portable electronic device..
12/11/14
20140365772
Privacy protected interactions with third parties
Various embodiments are directed to computer-implemented methods and systems for a site to facilitate privacy protected interactions between users of a site and a third party utility. For example, a computer may receiving from a user selected from the users of the site, a request to interact with the third party utility.
12/11/14
20140365771
Information processing apparatus, information processing system, information processing method and computer program
An information processing apparatus that controls a display to display a first user interface including a first input field configured to receive identification information and a second input field configured to receive a public key; and controls transmitting identification information received at the first input field and a public key received at the second input field to another information processing apparatus for registration at the another information processing apparatus.. .
12/11/14
20140365770
Apparatus and method for efficiently and securely exchanging connection data
In the described embodiments, a connection data exchange (“cdx”) service serves as an exchange point for connection data for establishing peer-to-peer (“p2p”) connections between devices. During operation, the cdx service can receive a connection data structure (a “ticket”) that was created by a matchmaker or an invitation service in response to requests from devices attempting to establish p2p connections.
12/11/14
20140365753
Selective accumulation and use of predicting unit history
A microprocessor includes a predicting unit and a control unit. The control unit controls the predicting unit to accumulate a history of characteristics of executed instructions and makes predictions related to subsequent instructions based on the history while the microprocessor is running a first thread.
12/11/14
20140365745
Mapping in a storage system
A system and method for maintaining a mapping table in a data storage subsystem. A data storage subsystem supports multiple mapping tables.
12/11/14
20140365742
Systems and methods for preventing unauthorized stack pivoting
An example processing system may comprise: a lower stack bound register configured to store a first memory address, the first memory address identifying a lower bound of a memory addressable via a stack segment; an upper stack bound register configured to store a second memory address, the second memory address identifying an upper bound of the memory addressable via the stack segment; and a stack bounds checking logic configured to detect unauthorized stack pivoting, by comparing a memory address being accessed via the stack segment with at least one of the first memory address and the second memory address.. .
12/11/14
20140365741
Snapshot management in hierarchical storage infrastructure
Embodiments of the present invention disclose a method, computer program product, and system for snapshot management in a storage infrastructure. A computer identifies one or more snapshots within layers of the storage infrastructure.
12/11/14
20140365725
Method and apparatus for efficiently destaging sequential i/o streams
A method for destaging write data from a storage controller to storage devices is provided. The method includes determining that a cache element should be transferred from a write cache of the storage controller to the storage devices, calculating that a dirty watermark is above a dirty watermark maximum value, identifying a first cache element to destage from the write cache to the storage devices, transferring a first data container including the first cache element to the storage devices, and incrementing an active destage count.
12/11/14
20140365722
Solid-state disk caching the top-k hard-disk blocks selected as a function of access frequency and a logarithmic system time
A solid state disk (ssd) caches disk-based volumes in a heterogeneous storage system, improving the overall storage-system performance. The hottest data blocks are identified based on two factors: the frequency of access, and temporal locality.
12/11/14
20140365719
Memory controller that provides addresses to host for memory location matching state tracked by memory controller
This disclosure provides for host-controller cooperation in managing nand flash memory. The controller maintains information for each erase unit which tracks memory usage.
12/11/14
20140365717
Intra-device data protection in a raid array
A system and method for intra-device data protection in a raid array. A computer system comprises client computers and data storage arrays coupled to one another via a network.
12/11/14
20140365694
Communication between host and accessory devices using accessory protocols via wireless transport
An accessory can communicate wirelessly with a host device such as a portable electronic device. Existing accessory protocols developed for wired communication can be used without modification, and a wireless network connecting the two devices can provide a transport or channel connecting the two devices.
12/11/14
20140365690
Methods and apparatus for reliable detection and enumeration of devices
Methods and apparatus for reliable detection and enumeration of devices. In one embodiment, the controller comprises serialized bus protocol (e.g., a universal serial bus (usb)) controller capable of supporting different bus architectures (e.g., usb 2.0 and usb 3.0) of the usb protocol (e.g., extensible host controller interface (xhci) controller).
12/11/14
20140365683
Domain name system bypass in user applications
Disclosed herein are methods, systems, and software for bypassing a domain name system. In one example, a method of operating a user communication device includes receiving a user instruction requesting content within a user application of the user communication device.
12/11/14
20140365682
Methods, systems, and computer program products for associating a name with a network path
In another aspect, a second node in a network detects a first node in first hop included in communicatively coupling the second node and the first node. A first hop identifier for the first hop is determined.
12/11/14
20140365681
Data management method, data management system, and data management apparatus
A data management method includes acquiring, by a management computer, information of an amount of resource load from a plurality of computers; when a first computer having a higher amount of load than a threshold value is detected in a first area to which a first computer belongs, generating, by the management computer, a second identification range of identifier values by adding a first identification range of a first area to which the detected first computer belongs to a first identification range of a second area different from the first area; calculating, by the first computer, a first target identification of a second computer in the second area corresponding to the first data, based on the first identification ranges and the second identification range, when an operation request for first data is received; and transferring, by the first computer, the operation request for the first data to the second computer.. .
12/11/14
20140365674
System and method for sip user agent identification and efficient binding
The present disclosure provides a system and method for session initiation protocol (sip) user agent identification and efficient binding. In accordance with one example embodiment, there is provided a method for use on a session initiation protocol (sip) registration server for registering user agents, comprising: receiving a register message which includes a binding key; determining whether a prior binding associated with the binding key exists in a registration repository; and creating a new binding associated with the binding key and adding the new binding to the registration repository when no prior binding associated with the binding key exists in the registration repository..
12/11/14
20140365671
Computing system with control mechanism and method of operation thereof
An computing system includes: a communication unit configured to receive a discovery request, including a client presence factor, having a scan pattern for discovering a target device; a control unit, coupled to the communication unit, configured to: determine a target device coordinate based on the discovery request for identifying a client device relative to the target device, determine a device connectivity based on the target device coordinate, the client presence factor, or a combination thereof for establishing a backhaul communication between the client device and the target device, and a user interface, coupled to the control unit, configured to present a device information based on a trust level for displaying the device information of the client device having the device connectivity of connected with the target device.. .
12/11/14
20140365668
Using a template to update a stack of resources
Techniques are described that enable a user to upgrade a stack of resources by providing a template that reflects the desired end state of the stack. Upon receiving a new template, the system automatically detects changes that should be performed and determines the order in which the changes should be performed.
12/11/14
20140365666
Request routing in a networked environment
A system, methods, and interfaces for managing request routing functionality associated with resource requests for one or more resources associated with a content provider. The request routing functionality can correspond to the processing of domain name service (“dns”) requests for resources by computing devices and the resolution of the dns requests by the identification of a network address of a computing device that will provide the requested resources.
12/11/14
20140365663
Method and arrangement for suppressing duplicate network resources
A duplicate suppression protocol is introduced in order to suppress duplicate entries from appearing in a list of available network resources. With the duplicate suppression protocol of the present invention, a computer that wishes to query for network resources also asks for duplicate suppression information from the responding network resources.
12/11/14
20140365661
Master election among resource managers
The invention provides a technique for assigning a server to manage resources. The server identifies a capacity value that represents a maximum number of resources that the server can simultaneously manage, and parses data included in a tracker directory to identify the resources that have the fewest number of servers assigned to manage them.
12/11/14
20140365657
Management of network devices within a dispersed data storage network
A method of managing devices in a dispersed data storage network is disclosed. A device list is maintained including entries for every device in the dispersed data storage network.
12/11/14
20140365656
Identity and policy enforced inter-cloud and intra-cloud channel
Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds.
12/11/14
20140365652
Network appliance for monitoring network requests for multimedia content
A network appliance that monitors multimedia content requested by at least one networked computer coupled to a local area network and the internet. The appliance includes a database, at least one interface processing packetized data encapsulating tcp/ip packet data generated by the network computer(s) and communicated over the local area network, routing logic for the tcp/ip packet data, and processing means processing the tcp/ip packet data to identify whether it specifies a url representing at least one particular file type of multimedia content, and if so, adds the specified url and an associated date and time to the database.
12/11/14
20140365648
Network management systems and methods
Example network management systems and methods are described. In one implementation, a method identifies at least one network resource to be managed and identifies at least one domain to be managed.
12/11/14
20140365647
Network visualization systems and methods
Example network visualization systems and methods are described. In one implementation, a method displays a network environment as a network graph using a first zoom level.
12/11/14
20140365637
Methods and systems for reducing metrics used to monitor resources
Computational methods and systems for identifying a subset of a set of metrics that can be used to monitor a resource are described. The subset is representative of the information provided by the full set of metrics.
12/11/14
20140365635
Application router
A process for registering applications is disclosed. The applications typically work in a session initiation protocol (sip) jsr 289 environment.
12/11/14
20140365634
Programmable network analytics processing via an inspect/apply-action applied to physical and virtual entities
Techniques are provided to programming network analytics processing in virtual and physical network devices, useful for software-defined networking (sdn). A controller, e.g., a so-called sdn controller, is configured to identify a control-plane or data-plane flow originating, terminating or transiting a physical or virtual network element.
12/11/14
20140365628
Communication terminal, communication management system, communication management method, and recording medium storing communication management program
A communication terminal reads, from a removable memory, user-specific application information indicating one or more of the plurality of applications that are allowed for use by a specific user, and transmits a request for address information that includes application identification information of each one of one or more applications that are allowed for use by the specific user at the communication terminal to obtain address information associated with the application identification information.. .
12/11/14
20140365627
Communication processing device, communication processing method, and program
A communication processing device including: a storage section configured to store a policy table associating an identifier identifying a communication unit with an identifier of a policy applied to the communication unit and a priority; an obtaining section configured to refer to the policy table and obtain the identifier of the policy and the priority, the identifier of the policy and the priority being associated with the identifier of the communication unit, at a time of protocol processing of the communication unit; a policy applying section configured to group one or more communication units associated with an identifier of an identical policy, and apply the identical policy to the grouped one or more communication units; and a band control section configured to perform band control on a basis of the priority for each communication unit.. .
12/11/14
20140365621
Netconf snmp gateway
Various exemplary embodiments relate to a network configuration protocol (netconf) and simple network management protocol (snmp) gateway (nsg). The nsg may include: a first interface configured as a netconf server, the first interface configured to connect to a netconf client and receive netconf messages, at least one netconf message identifying a managed object; a buffer configured to store the identified managed object; and a second interface configured to send an snmp message to an snmp agent, the snmp message including the managed object stored in the buffer.
12/11/14
20140365618
Network-aware structured content downloads
A request for content is sent, using a client device, to a content server through a first network connection. A root document is received from the content server.
12/11/14
20140365617
Scheduled device communication
A processing device receives a schedule from a server, the schedule identifying delivery times for a set of items associated with the user device. At each delivery time, the processing device contacts the server to obtain one or more items from the server in accordance with the schedule..
12/11/14
20140365614
Monitoring similar data in stream computing
A method, system, and computer program product for monitoring similar data in stream computing are disclosed. The method may include, monitoring at least one input stream of tuples to be processed by an application.
12/11/14
20140365612
Monitoring similar data in stream computing
A method, system, and computer program product for monitoring similar data in stream computing are disclosed. The method may include, monitoring at least one input stream of tuples to be processed by an application.
12/11/14
20140365604
Providing supplemental content in relation to embedded media
Systems and methods are disclosed for providing supplemental content in relation to embedded media. In one implementation, a processing device receives a media request from a third-party platform to incorporate a first media item within the third-party platform.
12/11/14
20140365600
Method, system and server of removing a distributed caching object
The present disclosure discloses a method, a system and a server of removing a distributed caching object. In one embodiment, the method receives a removal request, where the removal request includes an identifier of an object.
12/11/14
20140365594
Systems and methods for message collection
The invention provides systems and methods for processing communication content from a user device. The method performed by a computer and comprising inputting an electronic communication that includes communication content and a routing character string.
12/11/14
20140365592
Method and device for controlling peripheral devices via a social networking platform
A method and device for providing access and control of a peripheral device through a support service provider thereof over a social networking platform includes receiving from the support service provider a servicer registration request specifying a type of peripheral devices to be serviced by the support service provider; establishing a public social network identity for the support service provider based on the request; receiving from a first user a first owner registration request specifying a first peripheral device controlled by the first user; and upon a determination that the first peripheral device is of the type of peripheral devices specified in the servicer registration request: creating a respective social network identity for the first peripheral device on the social network platform; and establishing a social network relationship between the public social network identity of the support service provider, the first user, and the respective social network identity of the first peripheral device.. .
12/11/14
20140365588
Methods, systems, and computer program products for processing a data object identification request in a communication
Methods and systems are described for processing a data object identification request in a communication. In an aspect, a first communications agent in a first execution environment receives data object information identifying a data object matching criterion.
12/11/14
20140365585
System and method for spam filtering using shingles
Disclosed system and methods for detecting spam using shingles. In one aspect, the system receives an electronic message including at least a text portion.
12/11/14
20140365582
Information management system and method
An information management system comprising an activity database to receive messaging data from multiple user equipment devices over at least one messaging channel of a network, a profile engine to generate a profile for an identity using the messaging data, the identity associated with at least one of the devices.. .
12/11/14
20140365580
Collaborative mobile interaction
Some examples include transitioning between an individual mode and a collaborative mode in response to an orientation change of a device. Further, some implementations include identifying data to be shared with one or more other devices (e.g., co-located devices) in the collaborative mode.
12/11/14
20140365576
Identifying a push communication pattern
A method for identifying a push communication pattern includes creating clusters from a communication entity's response buffers. Clusters that meet a first criterion are detected.
12/11/14
20140365574
System and method for incident reporting and notification
A non-transitory is described being operably coupled to a processor and storing processor executable instructions which when executed by the processor cause the processor to receive first information indicative of a school incident report by a reporter. The first information of the school incident report indicating at least a type of incident which violates one or more school policies and a location of the incident.
12/11/14
20140365571
Automatically determining veracity of documents posted in a public forum
An approach is provided to determine the veracity of an online posting. In the approach, when a posting is received at a web site, a topic for the posting is automatically identified.
12/11/14
20140365568
System and method for desktop content sharing
An example method is provided and includes determining, during a desktop sharing session of a meeting session, a content identity of a content item that is being shared, storing information indicative of the content identity in desktop sharing historical information, determining that the meeting session has ended, determining a post-meeting representation of the desktop sharing historical information, and causing display of the post meeting representation of the desktop sharing historical information.. .
12/11/14
20140365564
Network communication using identifiers mappable to resource locators
A technique for providing information via a data network is disclosed. A first server transmits an identifier to a client, where the identifier is mappable to a uniform resource locator (url) associated with content stored on a second server.
12/11/14
20140365559
Dynamic definition for concurrent computing environments
Exemplary embodiments allow a user to create configurations for use in distributed computing environments. Configurations can be arranged in hierarchies in which elements of the hierarchy can inherit characteristics from elements in other layers of the hierarchy.
12/11/14
20140365543
Document management server, document management method, and non-transitory storage medium storing program
A document management server includes: a generation unit configured to generate, by using a request received from a client, a character string for identifying a requested document; a determination unit configured to determine whether or not an image file of the document exists in a location represented by the character string by performing a check using the character string; a storage unit configured to, in a case that the determination unit determines that no image file of the document exists in the location, acquire an entity file of the document, generate an image file of the document by using the acquired entity file, and store, as cache data, the generated image file in the location; an acquisition unit configured to, in a case that the determination unit determines that an image file of the document exists in the location, acquire the image file of the document existing in the location.. .
12/11/14
20140365541
Storing an object in a distributed storage system
A method and system for storing an object in a distributed storage system are provided. An example system includes an object name identifier that receives a request to save an object having an initial object name within a file system space and determines, based on a set of regular expressions, whether the initial object name is a temporary object name.
12/11/14
20140365535
Visual data definition for identifying data items in loosely-structured data
A computer-implemented method is provided for identifying items in loosely-structured data. The method generally includes constructing a composite data definition for items which are to be identified and parsing input data using the data definition.
12/11/14
20140365533
Methods of micro-specialization in database management systems
Systems and methods for utilizing relation- and query-specific information to specialize dbms code at runtime based on identifying runtime locally invariant variables. Runtime invariant is often of the form of variables in code that hold values that are constant during a portion of code execution.
12/11/14
20140365527
Secure access to hierarchical documents in a sorted, distributed key/value data store
Policy-based, cell-level access control is provided in association with a sorted, distributed key-value data store. As data representing a hierarchical document is ingested into the data store, the data is interpreted to identify fields and any sub-fields in the document, each identified field and its associated protection level as identified are translated into a set of one or more fieldname and visibility label pairs.
12/11/14
20140365521
Central registry for binding features using dynamic pointers
A first feature (e.g., chart or table) includes a reference to a dynamic pointer. Independently, the pointer is defined to point to a second feature (e.g., a query).
12/11/14
20140365519
Intelligent processing of user input to a business intelligence software application
A computer-implemented method of processing an input via a user interface of a business intelligence software application for a database, wherein the software applications performs: listening for a user's input, and processing said input while it is received to identify input elements thereof; said input elements comprising at least a first and a second input element; searching among the executable functions for a named executable function that matches the first identified input element; searching in the set of named metadata items for matching metadata items that match the second identified input element; eliminating predefined patterns that do not match the named executable function and matching metadata items while keeping the matching ones; assigning a matching metadata item to one or more matching executable functions in the first predefined patterns according to its/their syntax; and selecting a pattern among the kept ones of predefined patterns and executing the function named in the selected predefined pattern with assigned metadata.. .
12/11/14
20140365515
Evaluation of substitution contexts
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for evaluating substitute terms. One of the methods includes receiving a query and identifying an original term occurring in the query.
12/11/14
20140365509
Smart address book
An apparatus, method, system, and computer-readable medium are provided for maintaining contact information associated with a contact. In some embodiments a request associated with a contact may be received.
12/11/14
20140365508
Systems and methods for scoring geographic locations and for providing related searching tools
Systems and methods for scoring geographic locations and for providing related searching tools are disclosed herein. According to an aspect, a method includes receiving one or more property identifiers.
12/11/14
20140365506
Video searching
Method and processor for searching for a target within video data comprising the steps of receiving a target selected from within video data. Identifying a current selection of target matches for the selected target within further video data.
12/11/14
20140365501
Content distribution method and content distribution server
A content distribution method executed by a computer includes referring to a result of comparing information identifying content data stored in a storage unit with information identifying content data stored in one or more other storage units included in one or more other computers; and collecting representative image data of content data not stored in the storage unit from the one or more other storage units included in the one or more other computers storing the content data not stored in the storage unit, starting from one of the one or more other computers having a greatest number of pieces of the content data.. .
12/11/14
20140365499
System and method for determining concepts in a content item using context
The present invention is directed towards systems and methods for indexing one or more items of content. The method of the present invention comprises extracting one or more items of text from a given item of content.
12/11/14
20140365495
Systems and methods for storing and identifying connections between people, places, and things
The present subject discloses computer implemented systems and methods including: a processing engine embodied in a processor that is in operable communication with a user interface, wherein the processor receives data elements including a plurality of categories and a plurality of connectors, wherein each category represents a person, a place, or a thing, and each connector represents a connection between two categories, wherein the processing engine acts on the categories and connectors received to determine a closed-loop series of categories and connectors and, in response to the determination of a closed-loop series of categories and connectors, the processing engine automatically generates a notification of the closed-loop through the user interface.. .
12/11/14
20140365491
Method for managing personalized playing lists of the type comprising a url template and a list of segment identifiers
A first splicer manages a get-list request coming (1-1) from a player and parameterized with an identifier of a first content and a group identifier. It obtains (1-2, 1-3) an initial playlist comprising a first uri template (pointing towards a first server and pre-parameterized with the identifier of the first content) and a first list of segment identifiers (each, when used as a parameter of the first template, making it possible to generate an uri pointing towards a segment of the first content).
12/11/14
20140365490
Method and system employing graphical electric load categorization to identify one of a plurality of different electric load types
A system for different electric loads includes sensors structured to sense voltage and current signals for each of the different electric loads; a hierarchical load feature database having a plurality of layers, with one of the layers including a plurality of different load categories; and a processor. The processor acquires voltage and current waveforms from the sensors for a corresponding one of the different electric loads; maps a voltage-current trajectory to a grid including a plurality of cells, each of which is assigned a binary value of zero or one; extracts a plurality of different features from the mapped grid of cells as a graphical signature of the corresponding one of the different electric loads; derives a category of the corresponding one of the different electric loads from the database; and identifies one of a plurality of different electric load types for the corresponding one of the different electric loads..
12/11/14
20140365488
Positioning system
There is disclosed a method of managing a database of positioning data, the positioning data including electromagnetic signal source data for use by a positioning system, and the method comprising: receiving signal data relating to signals received from a plurality of electromagnetic signal sources; associating an appropriate one of a plurality of zone identifiers with each of the electromagnetic signal sources, each zone identifier being associated with a respective geographical zone; selecting a subset of the plurality of electromagnetic signal sources in dependence on their associated zone identifiers; processing the signal data relating to the subset of the plurality of electromagnetic signal sources to compute position estimates of the electromagnetic signal sources; and updating the database of electromagnetic signal source data in dependence on the computed position estimates.. .
12/11/14
20140365486
Methods, systems, and computer program products for tagging a resource
Methods and systems are described for tagging a resource. In an aspect, a matched tag is created by associating a user identified tag with a tagging criterion that is based on data other than the tag.
12/11/14
20140365484
Comprehensive user/event matching or recommendations based on awareness of entities, activities, interests, desires, location
A method for comprehensive user/event matching or recommendations is described. The method includes a network environment which receives one or more pieces of user data, event data, or social data from users or third party data sources, determining the relevance of the data for users, and displaying the identified data to user in the form of recommendations..
12/11/14
20140365469
User address book data management system
One or more techniques or systems are disclosed for allowing a first user to control what information is available to other users in the first user's address book on an address book system. A first user can import user contacts from one or more devices into the first user's address book in an address book system.
12/11/14
20140365468
News results through query expansion
Systems and methods for providing improved news results to a news query according to entity expansion are presented. In response to receiving a news query from a computer user, a news engine identifies one or more interest entities of the computer user.
12/11/14
20140365466
Search result claiming
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting instructions to display a user profile page associated with a user, receiving user input associated with a resource of a plurality of resources, the user input being provided through the user profile page, storing the user input as a factor associating the resource with a user, receiving a search query, the search query identifying the user, processing data stored in a database based on the search query and the factor to generate one or more search results, the one or more search results including an indicator associated with the resource, the indicator indicating that the one or more search results are associated with the user, and transmitting the one or more search results for display.. .
12/11/14
20140365461
Customer support solution recommendation system
Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium and a method for automatically providing support solutions in response to user feedback items. The method comprises receiving user feedback items and corresponding support solutions.
12/11/14
20140365457
Active platform system
In the case of a web-based platform apparatus for collecting and editing information, which platform apparatus can be networked to a plurality of subscribers that can be identified by means of an identifier, wherein the information on the platform is formed by a plurality of dual units (duus), wherein a dual unit (duu) respectively comprises a memory location, associated with a prescribeable content and provided with an identifier, and also a prescribeable criterion, associated with the memory location and in the form of an information filter, for input of a piece of information into the memory location, strategic interchange of the contents of dual units by a plurality of suitable subscribers is rendered possible in that the content of at least one dual unit (duu) (104) from a plurality of dual units (101 to 109) of a subscriber a is transmitted to a subscriber b in automated fashion by means of an active feed (duu-feed) (140), and at the same time the content of at least one dual unit (duu) (112, 113) from a plurality of dual units (111 to 121) of a subscriber b is transmitted to a subscriber a in automated fashion by means of an active feed (duu-feed) (130), as soon as a search engine, which is oriented to headwords or groups of headwords and is designed as an electronic filter, on the internet finds prescribeable headwords or prescribeable groups of headwords that are part of the content of a dual unit of a subscriber b in a memory location of a subscriber a.. .
12/11/14
20140365452
Discovering trending content of a domain
Systems and methods for identifying trending content on one or more domains is presented. In response to receiving a request for trending content on each domain of a set of domain, network activity data corresponding to network activity of a recent period of time is obtained.
12/11/14
20140365451
Method and system for cleaning up files on a device
The effects of the present invention comprise enabling the timely and effective cleanup of the junk files on the mobile terminal, releasing more storage space, and leaving no junk file in the mobile terminal storage space, while at the same time enabling the greatest extent of prevention of misidentification and accidental deletion of the junk files, thus enabling a user to utilize and maintain storage space resources of the mobile terminals more efficiently, and facilitating the use by the user.. .
12/11/14
20140365431
Role based notifications in a modular learning system
A system and method is disclosed for providing role based notifications to users of the modular learning system (mls). The modular learning system includes a variety of types of users interacting with the modular learning system and with one another.
12/11/14
20140365430
Information processing apparatus, system, and control method
An information processing apparatus includes a reception unit, a first determination unit, a saving unit, a second determination unit, and a transmission unit. The reception unit receives a file and file information.
12/11/14
20140365424
Systems and methods to manage online analytical and transactional processing for an in-memory columnar database
According to some embodiments, a database, containing entries, may be stored across first and second storage medium, entries in the second storage medium being default invisible for online transactional processing. A central software layer processor between the database and an application may identify a subset of the entries stored in the first storage medium as being default visible for online transactional processing, wherein entries stored in the first storage medium that are not within the subset are default invisible for online transactional processing.
12/11/14
20140365422
Failure prediction based preventative maintenance planning on asset network system
A method for maintaining an asset. The method receives data associated with an one asset and other assets to which the one asset is directly or indirectly physically connected.
12/11/14
20140365412
Method and system for improving prediction in online gaming
A method and system for improving prediction, such as for online gaming, the method including the steps of: sampling values received from at least one sensor, over time; comparing the sampled values to at least one predefined pattern of sensor values; and identifying a set of sampled values at least partially matching at least one of the predefined patterns, wherein the sampled sensor values correspond, at least partially, to non-command-input related movement sensed by at least one sensor, and wherein the predefined pattern of sensor values is expected to precede a given command input.. .
12/11/14
20140365400
System and method of evaluating an investment portfolio
A system and method for performing a diagnostic evaluation of an investment portfolio by categorizing the assets in the portfolio, establishing thresholds for each category and identifying assets that are not in compliance with the established thresholds.. .
12/11/14
20140365398
System and methods for media consumption and ratings through mobile devices
An interactive published website (social network) designed for the general television viewing/media consuming public to have access and an opportunity to interactively submit their viewing opinion/habits on what television/media show they are or have just finished watching. Utilizing designated local segment (dls), a method of television ratings by market and other demographics, individuals can log into a website and register as members using a demographic application.
12/11/14
20140365394
Heavy equipment shipping estimation system and method
A method, computer program product, and computing system for initiating a shipping inquiry for a piece of heavy equipment. A manufacturer/model is defined for the piece of heavy equipment.
12/11/14
20140365391
Equipment-definable shipping estimation system and method
A method, computer program product, and computing system for initiating a shipping inquiry for a piece of heavy equipment. A manufacturer/model is defined for the piece of heavy equipment.
12/11/14
20140365384
Cross-store licensing for third party products
A global licensing service facilitates the mapping of consumers to purchases made by the consumer in one or more stores. One or more consumer identifiers used by a consumer in various stores are stored in a central data store.
12/11/14
20140365383
Centralized licensing system
A request to activate a license file is received by a licensing system. The license file comprises a number of licenses.
12/11/14
20140365382
Content report management in a social networking system
User reports concerning inappropriate content are received by a social networking system and are put into a content report management process that routes the reports into other handling processes based upon the reporting user's identification of the report type. Reports concerning content that is related to the reporting user are routed into a social resolution process that resolves the complaint through self-help and social resolution.
12/11/14
20140365377
High fraud risk transaction authorization
A method of authorizing a transaction involves a computer server authenticating a payment cardholder from a cardholder credential, and receiving a request from a communications terminal to initiate an online transaction with the server. The server communicates with a database of clusters, each uniquely associated with a respective cardholder and identifying an authentication card and a partial payment card number.
12/11/14
20140365374
Security token for mobile near field communication transactions
Devices, systems, and methods are disclosed which relate to an nfc-enabled security token that is removably coupled to a mobile device. The security token may be provisioned with the information by the mobile device, then decoupled from the mobile device and used to authenticate the user or perform a transaction at a pos terminal equipped with an nfc reader.
12/11/14
20140365373
Unified identity verification
In some example embodiments, a system and method is shown that includes receiving a purchase request through an electronic payment financial network (epfn), the purchase request including a token to identify a merchant server. The system and method further includes comparing the token against a merchant identifier value to determine that that token is assigned to the merchant server.
12/11/14
20140365369
Web-based account management with access restrictions
A payment account is administered with access restrictions using a payment system. Once the payment account is established, a consumer can request a payment of funds from the payment account to enter into a transaction.
12/11/14
20140365366
System and device for receiving authentication credentials using a secure remote verification terminal
The present invention relates generally to a system and device for expanding the utility of remote payment technologies by way of a remote transaction card reader and keypad for the entry of an account pin. More specifically, the device moves much of the functionality required for mobile payments away from a mobile card accepting appliance (e.g., a smartphone equipped with a card reader) to the disparate device.
12/11/14
20140365364
Method of payment for a product or a service on a commercial site through an internet connection and a corresponding terminal
The invention relates to a method of payment for a product or a service on a commercial website through an internet connection and a terminal that is connected to the commercial website via the internet connection, with the payment being made using at least one identifier contained in a payment card. According to the invention, the terminal comprises an interface of the nfc type that reads the aforementioned banking identifier contained in the payment card, with the payment card being of the nfc type, and the terminal having an application able to transmit the identifier to a dedicated server on a secure link which the commercial website is connected to after the identifier has been read by the terminal, with the dedicated server concatenating the payment characteristics before transmitting same to the bank site..
12/11/14
20140365363
Secure integrative vault of consumer payment instruments for use in payment processing system and method
A system and a method is provided for secure storage of consumers' credentials, financial accounts such as credit cards, debit cards, prepaid cards, checking accounts, savings accounts, proprietary gift cards, line of credit accounts, brokerage accounts, loyalty accounts, flexible spending accounts, health savings accounts, or the like, and storage of consumers' financial, legal or other important documents in an integrative vault providing payment processing access, protection, management, control and auditability over all of the consumers' payment instruments, other instruments, and important documents in a cloud based payment transaction processing environment.. .
12/11/14
20140365362
Apparatus, system and method of establishing communication between an application operation on an electronic device and a near field communication (nfc) reader
A wireless media player and a related system and methodology are disclosed. One aspect of the wireless media player system pertains to a virtual connector system, apparatus, and method for the automatic establishment of wireless connectivity with other electronic devices.
12/11/14
20140365359
Alternative customer tracking for parking facilities
The customer starts a parking experience by entering an identifier, such as a phone number or thumb print, using a flow thru box to record the individual and the time they entered, combined with the capture of his/her license plate information to identity the vehicle. The vehicle identity and the customer identity are then joined (such as identifier and time).
12/11/14
20140365358
Methods and systems for context-based check-out flows using a pass-through payment gateway
Methods and systems for context-based check-out flows using a pass-through payment gateway (ptpg) are described. One method in a user computing device includes transmitting a probability request for a user to a network application seeking an indication of whether the user would likely utilize payment information stored by the network application while placing an order using a commerce application.
12/11/14
20140365355
Explicit and/or implicit personal data analysis for behavioral based score
A financial interaction or communication related to a set of financial behaviors is facilitated. The financial interaction drives behaviors to affect a real-time credit risk, and the visualization of alterations (increases and decreases) of the credit risk as direct feedback during the financial interaction.
12/11/14
20140365354
Visualization of individual trustworthiness score
Financial behaviors are analyzed for behavioral data to determine financial measures related to a trustworthiness score. A financial communication is facilitated in order to modify one or more behaviors.
12/11/14
20140365353
Management of participation of market participants in a financial exchange
Techniques for managing participation of market participants in a credit exchange and providing automated real-time approved financial offers to communication devices associated with users are presented. An open credit exchange platform (ocep) includes a credit management component (cmc) that facilitates standardizing financial products to facilitate comparing financial offers from different market participants and identifying a preferred financial offer.
12/11/14
20140365350
Financial platform that facilitates management of financial services
Techniques for providing a financial services platform that can facilitate providing financial services to communication devices associated with users are presented. The financial services platform provides an interface that can incorporate base financial services and can allow a communication device user to turn on or off various add-on financial service functions.
12/11/14
20140365348
Identifying and resolving discrepancies between purchase documents and invoices
In an embodiment, a computer-implemented method operating at a server system is disclosed. The server hosts and electronic procurement system.
12/11/14
20140365340
Ensuring appearance of merchant offering in network sites
The present disclosure involves ensuring that items sold by a merchant appear in certain network pages. A network page is automatically accessed in a computing device.
12/11/14
20140365339
Standardized, commercial real estate "lease analysis conversion and comp data" platform
A method for providing service users with occupancy cost comparisons between a plurality of commercial leased properties includes the steps of: (a) defining an occupancy cost parameter for a leased property, (b) providing an interface for service users to input into a searchable database the identifying property information and the specific lease terms required to compute this occupancy cost parameter for each of the leased properties, (c) providing an algorithm that utilizes the inputted specific lease terms information to compute the occupancy cost parameter for each of the leased properties, (d) utilizing the occupancy cost parameters to create a fiduciary-responsibility-abiding (fra) lease comp for each of the leased properties, and (e) storing in the database the fra lease comp for each of the leased properties.. .
12/11/14
20140365338
Attribute ranking based on mutual information
Techniques for ranking the importance of various attributes associated with various product categories are described. According to various embodiments, product category information identifying various products in a particular product category in the inventory of a marketplace website is accessed.
12/11/14
20140365333
Retail store customer natural-gesture interaction with animated 3d images using sensor array
A physical retail store is provided with both physical retail products and a virtual interactive product display. The interactive display includes a display screen and a plurality of sensors, including video cameras or motion sensors.
12/11/14
20140365328
Logistics-aware shipping estimation system and method
A method, computer program product, and computing system for initiating a shipping inquiry for a specific piece of heavy equipment having a defined manufacturer/model. A logistics database is accessed to obtain at least one logistics criterion for the specific piece of heavy equipment, wherein the at least one logistics criterion defines one or more logistical characteristics for the specific piece of heavy equipment.
12/11/14
20140365327
Reverse auction for real-time services
Methods, systems, and apparatus, including computer programs encoded on a non-transitory computer storage medium, for providing reverse auctions for goods and services in real-time. In one aspect, a method includes storing profile information associated with a plurality of information sources, each source associated with a category.
12/11/14
20140365317
System and method for improved advertisement reassignment and bid pricing
This specification describes technologies relating to content presentation. One aspect of the subject matter described herein can be embodied in methods that include: selecting an auction including a first bid from a first advertiser that is associated with a first advertisement, and a second bid from a second advertiser that is associated with a second advertisement, computing respective effective bids that reflecting a product of the respective bids and a respective randomly selected values, comparing the respective effective bids to identify a winning bid, based on an identification of the second effective bid as the winning bid, charging the second advertiser a final auction price reflecting the first effective bid divided by the second value, and charging the first advertiser a baseline price, and providing, based on the winning bid, the first advertisement and/or the second advertisement.
12/11/14
20140365311
Associating advertisements with events
In one embodiment, a method includes receiving a notification identifying the occurrence of a user-initiated event associated with a software application that complies with the specifications of a software development kit. The user is identified based at least in part on the information included the notification.
12/11/14
20140365309
Point of sale transaction processing
A disclosed transaction processing method includes transmitting a request to a credit aggregator in response to a message from a point of sale device to a wireless communication device of a user. Responsive to receiving credit account information from the credit aggregator, a user interface indicative of at least some of the credit account information including account identification information for a plurality of user credit accounts is displayed.
12/11/14
20140365308
Information provision system, wireless terminal, and information provision method
A wireless terminal according to an embodiment includes a list of identification information of wireless lan access points according to a behavior history of a user, and receives information corresponding to an entrance place from an information management device when the entrance to a communication area of a wireless lan access point whose identification information is included in the list is performed.. .
12/11/14
20140365305
Providing geospatial-temporal next-best-action decisions
Embodiments herein provide geospatial-temporal next-best-action decisions. Specifically, a predictive modeling tool is configured to receive, from a user, a first instance of unstructured data, the unstructured data containing an indicator of a transacting opportunity, and generate a profile for the user by combining the unstructured data with structured data, the profile including personality characteristics and identifying information of the user.
12/11/14
20140365304
Cross-device geolocation sensing to geotarget offers
Provided is a process of distributing offers to non-location-sensing devices based on a geolocation sensed by another device, the process comprising: obtaining a geolocation of a user from a mobile device of the user; associating the geolocation of the user with an identifier of the user in an offers engine; receiving a request for an offer from another computing device of the user, the request including or prompting obtaining data from the other computing device sufficient to identify the user; retrieving the geolocation of the user obtained from the mobile device by identifying the user with the data from the other computing device sufficient to identify the user account; selecting, with the offers engine, a responsive offer based on the geolocation of the user obtained from the mobile device; and sending the responsive offer to the other computing device of the user.. .
12/11/14
20140365301
Systems and methods to generate offers based on transaction data
A computing apparatus includes an offer engine configured to generate offers on behalf of merchants based on transaction data and a reduced set of parameters, such as budget, timing, and logo. The offers may be generated to include offer terms, identification of targeted customers to whom the offers will be provided, identification of media channels through which the offers will be distributed, and other aspects that generated based on the transaction data in accordance with the reduced set of parameters..
12/11/14
20140365299
System and method for providing advertising consistency
In example embodiments, a system and method for providing advertising consistency is provided. In example embodiments, identifying information for a primary advertisement that is presented on a primary device is received.
12/11/14
20140365298
Smart budget recommendation for a local business advertiser
Spending data for local advertising campaigns for advertisements directed for a specific business location is analyzed in order to classify the campaigns by geographic location and type of each business. The server then determines the average and range of spending for a plurality of geographic and type classifications.
12/11/14
20140365297
Systems and methods for targeting ad impressions
The present disclosure includes a system, method, and article of manufacture for targeting ad impressions. A list of customer records may be transmitted to a service provider system that identifies a matched customer and installs a cookie on a web client associated with the matched customer.
12/11/14
20140365295
Reward exchange method and system implementing data collection and analysis
A method of operating a data collection and analysis system. An exchange computer receives customer identification data associated with a customer.
12/11/14
20140365289
Method and apparatus for reward calculation and disbursement
Methods and systems for receiving purchase transaction data and identifying the purchase transactions that qualify for customer rebates. In an embodiment, a transaction clearing computer of a payment processing network receives the purchase transaction data from a plurality of acquirer financial institutions.
12/11/14
20140365281
Computerized voting system
Officials using computers research then create lists of certified registered voters and proxies whom are sent computer encoded ballots and return containers. Each ballot and correlated receipt(s) share a unique random symbolic identifier (rsid) and embedded security elements to prevent counterfeiting.
12/11/14
20140365277
Retroactive document retention, reporting and pricing determination
Embodiments of the invention relate to systems, methods, and computer program products for providing retroactive document retention service. In some embodiments, a system is provided that includes: a computing platform including a processor and a storage device, a database comprising rules relating to maintenance of information stored in an archive, a software module stored in the storage device comprising executable instructions that when executed by the processor cause the processor to: (a) identify one or more data items in the one or more databases having a retention date prior to a date of enrollment into the document retention service; (b) retroactively apply the document retention service to the one or more data items by modifying a retention time for each of the one or more data items, wherein the retention time is extend for a predetermined time in accordance with one or more terms of the document retention service..
12/11/14
20140365275
Methods and sytems for compiling marketing information for a client
Methods and systems for compiling marketing information for a client are provided. Data can be obtained from a plurality of social media websites, where each of the social media websites includes a universal resource identifier that points to a client website.
12/11/14
20140365274
Price paid database method and system
A novel price paid database, method, system, and computer program product in which checkout items are scanned at a plurality of stores, and a checkout computer identifies the purchased items. The checkout computer determines a price paid for each purchased item.
12/11/14
20140365273
Data analytics collection for customer interaction with products in a retail store
A system and method for data analytics includes a physical retail store having a plurality of sensors provided in various locations around the physical store. The sensors may include motion sensors, visual imaging cameras, heat sensors, or other kinds of sensors.
12/11/14
20140365271
Industrial asset health model update
Among other things, one or more techniques and/or systems are provided for generating a health profile of an industrial asset based upon data pertaining to such an industrial asset. The health profile describes an expected condition of the industrial asset during a prediction period, a predicted cause of the expected condition, and/or a predicted impact of the expected condition.
12/11/14
20140365270
Proactive simulation and detection of outbreaks based on product data
Embodiments of the present invention relate to proactive computer simulation of portable product failures, and more specifically, to determining the likely cause of an outbreak of foodborne disease or other geographically distributed symptoms of a failure or contamination of a portable product. In one embodiment, a method of and computer program product for simulating portable product failures is provided.
12/11/14
20140365269
Failure prediction based preventative maintenance planning on asset network system
There are provided a method, a system and a computer program product for maintaining an asset. The system receives data associated with an one asset and other assets to which the one asset is directly or indirectly physically connected.
12/11/14
20140365268
Method and apparatus for resource dependency planning
Systems, methods, apparatuses, and computer readable media are disclosed for resource dependency planning. A method is provided for resource dependency planning including receiving resource dependency logic.
12/11/14
20140365267
Global enterprise printing and mailing
Systems, devices, and methods for global enterprise workflow management are disclosed. The system may include a communications module, memory, and processor for executing a method of managing job information.
12/11/14
20140365264
Criticality profile for industrial asset
Among other things, one or more techniques and/or systems are provided for developing a criticality profile of an industrial asset. The criticality profile describes the importance of the industrial asset to a system in terms of one or more criticality metrics and/or one or more confidence profiles.
12/11/14
20140365259
In-field installation record of a project
A method for reporting as-built data of a project is disclosed. In one embodiment, an object for installation is automatically identified by a handheld device associated with an installer and at least one attribute of a task performed by the installer is recorded at the handheld device.
12/11/14
20140365257
Computer aided tracking by biometrics
A computer aided method of racking persons who need to be tracked, comprising the steps of providing means to biometrically identify and track the movements of persons to be tracked; providing business rules and business rule monitoring to assure that persons tracked movements are completed correctly and timely; providing wizard-based computer data entry of persons' tracking data; providing alert notifications by e-mail and by text messaging relating to persons being tracked; providing cloud-based computer data sharing relating to persons being tracked; providing mobile dashboard integration of data relating to persons being tracked; and providing real-time transaction logging of persons' tracking data.. .
12/11/14
20140365255
System and method for applying predicitive analysis to determine client support requirements by means of indirect user interaction
Systems and methods enable the processing of a customer-support request by allowing customers to initiate a support request through a computing device without the need for the customer to provide information relating to the customer's reasons for initiating the request. In one embodiment, a server associated with a provider receives a support request from a customer computing device.
12/11/14
20140365251
Vacancy rate calculation apparatus, vacancy rate calculation system, vacancy rate calculation method and a non-transitory computer-readable recording medium
The vacancy rate calculation apparatus is provided with a restaurant information storing part for storing table identification information, the number of customers that can be seated at each table and group information indicating a group of a plurality of tables which can be grouped. The vacancy rate calculation apparatus receives table identification information of a table at which a customer or customers is/are seated and the number of the customer or customers and determines whether or not the number of the customers exceeds the number that can be seated at the table.
12/11/14
20140365243
Retroactive extraction of clinically relevant information from patient sequencing data for clinical decision support
A catalog (34) of molecular marker tests specifies molecular marker tests annotated with clinical applicability annotations. An electronic patient medical record (22) stores genetic sequencing data (20) of a patient.
12/11/14
20140365238
Biological information distribution server, program thereof, and medical support system using the same
To provide a medical information distribution server for providing a system for sharing a patient's biological information with a plurality of people having different roles, such as doctors and pharmacists, as well as a medical support system that uses such a server. The medical information distribution server is connected via network to a terminal including a card reader, including: a device for saving an identification symbol assigned to a card and read by the card reader, patient id for identifying a patient, and biological information of the patient in association with each other; a device for generating display data from information included in the biological information of the patient in accordance with a condition set in advance by a user of the terminal; and a device for transmitting generated display data to a terminal that read the card including the identification symbol, in response to a request from the terminal..
12/11/14
20140365230
Method and apparatus for maximizing a limited set of identifiers for audio watermarking
A method and apparatus for encoding identifiers into a media item, the method including: embedding a sequence of identifiers equally and in order over a duration of a content of the media item; and storing a mapping between the embedded identifiers and the media item; wherein the sequence of identifiers is created by: (a) generating a subsequence of 2m unique identifiers, m being an integer greater than one; (b) shifting every other identifiers in the generated subsequence to the right by two positions in the subsequence and with the identifier at the end cycling around to the corresponding position at the beginning to generate a new subsequence; (c) repeating step (b) up to m−1 times; and (d) concatenating the generated subsequences to create the sequence of identifiers.. .
12/11/14
20140365225
Ultra-low-power adaptive, user independent, voice triggering schemes
Methods and systems are provided for ultra-low-power adaptive, user independent, voice triggering in electronic devices. A voice trigger, which may be configured as ultra-low-power function, may be run in an electronic device, when the electronic device transitions to a power-saving state, and may be used to control the electronic device based on audio inputs.
12/11/14
20140365224
One way sound
A method and a system for identity authentication are presented. In one example embodiment, audio data (e.g.
12/11/14
20140365222
Mobile systems and methods of supporting natural language human-machine interactions
A mobile system is provided that includes speech-based and non-speech-based interfaces for telematics applications. The mobile system identifies and uses context, prior information, domain knowledge, and user specific profile data to achieve a natural environment for users that submit requests and/or commands in multiple domains.
12/11/14
20140365221
Method and apparatus for speech recognition
A computer-implemented method performed by a computerized device, a computerized apparatus and a computer program product for recognizing speech, the method comprising: receiving a signal; extracting audio features from the signal; performing acoustic level processing on the audio features; receiving additional data; extracting additional features from the additional data; fusing the audio features and the additional features into a unified structure; receiving a hidden markov model (hmm); and performing a quantum search over the features using the hmm and the unified structure.. .
12/11/14
20140365220
Speech recognition circuit using parallel processors
A speech recognition circuit comprises an input buffer for receiving processed speech parameters. A lexical memory contains lexical data for word recognition.
12/11/14
20140365219
Speaker verification in a health monitoring system
A method for verifying that a person is registered to use a telemedical device includes identifying an unprompted trigger phrase in words spoken by a person and received by the telemedical device. The telemedical device prompts the person to state a name of a registered user and optionally prompts the person to state health tips for the person.
12/11/14
20140365218
Language model adaptation using result selection
A received utterance is recognized using different language models. For example, recognition of the utterance is independently performed using a baseline language model (blm) and using an adapted language model (alm).
12/11/14
20140365208
Classification of affective states in social media
Affective state classification embodiments are described which train and use a classifier to identify an affect exhibited by a segment of text. The affect being identified is chosen from a group of affects, each of which corresponds to a different emotion or sentiment being expressed by a person authoring the segment of text.
12/11/14
20140365207
Method and system for classifying reviewers' comments and recommending related actions in idea-generating social media platforms
A system and method for classifying comments are disclosed. The method includes receiving a collection of comments.
12/11/14
20140365206
Method and system for idea spotting in idea-generating social media platforms
A computer-implemented system and method provide for identifying the core of an idea. The method includes receiving an idea submission which includes a textual description of an idea.
12/11/14
20140365201
Training markov random field-based translation models using gradient ascent
Various technologies described herein pertain to training and utilizing a general, statistical framework for modeling translation via markov random fields (mrfs). An mrf-based translation model can be employed in a statistical machine translation (smt) system.
12/11/14
20140365197
Constraint memory node identification in sequential logic
A method of identifying memory nodes includes reading a netlist of the design. For a sequential cell of the design, constraint arcs between constraint and related pins can be extracted.
12/11/14
20140365185
Numerical calculation method and apparatus
A method realizes numerical high-precision calculation of an interflow phenomenon of liquids having different reference densities. Specifically, the method includes: calculating a first and second physical quantities by using, in a riemann invariant, a ratio of a first or second density of a first or second particle to a first or second reference density, instead of the first or second density; calculating a first time-space intermediate value for the first and second physical quantities between the first and second particles, by using the first and second physical quantities; calculating time-space intermediate values for pressure and velocity between the first and second particles, by using the first time-space intermediate value.
12/11/14
20140365179
Method and apparatus for detecting and identifying faults in a process
A method and apparatus is provided for detecting and identifying faults in a process having a set of sensors, each of which produces an associated sensor output signal. The method and apparatus extracts the qualitative trend of each variable after detecting an abnormal situation.
12/11/14
20140365173
Method for acquiring nuclide activity with high nuclide identification ability applicable to spectroscopy measured from sodium iodide detector
A method for acquiring a nuclide activity with high nuclide identification ability applicable to a spectroscopy measured from sodium iodide detector is described. In performing this, an electronic impulse signal received by the sodium iodide detector is transformed into a spectroscopy.
12/11/14
20140365164
Fall detection system using a combination of accelerometer, audio input and magnetometer
A wearable device for detecting a user state is disclosed. The wearable device includes an accelerometer for measuring an acceleration of a user, a magnetometer for measuring a magnetic field associated with the user's change of orientation, a microphone for receiving audio, a memory for storing the audio, and at least one processor communicatively connected to the accelerometer, the magnetometer, the microphone, and the memory.
12/11/14
20140365161
Material analysis system, method and device
The invention relates to a system and method of analysing material as well as to an apparatus for analysing material, particularly, though not necessarily exclusively, biomaterial. The invention entails receiving holographic intensity data comprising at least a holographic intensity pattern associated with a sample of the material of interest and processing, by applying image processing algorithms and techniques, the received holographic intensity data at least to perform one or both steps of detecting and identifying at least one object of interest in the sample thereby at least to generate a suitable output..
12/11/14
20140365157
Cartridge for test strips and a method for including a calibration code onto the cartridge and for reading the code
A cartridge for storing a plurality of test strips suitable for analyzing body fluid, such as blood is designed such that the test strips can be brought out of the cartridge for performing a body fluid measurement. Such test strips need to be identified in order to calibrate the measurement to lot-to-lot variations of test strips.
12/11/14
20140365138
Systems and methods for pattern recognition in diabetes management
A diabetes management system or process is provided herein that may be used to analyze and recognize patterns for a large number of blood glucose concentration measurements and other physiological parameters related to the glycemia of a patient. In particular, a method of monitoring glycemia in a patient may include storing a patient's data on a suitable device, such as, for example, a blood glucose meter.
12/11/14
20140365130
Estimating flow rates from multiple hydrocarbon reservoir layers into a production well
There is provided a computer-implemented method for estimating flow of fluid into a production well extending into a reservoir comprising fluid, the well comprising a central tubing and an annulus surrounding the central tubing. The annulus is connected to the reservoir so as to receive fluid at one or more inflow locations.
12/11/14
20140365129
Oilfield equipment identification method and apparatus
A system comprising a piece of oilfield equipment, an identifier assembly and a reader. The piece of oilfield equipment has an exterior surface.
12/11/14
20140365127
Modeling characteristics of a venue
Methods and apparatuses for modeling characteristics of a venue are disclosed. The method comprises identifying a set of constraints associated with the venue, determining a plurality of paths to be traveled by one or more mobile devices in accordance with the set of constraints, directing the one or more mobile devices to navigate the venue using the plurality of paths, receiving data collected by the one or more mobile devices, and generating a model of the venue using the data collected by the one or more mobile devices..
12/11/14
20140365124
Mapping application search function
Some embodiments provide a method for a mobile device connected to a vehicle's interactive communication system that includes a display screen. The method identifies at least one search term from audio data received through the vehicle's interactive communication system.
12/11/14
20140365114
Providing maneuver indicators on a map
For a device that runs a mapping application, a method for providing maneuver indicators along a route of a map. The maneuver indicators are arrows that identify the direction and orientation of a maneuver.
12/11/14
20140365103
Method and system for collecting traffic data
A method of identifying congestion comprising the steps of monitoring traffic conditions using off call tracking data relating to cellular mobile communication devices carried in vehicles along an off call path and determining when an off call path crossing time of the call path exceeds a threshold. When the off call path crossing time exceeds the threshold, obtaining traffic data from probe vehicles on roads corresponding to the off call path, and analysing the traffic data to determine the location of the congestion along the off call path..
12/11/14
20140365083
Crop product tracking system and method
A system is disclosed that can be used in precision farming to apply crop product to a field. The system includes a remote terminal connected with a network.
12/11/14
20140365065
Protected system for controlling power transactions for an electric vehicle
The invention concerns a protected system for controlling power transactions for an electric vehicle. Identification modules are incorporated into the vehicle battery management system and box, and integrity sensors of the box and of the battery are connected to a monitoring module.
12/11/14
20140365064
Method and system for database compilation on a remote electronic device
A system and method of customizing a data retrieval and storage device for communication with a specific vehicle after the device is initially connected to the vehicle. The system includes a master database having communication information arranged by vehicle specific information, and an automotive scan tool having an incomplete set of preloaded communication information stored thereon.
12/11/14
20140365063
Beam directed motion control system
A method and apparatus comprising an energy source, a position system, and a movement system. The energy source is configured to generate a beam of energy directed at an area on a target for a vehicle.
12/11/14
20140365057
Hybrid vehicle management system, hybrid vehicle control apparatus, and hybrid vehicle control method
A management system is provided for managing a hybrid vehicle having an engine and a motor/generator as power sources. The management system includes an acquisition unit and an area identifying unit.
12/11/14
20140365045
Method of approaching a platform
A method having a preparation stage for preparing an approach path (25) to a theoretical position (20′) of a platform (20). During a consolidation stage, a current position (20″) of said platform (20) is determined and an alert is triggered when the distance (d1) between said theoretical position (20′) and said current position (20″) is greater than a first threshold.
12/11/14
20140365044
Method of approaching a platform
A method having a preparation stage for preparing an approach path (25) to a theoretical position (20′) of a platform (20). During a consolidation stage, a current position (20″) of said platform (20) is determined and an alert is triggered when the distance (d1) between said theoretical position (20′) and said current position (20″) is greater than a first threshold.
12/11/14
20140365032
Apparatus, method, and system for assisting remote parking
An apparatus and a method for assisting remote parking includes a user authentication identifier which requests authentication information on a user when operation of a system for assisting remote parking is requested and authenticates the corresponding user based on the authentication information provided by the user. A discriminator determines whether the user gets out of the vehicle based on information acquired by a sensor installed in the vehicle when the authentication of the user is completed and outputs an operation signal when the authenticated user gets out of the vehicle.
12/11/14
20140365024
Managing time-substitutable electricity usage using dynamic controls
A predictive-control approach allows an electricity provider to monitor and proactively manage peak and off-peak residential intra-day electricity usage in an emerging smart energy grid using time-dependent dynamic pricing incentives. The daily load is modeled as time-shifted, but cost-differentiated and substitutable, copies of the continuously-consumed electricity resource, and a consumer-choice prediction model is constructed to forecast the corresponding intra-day shares of total daily load according to this model.
12/11/14
20140365022
Managing time-substitutable electricity usage using dynamic controls
A predictive-control approach allows an electricity provider to monitor and proactively manage peak and off-peak residential intra-day electricity usage in an emerging smart energy grid using time-dependent dynamic pricing incentives. The daily load is modeled as time-shifted, but cost-differentiated and substitutable, copies of the continuously-consumed electricity resource, and a consumer-choice prediction model is constructed to forecast the corresponding intra-day shares of total daily load according to this model.
12/11/14
20140365020
Dynamic wizard execution
Systems and methods are provided for a non-transitory computer readable medium storing instructions is configured to provide a configuration wizard. The configuration wizard is configured to display, via a single screen, a first input-receiving control configured to receive a user input and a second input-receiving control configured to receive the user input.


Popular terms: [SEARCH]



Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         



Key IP Translations - Patent Translations



1.665

12216

449990 - 0 - 294