FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Den patents



      
           
This page is updated frequently with new Den-related patent applications. Subscribe to the Den RSS feed to automatically get the update: related Den RSS feeds. RSS updates for this page: Den RSS RSS


Systems, methods, and computer program products for data governance and licensing

Mobile risk assessment

Method and device for determining propagation relationship of trojan horse files

Date/App# patent app List of recent Den-related patents
09/04/14
20140250546
 Method for identification and isolation of terminator sequences causing enhanced transcription patent thumbnailMethod for identification and isolation of terminator sequences causing enhanced transcription
The invention relates to efficient, high-throughput methods, systems, and dna constructs for identification and isolation of terminator sequences causing enhanced transcription. The invention further relates to terminator sequences isolated with such methods and their use for enhancing gene expression..
09/04/14
20140250537
 Systems, methods, and computer program products for data governance and licensing patent thumbnailSystems, methods, and computer program products for data governance and licensing
Various embodiments provide a data governance and licensing system for monitoring usage of tracking data associated with transport of a plurality of packages and for facilitating licensing arrangements in connection therewith. In certain embodiments, the system comprises: one or more memory storage areas containing a variety of data and one or more computer processors.
09/04/14
20140250533
 Mobile risk assessment patent thumbnailMobile risk assessment
A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point.
09/04/14
20140250527
 Method and device for determining propagation relationship of trojan horse files patent thumbnailMethod and device for determining propagation relationship of trojan horse files
A method performed by a computer system determines propagation relationships of trojan horse files. A current trojan horse file is stored into a corresponding current level of a propagation relationship tree.
09/04/14
20140250526
 Detecting fraudulent activity by analysis of information requests patent thumbnailDetecting fraudulent activity by analysis of information requests
Techniques are described for use in inhibiting attempts to fraudulently obtain access to confidential information about users. In some situations, the techniques involve automatically analyzing at least some requests for information that are received by a web site or other electronic information service, such as to determine whether they likely reflect fraudulent activities by the request senders or other parties that initiate the requests.
09/04/14
20140250524
 Deception-based responses to security attacks patent thumbnailDeception-based responses to security attacks
Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device.
09/04/14
20140250520
 Firewall method and apparatus for industrial systems patent thumbnailFirewall method and apparatus for industrial systems
Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of the identified access control information.. .
09/04/14
20140250519
 Cloud computing method and system patent thumbnailCloud computing method and system
Methods and systems integrating sensitive or private data with cloud computing resources while mitigating security, privacy and confidentiality risks associated with cloud computing. In one embodiment, a computer network system includes a firewall separating a public portion of the computer network from an on-premises portion of the computer network, a database storing private data behind the firewall, and a user device connected with the computer network.
09/04/14
20140250518
 Computer implemented multi-factor authentication patent thumbnailComputer implemented multi-factor authentication
Computer implemented multi-factor authentication method for authenticating a user of a secured component (21, 31), comprises the user requesting access to the secured component (21, 31) via a client device (2); client device (2) providing a first authentication factor (22) to the user who provides the first authentication factor (22) to a personal device (5) and associated to the user at an authentication component (51, 61); client device (2) and personal device (5) are physically distinct; the user providing a second authentication factor to personal device (5) and forwarding first authentication factor (22) and second identification factor to authentication component (51, 61); authentication component (51, 61) verifying identity of user and providing an access token (62) to secured component (21, 31) which provides the user access to secured component (21, 31) on client device (2) in accordance with the access token (62). Allows separating authentication from use of secured component..
09/04/14
20140250516
 Method for authenticating identity of handset user patent thumbnailMethod for authenticating identity of handset user
A method for authenticating the identity of a handset user is provided. The method includes: obtaining, a login account and a password from the user; judging whether the login account and the password are correct; if the login account or the password is incorrect, refusing the user to access an operating system of the handset; if the login account and the password are correct, sending the login account and the password to a cloud server, wherein the login account and the password correspond to a face sample image library of the user stored on the cloud server; acquiring an input face image of the user; sending the input face image to the cloud server; authenticating, by the cloud server, the identity of the user according to the login account, the password and the input face image..
09/04/14
20140250513
Automatic transfer of credentials between wireless access points
A system and method for transferring configuration information between wireless access points is provided. Configuration information may include ssid and password, but also certain settings such as network and subnetwork settings.
09/04/14
20140250511
Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
A mobile device user is able to execute an app in a federation of wrapped apps without having to login to that app provided that the user has already logged into another app in that federation. The federation of apps on the device uses multi-app authentication to enable the user to start subsequent apps after explicitly entering login credentials for another app in that federation.
09/04/14
20140250510
Identity verification via selection of sensible output from recorded digital data
A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler.
09/04/14
20140250508
System and method for creating and managing object credentials for multiple applications
A method includes storing a credential object for a user to an encrypted silo on an information handling system. The credential object operates to authenticate the user to use an application.
09/04/14
20140250505
Multi-user use of single-user apps
Multi-user use of single-user applications is disclosed. A request to access application data associated with an object identifier may be received in a context of a single-user application.
09/04/14
20140250503
Systems and methods for delivering platform-independent web content
A system and method for providing content on a plurality of platforms. A reference to content and a selection of a selected portion of the content is received from a client device.
09/04/14
20140250499
Password based security method, systems and devices
The invention relates to a method for secure operation of a plurality of devices, the devices suited for use in such method and the entire arrangement of such devices, and further computer program products and related machine readable signal storage media, governing said method or parts thereof, executed on or for configuring to prepare for execution on one or more of said devices, particularly the invention provides for authorization and permissions when logging into and off from a computer network from a computing device. The methods comprise of when executing a logoff procedure, storing the secret information on a second server by use of first credentials generated by a first server and when executing a logon procedure retrieving the secret information from the server by use of second credentials generated by a first server..
09/04/14
20140250498
Visible light communication system, communication terminal and server
A communication module of a communication terminal is configured not to output to a control module, service information provided from a second server whose server id is not registered in a first server. The communication module is configured to receive an authentication code from the first server, and to transmit id information and terminal identification information to the second server.
09/04/14
20140250495
Contactless authentication of optical disk drives
An optical disc drive (odd) includes a radio-frequency identification (rfid) reader. The reader includes a circuit and a coil antenna which has a rotational symmetry with respect to a rotation axis of a motor, shaft and turntable of the odd.
09/04/14
20140250493
Firewall method and apparatus for industrial systems
Method and apparatus for use with systems including networked resources where communication between resources is via dual packet protocols wherein a first protocol includes a frame that specifies a destination device/resource and a data field and the second protocol specifies a final destination device/resource and includes a data field, where the second packets are encapsulated in the first protocol packet frames, the method including specifying access control information for resources, for each first protocol packet transmitted on the network, intercepting the first protocol packet prior to the first protocol destination resource, examining a subset of the additional embedded packet information to identify one of the intermediate path resources and the final destination resource, identifying the access control information associated with the identified at least one of the intermediate path resources and the final destination resource and restricting transmission of the first protocol packet as a function of the identified access control information.. .
09/04/14
20140250491
Systems and methods for cloud data security
Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider (“ssp”) configured to perform or provide one or more security-related services or functions with respect to or on behalf of some other system or service.
09/04/14
20140250480
System and method for obtaining video streams
A system, computer-readable storage medium storing at least one program, and a computer-implemented method for obtaining video streams is presented. A device-agnostic request to obtain a video stream is received from an application executing on a client device, the device-agnostic request including a universal resource identifier (uri) for the video stream, the uri including a type of the video stream and at least one of a name of the video stream and device-specific parameters for the video stream.
09/04/14
20140250478
Method for processing a web service in an nrt service and a broadcast receiver
A method of processing a web service in a non-real time (nrt) service and the broadcast receiver are disclosed herein. A method of providing an nrt service in a broadcasting receiver may include receiving first signaling information, identifying whether a service type of an nrt service is a web service based upon the first signaling information, identifying a web page type and a web page version of the nrt service and browsing the nrt service.
09/04/14
20140250472
Digital media playing system
A digital media playing system includes a digital media server and a digital media output device. By recording the video and audio data that are played by a video and audio playing device of the digital media server, a video and audio recording file is generated.
09/04/14
20140250470
Method of operating one or more controllable devices in dependence upon commands received from a mobile device and system controller thereof
A system controller for operating one or more controllable devices in dependence upon commands received from a mobile device includes a first communication interface for receiving a command from the mobile device and a second communication interface for receiving a message from a controllable device. One or more processors are configured to determine whether the mobile device that sent the command is authorized to operate a target controllable device to which the command pertains, and generate a command identifier for identifying the command, and send an instruction corresponding to the command and including the command identifier to the target controllable device when the mobile device is authorized to operate the target controllable device.
09/04/14
20140250466
Method and system of identifying and providing information about products contained in an audiovisual presentation
The present invention regards a method and a system that allow the viewer of an audiovisual presentation such as a tv program or a movie to receive information about specific products or events of a scene of such audiovisual presentation. According to an embodiment, products or events contained in a scene of the audiovisual presentation and information about such products or events are stored in a database and provided to a device associated with the viewer.
09/04/14
20140250465
Systems and methods for providing multiple versions of subscription content and an option within one version to upgrade to another
Certain embodiments involve providing multiple versions of content to which a user can subscribe and an option within one version that allows a user of that version to upgrade or otherwise switch the subscription to another version of the content. For example, a “go premium” command can allow a user to quickly and easily upgrade from within a basic version to a premium version.
09/04/14
20140250457
Video analysis system
A system may include an interface, memory, and a processor configured to execute instructions stored in the memory. The interface may be configured to receive a signal that may include one or more user-selected frames of video content.
09/04/14
20140250455
System and method of interactive consumer marketing
A method of interactive consumer marketing includes an initial step of: defining a competition enterable by a plurality of persons wherein the competition includes a plurality of rules. A first rule is each person of the plurality entered must perform a specified activity related to goods or services of a sponsor.
09/04/14
20140250451
Method, device and system for realizing broadcast tv
A method for realizing video live broadcast, includes: receiving a request for creating conversation from a user equipment, the request carrying indication information for identifying video live broadcast btv service packet, the btv packet includes several channel program with the same authorization attribute and the same accounting attribute; sending btv service control information corresponding to btv service packet to a network marginal equipment corresponding to the user equipment ue; creating the conversation between a iptv server and the user equipment ue according to the request; sending the channel program that the ue need access to the ue according to the btv service control information. Corresponding equipment and system also are provided.
09/04/14
20140250450
System and method for auto content recognition
System and method for automatically recognizing media contents comprise steps of capturing media content from the internet and/or devices, extracting fingerprints from captured contents and transferring to the backend servers for identification, and backend servers processing the fingerprints and replying with identified result.. .
09/04/14
20140250449
Systems and methods to wirelessly meter audio/visual devices
Example systems and methods to wirelessly meter audio/visual (a/v) devices are disclosed. A disclosed example method receives media content from an a/v source device, embeds a video overlay in the wirelessly received media content, and wirelessly transmits the media content and the video overlay to the wireless a/v device.
09/04/14
20140250448
Methods and systems for reducing spillover by measuring a crest factor
Methods, apparatus, and articles of manufacture for reducing spillover in a media monitoring system are disclosed. An example method includes identifying media associated with media monitoring data.
09/04/14
20140250443
Code analysis for simulation efficiency improvement
A method, computer program product, and computer system for analyzing code to improve efficiency of simulating a hardware system. A computer identifies one or more functions calling an application programming interface of a hardware simulator simulating the hardware system.
09/04/14
20140250442
Conditional notification mechanism
The described embodiments include a computing device. In these embodiments, an entity in the computing device receives an identification of a memory location and a condition to be met by a value in the memory location.
09/04/14
20140250429
Code analysis for simulation efficiency improvement
A computer program product and computer system for analyzing code to improve efficiency of simulating a hardware system. A computer identifies one or more functions calling an application programming interface of a hardware simulator simulating the hardware system.
09/04/14
20140250427
Method and apparatus for producing regulatory-compliant software
A method for producing regulatory-compliant software includes validating a software application and freezing the validated software application in a validation portal, proving-in an infrastructure on which the software application operates, and providing evidence of operational change management for a regulatory agency, which evidence comprises documentation that satisfies the agency's compliance rules. A regulatory-compliant software package is also described..
09/04/14
20140250425
Systems and methods for enabling and configuring tracking of user interactions on computer applications
Methods and systems for tracking user interactions with a computer application. As a computer application is used, it keeps track of user interactions, for example, for use on an analytics server.
09/04/14
20140250424
Method and system for displaying context-based completion values in an integrated development environment for asset management software
A method includes: displaying an editor of an integrated development environment executed by a computing system; receiving an input command from a user; detecting existence or absence of text preceding a cursor position in the editor; identifying at least one completion attribute, the at least one attribute being based on content of text preceding the cursor position if existence of text is detected, or the editor if absence of text is detected; transmitting the identified at least one attribute to a server configured to execute asset management software; receiving a plurality of completion values from the server based on the identified at least one attribute; storing the received plurality of completion values; and displaying, for selection by the user, the plurality of completion values at the cursor position in the editor.. .
09/04/14
20140250419
Methods and systems for application development
Embodiments include a computer-readable medium embodying program code comprising code for receiving input defining a plurality of cells and a logical relationship between the cells, each cell representing a master screen of an application under development. Additional code for associating an asset with a cell, and code for storing a hyper-wireframe data structure identifying the plurality of cells, the logical relationship between the cells, and the asset may be included.
09/04/14
20140250418
Wiring board design system and wiring board design method
The wiring board design system 1 provides a cloud service for a terminal 3 which is used by users via a network 4. When to arrange components on the circuit board, while pushing out automatically wirings which are overlapped with the components on the arranging position, the wiring board design system 1 secures a space on that can arrange the component.
09/04/14
20140250417
Expert system-based integrated inductor synthesis and optimization
Apparatus and method for designing an electrical component including a processor and a user interface, enabling a user to input a desired characteristic of the electrical component, such as inductance or quality factor at an operating frequency for an integrated spiral inductor. The processor is configured to determine sufficiently optimal characteristics of the electrical component, combining the user desired characteristic with other preset characteristics of the electrical component, to define a first model of the electrical component, to simulate the model having the combined characteristics to determine performance, and to draw on a rule-set of expert knowledge relating to the general dependency of at least one design criterion, such as a physical, geometrical or performance characteristic, with another design criterion in order to enable modification of the model, thereby iteratively to determine a design solution for the electrical component through one or more simulations and modifications using the rule-set..
09/04/14
20140250414
Method for measuring assertion density in a system of verifying integrated circuit design
Thereafter, simulation traces for the rtl are received and the number of predicates satisfiable on the simulation traces is computed. A figure of merit of assertion density is determined from the ratio of the respective numbers of predicates.
09/04/14
20140250413
Enhanced presentation environments
Implementations disclosed herein include systems, methods, and software for enhanced presentations. In at least one implementation, motion information is generated that is associated with motion of a subject captured in three dimensions from a top view perspective of the subject.
09/04/14
20140250398
Enhanced canvas environments
Systems, methods, and software are disclosed herein for facilitating enhanced canvas presentation environments. In an implementation, a user interacts with a touch-enabled display system capable of displaying items on a canvas.
09/04/14
20140250397
User interface and method
A user interface method can include providing an object to be controlled, providing a remote control device, capturing an image of the object, using the image of the object to recognize the object, and based on recognition of the object, displaying a second user interface on the viewing screen of the remote control device, wherein the second user interface is substantially identical to a first user interface of the object. A user interface method can also include providing an object to be controlled, providing a remote control device, focusing an image capturing device of the remote control device on the object, identifying coordinates, identifying the object as being associated with the identified coordinates, and based on identifying the object, displaying a second user interface on the viewing screen of the remote control device, wherein the second user interface is substantially identical to a first user interface of the object..
09/04/14
20140250389
Method and device for selecting friends in microblogging
Method and device for selecting friends in microblogging are disclosed. The method includes steps of: the method comprising steps of: calling a friend-select interface and displaying a friend list, a friend address bar and a friend-confirm button on the friend-select interface in response to a detection of an event of a friend-select trigger button being clicked by a user account; adding friend identifiers corresponding to n friends into the friend address bar in response to a detection of an event of the n friends in the friend list being selected by the user account; and detecting an even of the friend-confirm button being clicked by the user account and thereby realizing a selection of the n friends in microblogging, wherein n is an integer greater than 1.
09/04/14
20140250382
Method and device for processing network element object information in 3d topology view
A method and a device for processing network element object information in a three-dimensional (3d) topology view are provided. The method includes: in response to a user's operation of selecting a first network element object in the 3d topology view displayed in a window, sending a first instruction to a back-end server; receiving position coordinates and size information of the first network element object from the back-end server; and adjusting position coordinates of the first network element object in the window according to a size of the window and the position coordinates of the first network element object, multiplying the size information of the first network element object by a preset zoom factor to zoom the first network element object, and redisplaying the zoomed first network element object at the adjusted position coordinates in the window.
09/04/14
20140250372
Methods and systems for page navigation of dynamically laid-out content
A layout can identify placement of a plurality of content units of a document across one or more pages with each page representing a display area for displaying the content of the document. A scrollbar definition can be generated so as to identify a plurality of equally-sized segments of a scrollbar track, with each segment corresponding to a respective one of the pages of the document.
09/04/14
20140250370
Systems and methods for delivering platform-independent web content
A system and method for providing content on a plurality of platforms. A reference to content and a selection of a selected portion of the content is received from a client device.
09/04/14
20140250345
Apparatus and method for controlling memory in mobile communication system
An apparatus and method for controlling a low-voltage memory in a mobile communication system are provided. The apparatus includes a memory for storing data including at least one error caused by a low-voltage, and an error correction unit for identifying whether the at least one error exists in the memory according to a first bit set in a local buffer of an error correction code storage, for comparing location information on the error data read from the memory and location information on error data of at least one protection set in the local buffer of the error correction code storage when it is determined that the at least one error exists in the memory, for generating an error correction code as a result of the comparison, and for correcting the error data of the memory according to the error correction code..
09/04/14
20140250335
Enhanced dump data collection from hardware fail modes
An approach is provided for collecting data for diagnosing a failure of a computer hardware device. After an indication of the failure of the computer hardware device that results in a full system crash is received, an address translation table of a central processing unit of the computer hardware device is collected.
09/04/14
20140250324
Smartphone data backup and restoration system
A smartphone data backup and restoration system on a physical layer is connected to a smartphone through a data transmission line, and the data backup and restoration system and the smartphone are identified and paired by a datalink layer and a network layer, and then a transport layer transmits an identification program to the smartphone, and a session layer completes a trusted connection according to a tcp communication and transmission protocol such as usbmuxd, adb, mtp, and ptp, so that the smartphone is capable of performing a data transmission operation including data backup and restoration at a presentation layer and an application layer to improve the convenience of operation and use.. .
09/04/14
20140250323
Detection of logical corruption in persistent storage and automatic recovery therefrom
A method, system, and computer program product for restoring blocks of data stored at a corrupted data site using two or more mirror sites. The method commences by receiving a trigger event from a component within an application server environment where the trigger event indicates detection of a corrupted data site.
09/04/14
20140250317
Apparatus and method for providing a modular power supply with multiple adjustable output voltages
An apparatus and method for supplying operating voltages to a plurality of electronic devices is disclosed. A plurality of power supply modules of a modular power supply may output voltages to at least two electronic devices.
09/04/14
20140250304
User authentication system and method for encryption and decryption
A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data.
09/04/14
20140250302
Device
According to one embodiment, a device includes a second data generator configured to generate a session key (skey) by encrypting a random number (rn) with the second key (hkey) in aes operation; a one-way function processor configured to generate an authentication information (oneway-id) by processing the secret identification information (secretid) with the session key (skey) in one-way function operation; and a data output interface configured to output the encrypted secret identification information (e-secretid) and the authentication information (oneway-id) to outside of the device.. .
09/04/14
20140250298
Method and device for ensuring information integrity and non-repudiation over time
The present invention relates to a method and a device for ensuring information integrity and non-repudiation over time. At least one example embodiment provides a mechanism for secure distribution of information, which information relates to an instance in time when usage of cryptographic key pairs associated with a certain brand identity commenced, as well as when the key pairs ceased to be used, i.e.
09/04/14
20140250297
Certificate renewal
Certificate renewal is described. A processing device searches a certificate authority (ca) database of digital certificates to identify a certificate that satisfies an expiration condition for automatic renewal.
09/04/14
20140250284
Communication device and management method for identification information item using communication device
In a case where an identification information item determination section (411) determines that a first identification information item indicates a non-replacement part, a first backup section (412) backs up the first identification information item in a backup memory (420). In a case where a confirmation section (413) determines that the first identification information item is not backed up in the backup memory (420), a second backup section (414) backs up the first identification information item in the backup memory (420).
09/04/14
20140250281
Learning machine to optimize random access in a storage system
Mechanisms are provided for optimizing random access in a storage system. According to various embodiments, an access pattern may be identified for a plurality of data segments stored in a first arrangement on a storage medium.
09/04/14
20140250276
Selection of post-request action based on combined response and input from the request source
A data structure includes a plurality of entries each corresponding to a different systemwide combined response of a data processing system. A particular entry includes identifiers of multiple possible actions that can be taken in response to a systemwide combined response.
09/04/14
20140250275
Selection of post-request action based on combined response and input from the request source
A data structure includes a plurality of entries each corresponding to a different systemwide combined response of a data processing system. A particular entry includes identifiers of multiple possible actions that can be taken in response to a systemwide combined response.
09/04/14
20140250268
Method and apparatus for efficient cache read ahead
A method for providing improved sequential read performance in a storage controller is provided. In response to the storage controller receiving a host read request from a host computer, the method includes identifying, by the storage controller, a largest burst length of a plurality of burst lengths in a memory of the storage controller, and determining a maximum number of consecutive times between bursts having a value less than a predetermined value.
09/04/14
20140250265
Data modification based on matching bit patterns
A data storage device includes a memory and a controller. The controller is configured to identify groups of bits that match any bit pattern in a first set of bit patterns.
09/04/14
20140250263
Techniques for reducing memory write operations using coalescing memory buffers and difference information
A system, method, and computer program product are provided for reducing write operations in memory. In use, write operations to be performed on data stored in memory are identified.
09/04/14
20140250259
Data storage device and flash memory control method
A data storage device and a flash memory control method with a cache space. The flash memory control method includes the following steps: using a plurality of channels to access a flash memory, wherein the flash memory has a plurality of blocks each with a plurality of pages, and the blocks are grouped to be accessed by the different channels; allocating a random access memory to provide a cache space, the cache space having a plurality of cache areas caching write data for the different channels, respectively; distributing the data issued from a host to correspond to the different channels; and reusing a latest-updated cache area of the cache space to cache write data when a logical address requested to be written with data is identical to a logical address that the latest-updated cache area corresponds to..
09/04/14
20140250255
Key injection tool
A method can include injecting key information from memory of a memory device into non-volatile memory of a hardware device via a data port of the hardware device; receiving via the data port identification information from the hardware device that identifies the hardware device; and associating the key information and the identification information in the memory of the memory device. Various other apparatuses, systems, methods, etc., are also disclosed..
09/04/14
20140250241
Establishing unique sessions for dns subscribers
A system establishes virtual dns servers that are supported by a dns server. Target ip addresses are assigned for the virtual dns servers.
09/04/14
20140250232
Disaster recovery failover in cloud computing
This disclosure relates to creating a resource and for configuring a resource (314) in cloud computing. A processor receives a source resource identifier of a source resource (304) in a source cloud (302) and sends a request to create a target resource (314) in the target cloud (312).
09/04/14
20140250231
Method for controlling bandwidth and corresponding device
The present invention concerns a device and a method at the device, the device comprising a first interface to a first network comprising an adaptive streaming server, a second interface to a second network comprising at least one adaptive streaming client device, a stream identifier for detecting at least one streaming content requested by the at least one adaptive streaming client device, the at least one streaming content being available at more than one data rate, a bandwidth manager for selecting a data rate among the more than one data rate, a scheduler for transmitting at the second interface the at least one streaming content to the at least one client device at a data rate above said selected data rate but below any higher data rate available for said streaming content.. .
09/04/14
20140250230
Media manifest file generation for adaptive streaming cost management
Methods and systems for adaptive streaming cost management are described. A processing device can receive a request over a network from a media player executing on a client device to adaptively stream media content.
09/04/14
20140250228
Method and system for securing user identities and creating virtual users to enhance privacy on a communication network
A method of enabling a real entity to access a service on a communication network using a virtual entity, the method including the steps of establishing a user account including at least first data corresponding to the identity of the real entity and second data corresponding to the virtual entity and not identifying the real entity, storing the first and second data in a first database, linking between the first and second data in the first database, storing the second data at a second database, associating the second database with a communication network site, connecting the communication network site to the communication network, receiving the second data from an unidentified user on the communication network site, identifying the unidentified user as the virtual entity based on receiving the second data, and allowing the virtual entity to access the service.. .
09/04/14
20140250227
Complex interaction recording
A system for complex interaction recording, comprising a recording management server that operates on a network-connected computing device and records communications, a record server that operates on a network-connected computing device and presents records for review and interaction by a human user, and an interaction evaluation server that operates on a network-connected computing device and identifies interactions segments and groups them into complex interactions, and a method for recording complex interactions comprising the steps of loading an interaction, identifying segments within the interaction, grouping segments into a complex interaction, and sending the resulting complex interaction as output.. .
09/04/14
20140250219
Synchronizing translated digital content
Aspects of the present disclosure relate to one or more configured computing systems identifying when content includes a base content and a translated content that can be synchronously presented. Once a content match is identified, a device to receive synchronization information can also be identified.
09/04/14
20140250217
Interfaces to manage direct network peerings
Methods and apparatus for interfaces to manage direct network peerings. A system may include a data center, endpoint routers and a connectivity coordinator.
09/04/14
20140250211
Containerized software for virally copying from one endpoint to another
A method, system and computer readable medium include objects with media content. The method includes receiving, at one or more servers, a request for the media content to be displayed at an endpoint.
09/04/14
20140250209
Method for processing a web service in an nrt service and a broadcast receiver
A method of processing a web service in a non-real time (nrt) service and the broadcast receiver are disclosed herein. A method of providing an nrt service in a broadcasting receiver may include receiving first signaling information, identifying whether a service type of an nrt service is a web service based upon the first signaling information, identifying a web page type and a web page version of the nrt service and browsing the nrt service.
09/04/14
20140250207
Proxy device receiving specific data from instruction device in response to transmitted response data and transmitting specific data to outputting device
In a proxy device, an acquiring unit acquires one of outputting-device-identification data and instruction-device-identification data from a storing unit. The storing unit stores the outputting-device-identification data associated with the instruction-device-identification data.
09/04/14
20140250203
Cross-platform document exchange using mobile devices
Document exchange is disclosed between a computer and a portable device equipped with camera functionality, memory storage, network interface, and appropriate software. An image of a computer screen is captured by the portable device.
09/04/14
20140250199
Method and system for directly targeting and blasting messages to automatically identified entities on social media
Some embodiments provide a communication tool that directly sends messages to accounts of different entities across different social media sites by automatically identifying and associating the accounts of the entities when the entities are referenced in the contents of the messages. Such identification and association is performed without the message originator manually specifying the accounts as intended recipients for the messages.
09/04/14
20140250194
Synchronized data changes
A method synchronizes data between a first computer and a second computer. An original first data in a first computer is changed into revised first data in the first computer by inserting a data change into the original first data.
09/04/14
20140250192
Crowdsourcing user-provided identifiers and associating them with brand identities
A system and method for crowdsourcing user-provided brand identifiers and distributing content based on crowd-sourced identifiers is provided. Different user-provided brand identifiers are extracted from messages provided by users of a social network.
09/04/14
20140250183
Home appliance information management apparatus, home appliance information sharing method, and home appliance information sharing system
A management apparatus which collects, from a home appliance, home appliance information which is information related to the home appliance and provides a user with to-be-provided information which is information obtained from the collected home appliance information, includes: a managing unit which manages the home appliance information; and a home appliance information holding unit which holds, in association with each other, (i) the home appliance information and (ii) share information which is for sharing the home appliance information and is associated with the user. The managing unit refers to data held by the home appliance information holding unit when a request for to-be-provided information is issued by the user, obtains the home appliance information held in association with share information identical to the share information associated with the user, and provides the user with to-be-provided information obtained from the obtained information..
09/04/14
20140250180
Ranking videos for a user
In one embodiment, a method includes determining by a computing device a set of videos that a user may watch. For each video, a coefficient value is determined for each of one or more coefficient factors.
09/04/14
20140250178
Content based discovery of social connections
Methods, systems, and computer-readable media are provided for identifying social connections. In some implementations, the occurrence of a first reference to a first person and a second reference to a second person is identified in unstructured data.
09/04/14
20140250177
Recommending content based on proxy-based preference indications
In one aspect, a method includes receiving an indication of a user request to view content at a social networking site, identifying one or more genres associated with the user, where each genre acts as proxy for a grouping of content that is of interest to the user, determining one or more entities mapped to the one or more genres, identifying a plurality of posts associated with the one or more entities and providing one or more of the plurality of posts for display to the user in response to receiving the indication. Other aspects can be embodied in corresponding systems and apparatus, including computer program products..
09/04/14
20140250173
Selectively porting meeting objects
Customizing an electronic meeting broadcast is described in which the meeting canvas is customized to the capabilities of the device of the participating user. The meeting server manages the electronic meeting including each of the participants' connections into the electronic collaboration space.
09/04/14
20140250170
Providing a user with virtual computing services
Systems and methods for providing a user with virtual computing services are disclosed. In one embodiment, a method for providing virtual computing services to a specific user, may comprising: detecting a request generated from a user device of the specific user to access data; in which the data is not accessible by applications installed on the user device; identifying a file type of the data; and providing the specific user access to a remote application or a virtual desktop, in which the remote application or the virtual desktop is configured to allow the specific user to open, execute, edit, and/or access the data..
09/04/14
20140250157
File level hierarchical storage management system, method, and apparatus
Time required for a file server to determine files to be migrated from a first storage region to a second storage region is reduced. A file service system coupled to the storage system for providing a first storage region and a second storage region stores identifiers of files that have been accessed by a client, in accessed file identifier information and determines the files to be migrated from the first storage region to the second storage region based on metadata of the files stored in the first storage region and the accessed file identifier information..
09/04/14
20140250149
Identifying element relationships in a document
An information processing apparatus includes a text mining section configured to perform text mining on text data acquired from the outside and to output extracted information; an identification section configured to search a development database storing elements constituting a product and the relationship among the elements by using the information extracted by text mining to identify an element related to the information; and a notification section configured to notify the identified element to a user, a program for use in the information processing apparatus.. .
09/04/14
20140250148
System and method for managing images over a network
Systems, methods, and computer-readable media for managing image files over a network. In an embodiment, a notification is received from a remote server.
09/04/14
20140250147
Generating search results containing state links to applications
A method for generating search results containing state links to applications. The method includes receiving a search query from a remote computing device, generating a state link to a state of a native application based on the search query and providing the state link to the remote computing device, all by a processing device.
09/04/14
20140250144
Method and system for enabling electronic communication through connectivity of separate social graphs
A server receives a query message from a requester that identifies a source node of a first graph and includes a target information. The server then preferably searches a plurality of graphs to locate one or more nodes that include or are associated with the target information.
09/04/14
20140250141
Location based full text search
A method and system for a location based full text search is disclosed. The system generates interwoven bit vectors for documents that are stored in a database.
09/04/14
20140250129
Managing ownership of redundant data
According to one embodiment, a method includes storing instances of a file in a first storage tier and a second storage tier of a storage system, wherein the second storage tier uses less expensive and/or slower-to-access storage media than the first storage tier. Each instance of the file on the first and second storage tier is associated with a unique program identifier (upi).
09/04/14
20140250128
System and method of selecting events or locations based on content
Systems and methods of returning location and/or event results using information social media content are provided. One or more social networking servers are accessed to retrieve social media content.
09/04/14
20140250127
System and method for clustering content according to similarity
Systems and methods for clustering content according to similarity are provided that identify and group similar content using a set of tags associated with the content. A topic model of a group of content is built, producing a probability distribution of topic membership for the content.
09/04/14
20140250125
Identifying an incident-addressing step
Relationships among incident-addressing steps, applications, and incidents are determined, based on information relating to the applications and the incidents. For addressing a given incident that occurred with respect to a particular application, at least one incident-addressing step is identified using the determined relationships..
09/04/14
20140250122
Systems and methods for travel management
A system and method comprising: receiving itinerary data from at least two sources; identifying a traveler associated with the itinerary data; and adding information about the identified traveler to the itinerary data.. .
09/04/14
20140250121
Translating business scenario definitions into corresponding database artifacts
The present disclosure involves systems, software, and computer-implemented methods for providing process intelligence by translating a business scenario definition into one or more corresponding data storage system artifacts. One example method includes identifying a process intelligence scenario associated with one or more business processes and including one or more definitions defining an observable behavior of the one or more business processes, processing the one or more definitions to produce an executable description including one or more artifacts associated with a data storage system, the one or more artifacts associated with the one or more definitions, storing the executable description in the data storage system, and processing one or more flow events associated with the one or more business processes using the executable description in the data storage system to expose the observable behavior of the business process defined in the process intelligence scenario..
09/04/14
20140250119
Domain based keyword search
A database keyword search technique that relies on a domain based storage infrastructure is disclosed. In operation, a keyword search string is processed to generate a set of search string permutations.
09/04/14
20140250117
Query-based user groups in social networks
Implementations of the present disclosure include obtaining one or more queries, processing data stored in a data store based on at least one query of the one or more queries to identify a plurality of users, the plurality of users sharing a commonality that is a subject of the at least one query, generating one or more query-based social circles, the plurality of users populating a query-based social circle of the one or more query-based social circles, the query-based social circle being directed to the commonality and defining a distribution list for distributing digital content provided by one or more users of the plurality of users, and transmitting social circle data corresponding to the query-based social circle to display a representation of the query-based social circle to at least one user of the plurality of users.. .
09/04/14
20140250116
Identifying time sensitive ambiguous queries
A system and method for generating search results includes: receiving a search query with a search term; parsing the search term; determining that at least a portion of the parsed search term is an ambiguous, time-sensitive query; retrieving an intended search term according to a current time of day from a data store when it is determined that at least a portion of the parsed search term is an ambiguous, time-sensitive query; and preparing a search results page such that search results more closely matching the derived intended search term are placed in a most prominent position on the search results page.. .
09/04/14
20140250113
Geographic relevance within a soft copy document or media object
A technique is provided for identifying geographic context in a media object to embed meta tags for the geographic context in the media object. Input is received of the media object including geographic relevant expressions.
09/04/14
20140250111
External linking based on hierarchical level weightings
Certain implementations of the disclosed technology include systems and methods for external linking based on hierarchal level weightings. The method may include associating external query data having one or more query field values with a record in a linked hierarchical database.
09/04/14
20140250109
Reranking using confident image samples
The techniques described herein determine an initial set of ranked images associated with an image-based search query. Based on visual content similarities between images in the initial set of ranked images, the techniques select confident image samples from the initial set of ranked images.
09/04/14
20140250107
Apparatus, system and method for rapid cohort analysis
An apparatus, system, and method for rapid cohort analysis. In one embodiment, the apparatus includes an interface and a processor.
09/04/14
20140250106
Generating search results containing state links to applications
A disclosure provides techniques for generating search results containing state links to applications. A method includes receiving a query containing one or more query parameters from a remote computing device and identifying a set of third party applications corresponding to the one or more query parameters.
09/04/14
20140250101
Real time content searching in social network
Indexing and retrieving real time content in a social networking system is disclosed. A user-term index includes user-term partitions, each user-term partition comprising temporal databases.
09/04/14
20140250099
Objective and subjective ranking of comments
A system may receive a request for comments associated with a particular document, identify a comment associated with the particular document, generate an objective score for the comment that is independent of a user associated with the request, identify the user associated with the request, generate a subjective score for the comment based on parameters associated with the identified user, generate a combined score for the comment by combining the objective score and the subjective score, and provide the comment, ranked based on the combined score, to the user for presentation with the particular document.. .
09/04/14
20140250096
Embedded business metadata
A methodology is disclosed for improving searches of a distributed internet network. A distributed internet network is searched for a particular information type, searching for a field identified using a predetermined identifier indicating that the field comprises information of the particular information type.
09/04/14
20140250095
Managing data transaction requests
In various embodiments, a system, method, and related computer-readable storage medium to process data transactions are provided. In one example, a system is arranged to process data transactions in a data store including a plurality of databases.
09/04/14
20140250094
Step identifier based on a universal timestamp
One or more transactions, and their audited update actions, operating on a database may be identified by a step id. The step id may include a first set of bits identifying a time the step was created.
09/04/14
20140250091
Systems and methods for managing media files
Various embodiments are disclosed for facilitating media management. A method for managing digital content comprises obtaining a media file and generating a primary identifier unique to the media file and obtaining at least one storage destination for the media file, wherein the at least one storage destination comprises one of: at least one user-specified storage destination and at least one storage destination automatically determined by an analyzing component.
09/04/14
20140250087
Computer-implemented system and method for identifying relevant documents for display
A computer-implemented system and method for identifying relevant documents for display are provided. Themes for a set of documents are generated.
09/04/14
20140250085
Rollback counters for step records of a database
A rollback record may be created for each step identifier (id). The rollback record indicates how many times the step record identified by the step id has been rolled back during operation of the database.
09/04/14
20140250082
Methods and systems for backing up a search index
An index to be backed up in a computing environment is identified. A staged copy of the index to be backed up is created.
09/04/14
20140250081
Creating validated database snapshots for provisioning virtual databases
Virtual databases are provisioned using point-in-time copies of a source database. Transaction logs received from the source database are applied to a point-in-time copy of the source database to create recovery milestones comprising database blocks that can be used to provision virtual databases.
09/04/14
20140250076
Image level copy or restore, such as image level restore without knowledge of data object metadata
A system and method for performing an image level restore of data is described. In some examples, the system receives a request to restore a file and transmits the request to an intermediate component.
09/04/14
20140250073
Asynchronous namespace maintenance
Asynchronous namespace maintenance in a distributed replicated data storage system is disclosed. An access device/program serving as a front end to the distributed replicated data storage system updates a batch of updated meta data about stored data items when data items are stored in the distributed replicated data storage system.
09/04/14
20140250068
System for an open architecture deployment with centralized synchronization
One aspect of the preferred embodiment relates to an application framework for managing mobile clients and application programs. By utilizing the preferred embodiment, a system administrator may be provided the capability to manage and control multiple devices, directly and indirectly, using push (server-initiated) and/or pull (client-initiated) techniques from a single location.
09/04/14
20140250064
Method and system for supporting off-line mode of operation and synchronization
Systems and methods for synchronizing multiple copies of data in a network environment that includes servers and clients so that incremental changes made to one copy of the data can be identified, transferred, and incorporated into all other copies of the data. The synchronization can be accomplished regardless of whether modifications to the data have been made by a client while the client is in an on-line or off-line mode of operation.
09/04/14
20140250063
Synchronized data changes
A system and/or computer program product synchronizes data between a first computer and a second computer. An original first data in a first computer is changed into revised first data in the first computer by inserting a data change into the original first data.
09/04/14
20140250062
Systems and methods for facilitating the development of an application that accesses data
Certain embodiments facilitate developing an application using a client-side object model to data source mapping. This may involve defining data use on the client side of the application in various ways that simplify the development necessary to implement data access features.
09/04/14
20140250061
System and method for accessing information in a replicated database
A method for accessing information in a replicated database may include receiving a request for information in a database. The request may be associated with a table in the database.
09/04/14
20140250058
Smart content feeds for document collaboration
Example embodiments relate to smart content feeds for document collaboration. In example embodiments, a user may use a system to perform a search of a document repository in order to identify related content for adding to a target document.
09/04/14
20140250047
Authoring system for bayesian networks automatically extracted from text
A system and computer program product that facilitates authoring of a bayesian belief networks by: accessing text content stored in a content storage device; identifying statements within said accessed text content indicating a dependence relation; extracting said statements indicating said dependence relation from said text content; and aggregating said extracted statements into a form suitable for representation as a bbn network structure. To identify statements indicating a dependence relation, the system identifies one or more lexical and semantic attributes of variables within a text unit indicating a conditional dependence relation between two or more variables.
09/04/14
20140250045
Authoring system for bayesian networks automatically extracted from text
A system and method that facilitates authoring of a bayesian belief networks by: accessing text content stored in a content storage device; identifying statements within said accessed text content indicating a dependence relation; extracting said statements indicating said dependence relation from said text content; and aggregating said extracted statements into a form suitable for representation as a bbn network structure. To identify statements indicating a dependence relation, the method includes identifying one or more lexical and semantic attributes of variables within a text unit indicating a conditional dependence relation between two or more variables.
09/04/14
20140250040
Correlating data from multiple business processes to a business process scenario
The present disclosure involves systems, software, and computer-implemented methods for providing process intelligence by correlating events from multiple business process systems to a single business scenario using configurable correlation strategies. An example method includes identifying a raw event associated with a sending business process and a receiving business process, identifying a sending business process attribute associated with the sending business process and a receiving business process attribute associated with the receiving business process, determining a correlation strategy for associating the raw event with a business scenario instance, the determination based at least in part on the sending business process attribute and the receiving business process attribute, and generating a visibility scenario event from the raw event according to the correlation strategy, the visibility scenario event associated with the business scenario instance..
09/04/14
20140250038
Structural plasticity in spiking neural networks with symmetric dual of an electronic neuron
A neural system comprises multiple neurons interconnected via synapse devices. Each neuron integrates input signals arriving on its dendrite, generates a spike in response to the integrated input signals exceeding a threshold, and sends the spike to the interconnected neurons via its axon.
09/04/14
20140250031
Method of and information processing machinery for recognizing, computing and capturing subsidizing payment contributions made by paying consumers when paying for services provided by organizations that also provide simimlar services to others in financial need in a subsidized manner
Method of capturing, by registered, paying consumers, consumer subsidizing payment contribution based tax benefits across a plurality of tax-qualified organizations and institutions participating within an internet-based tax benefit calculation and capture (tbrcc) network, and calculating and capturing tax benefits generated by consumers paying in excess of the cost of economic benefit(s) provided, with the excess of consumers' payments used to subsidize the receipt of identical or similar economic benefit(s) (e.g. Services and/or goods) provided to other consumers in financial need.
09/04/14
20140250026
Methods and systems for establishing identity confidence database
The invention provides various systems and methods for establishing an identity confidence scoring system. The method includes gathering identity information about the customers from physical locations and from remote locations.
09/04/14
20140250025
System and method for evaluating job candidates
Human resource system for collecting and analyzing survey data from reference providers identified by a job candidate for use by an employer. The system sends an electronic communication to the reference providers to request completion of survey questions and electronically receives the survey data from the reference providers, preferably through webpages.
09/04/14
20140250022
Following-up controlling method of industrial products using portable communication device
The present invention relates to a follow-up control method of a product online, and more particularly, to a method of registering a product to a management server after capturing the barcode of the product by using a portable device and performing a follow-up control of the product online by using the registered barcode. A follow-up control method of a product by using a portable device includes: identifying a product by capturing the barcode of the product with a portable device through a program built in the portable device or identifying a product by directly inputting product information into the portable device; registering the product by transmitting data regarding the identified product information to a management server; and performing a follow-up control on the product online by a user after the product registration is completed..
09/04/14
20140250021
System and methods for issuing a license plate and registration card for a vehicle
Systems and methods for issuing license plates and registrations for vehicles are provided. A method may provide for machine reading a license plate number and associating the license plate number with a set of data.
09/04/14
20140250018
Dual/multiple pin payment account
The present invention relates to a method of authorising a transaction process, whereby a communication between a payment device and a payment processing network is established. Subsequently a transaction is initialised at the payment device, the input of a first user identification metric (uim) is requested, the input of a second uim is requested, the first and second uims are verified and the transaction process proceeds if both uims are verified..
09/04/14
20140250013
Techniques for mobile transaction processing
Techniques for automated mobile transaction processing are provided. A consumer traverses to a web portal or other type of enterprise terminal device of an enterprise and proceeds to shop.
09/04/14
20140250011
Account type detection for fraud risk
A server computer can provide a merchant or other entity with a payment card (or other payment device) detection service that can determine a level of fraud based on the account type being presented (e.g., credit, debit, prepaid, etc.) at the time of purchase. For example, a payment account number (pan) can be used to perform a database lookup (e.g., a range lookup) to identify the payment account type, which can then be fed into a fraud detection system.
09/04/14
20140250010
Method and system of cookie driven cardholder authentication summary
A method for authenticating a financial transaction includes: storing a plurality of transaction data entries, each transaction data entry including data related to a financial transaction and including transaction data and a consumer identifier; receiving cookie data, the cookie data including a computing device identifier and historical browsing data; receiving an authorization request for a financial transaction, the authorization request including a consumer identification; identifying, in the transaction database, a subset of transaction data entries, wherein each transaction data entry in the subset includes a consumer identifier corresponding to the consumer identification; identifying an authentication score for the financial transaction based on a correlation of transaction data included in each transaction data entry of the subset and the historical browsing data; and transmitting the identified authentication score and consumer identification for use in approval of the financial transaction by an issuer.. .
09/04/14
20140250008
Service assisted reliable transaction signing
Techniques are disclosed for authenticating transactions conducted over computer networks, e.g., online banking transactions or other transactions performed by a financial institution at a customer's request. After receiving a transaction request (and associated transaction details), the transaction signing service signs the transaction data and sends the resulting blob to the user requesting the transaction.
09/04/14
20140250007
Method and system of cookie driven cardholder authentication summary
A method for authenticating a financial transaction includes: storing a plurality of transaction data entries, each transaction data entry including data related to a financial transaction and including transaction data and a consumer identifier; receiving cookie data, the cookie data including a computing device identifier and historical browsing data; receiving an authorization request for a financial transaction, the authorization request including a consumer identification; identifying, in the transaction database, a subset of transaction data entries, wherein each transaction data entry in the subset includes a consumer identifier corresponding to the consumer identification; identifying an authentication score for the financial transaction based on a correlation of transaction data included in each transaction data entry of the subset and the historical browsing data; and transmitting the identified authentication score and consumer identification for use in approval of the financial transaction by an issuer.. .
09/04/14
20140250006
Integrated mobile trusted service manager
Embodiments of the invention are directed to a centralized trusted service manager system in the form of a trusted service manager interconnectivity service hub, which facilitates and provides communications between entities involved in mobile contactless provisioning and payment systems. One embodiment of the present invention is directed to a method for processing a wallet request from a wallet provider associated with mobile communication device including a secure element through an interconnectivity hub.
09/04/14
20140250002
System and method for processing a gift card via the cloud
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for splitting a transaction among multiple participants. A system configured to practice the method first receives, at a first time, from a payor an identification of a payee and a policy, the payee having a payee account that was registered with a service provider prior to the first time.
09/04/14
20140250000
Electronic deferred check writing system
A method and system for electronic deferred check processing is disclosed. A processing center receives an account identifier and a plurality of deferred payment amounts.


Popular terms: [SEARCH]



Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



0.8804

5902

1 - 1 - 145