Popular terms

[SEARCH]

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Den patents



      
           
This page is updated frequently with new Den-related patent applications. Subscribe to the Den RSS feed to automatically get the update: related Den RSS feeds. RSS updates for this page: Den RSS RSS


Stretchable and foldable electronic devices

Northwestern University

Stretchable and foldable electronic devices

Diameter based communication session discovery and recovery

Oracle International

Diameter based communication session discovery and recovery

Diameter based communication session discovery and recovery

Vivotek

Wireless network device and automatic configuration method for linking wireless local area network


Date/App# patent app List of recent Den-related patents
08/20/15
20150237725 
 Anisotropic conductive film, connection method, and assembly patent thumbnailAnisotropic conductive film, connection method, and assembly
An anisotropic conductive film, which contains a crystalline resin, an amorphous resin, and conductive particles, wherein the anisotropic conductive film is an anisotropic conductive film configured to anisotropic conductively connect a terminal of a first electronic part and a terminal of a second electronic part, and wherein the crystalline resin contains a crystalline resin containing a bond characterizing a resin, which is identical to a bond characterizing a resin contained in the amorphous resin.. .
Dexerials Corporation


08/20/15
20150237711 
 Stretchable and foldable electronic devices patent thumbnailStretchable and foldable electronic devices
Disclosed herein are stretchable, foldable and optionally printable, processes for making devices and devices such as semiconductors, electronic circuits and components thereof that are capable of providing good performance when stretched, compressed, flexed or otherwise deformed. Strain isolation layers provide good strain isolation to functional device layers.
Northwestern University


08/20/15
20150237669 
 Diameter based communication session discovery and recovery patent thumbnailDiameter based communication session discovery and recovery
A diameter based network that includes nodes and accommodates diameter communication sessions between nodes establishes a first diameter communication session between a first node and a second node, and at some point determines that the first diameter communication session is lost. The first node generates a query using a second diameter communication session that is a different session than the first diameter communication session.
Oracle International Corporation


08/20/15
20150237666 
 Wireless network device and automatic configuration  linking wireless local area network patent thumbnailWireless network device and automatic configuration linking wireless local area network
A wireless network device and an automatic configuration method are provided. When no second wireless network device providing a wireless local area network (wlan) is found or when a service identifier of the second wireless network device lacks a preset prefix, a first wireless network device operates in an access point (ap) mode with service identifier comprising the preset prefix to receive a first setting signal carrying a terminal service identifier of a network terminal device, switches its operation mode from the ap mode to a client mode to edit its service identifier setting by the terminal service identifier, and connects to the network terminal device.
Vivotek Inc.


08/20/15
20150237662 
 Systems and methods of gesture-based detection of driver mobile device patent thumbnailSystems and methods of gesture-based detection of driver mobile device
A vehicle may be configured to prompt for a gesture-based identifying action, the action to be performed via moving a device, thereby identifying the device for association as the driver device; identify movement of the device in accordance with the gesture-based identifying action; and associate the device, moved in accordance with the gesture-based identifying action, as the driver device.. .
Ford Global Technologies, Llc


08/20/15
20150237660 
 Data transmission method, data acquiring method, and electronic device patent thumbnailData transmission method, data acquiring method, and electronic device
The present disclosure relates to the field of communication technology and discloses a data transmission method, a data acquiring method, and an electronic device, so as to address the existing technical problem that an operation for acquiring data through short-range transmission between two electronic devices is too cumbersome. The data transmission method is applied in a first electronic device and comprises: determining data to be transmitted; generating an access identifier for accessing the first electronic device based on the data to be transmitted and broadcasting the access identifier, the access identifier containing data identification information on the data to be transmitted; determining a second electronic device, a distance from the first electronic device to the second electronic device is not larger than a preset distance; and establishing data transmission between the first electronic device and the second electronic device based on the access identifier in such a manner that the second electronic device acquires from the first electronic device the data to be transmitted based on the data identification information..
Beijing Lenovo Software Ltd.


08/20/15
20150237658 
 Method of remotely waking up wireless router equipment patent thumbnailMethod of remotely waking up wireless router equipment
A method is provided for controlling equipment provided with a function for controlling a bidirectional radio link in reception and in transmission. The equipment is configured for connecting with at least one terminal of a home network via said radio link.
Orange


08/20/15
20150237652 
 Enhanced channel access mechanism for improving performance in dense wifi environments patent thumbnailEnhanced channel access mechanism for improving performance in dense wifi environments
Disclosed in some examples are methods, devices (e.g., stas and aps), and machine readable mediums which utilize a simultaneous channel access (sca) to allow transmissions of a first wireless network to take place while transmissions are already ongoing in a second wireless network (the principal channel access (pca)). The sca allows devices which support sca to transmit frames even when other nearby devices on other networks have already accessed the medium and are engaged in frame transmission..

08/20/15
20150237645 
 Techniques for multi-rat (radio access technology) coordinated  resource sharing patent thumbnailTechniques for multi-rat (radio access technology) coordinated resource sharing
A technique is provided for receiving a resource request by a first base station (bs) of a first radio access technology (rat) from one or more user devices, selecting resources, from a group of resources shared by bss of a plurality of different rats, to be scheduled for the one or more requesting user devices, scheduling, by the first bs, the selected resources for the one or more user devices, and sending, from the first bs, a resource scheduling announcement identifying the scheduled resources to one or more other bss including at least a second bs of a second rat. Another example technique may include receiving a resource scheduling request from a first base station (bs) implementing a first rat, confirming an availability of the requested resources, and sending a first resource scheduling announcement to one or more bss implementing other rats..
Nokia Solutions And Networks Oy


08/20/15
20150237643 
 Wireless communication apparatus and wireless communication method patent thumbnailWireless communication apparatus and wireless communication method
According to an embodiment, a wireless communication apparatus includes a plurality of wireless devices configured to perform wireless communication using an identical frequency band. Each of the wireless devices includes a transmitting circuit, a receiving circuit, and a coexistence arbitrating circuit.
Kabushiki Kaisha Toshiba


08/20/15
20150237634 

Method and network node for improving resource utilization of a radio cell


The present invention relates to a method of a network node for improving utilization of resources of a cell 102 provided by a radio base station (rbs), the cell covering a geographical area and being a cell served by a low power node (lpn) 101 of the rbs in a heterogeneous network 100. The method comprises determining a load of downlink (dl) resources of the cell used for wireless communication terminal(s) 104 connected to the cell.
Telefonaktiebolaget L M Ericsson (publ)


08/20/15
20150237625 

Method and facilitating the coexistence of wireless communications of different wireless communication technologies


A first wireless communication device including a first transceiver and a second transceiver. The first transceiver is configured to transmit first signals according to a first wireless communication technology.
Marvell World Trade Ltd.


08/20/15
20150237624 

Method and determining control channel search space


Embodiments of the present disclosure provide a method for determining a control channel search space. The method includes: determining numbers of epdcch sets used for enhanced physical downlink control channel epdcch transmission; determining, according to the numbers of the epdcch sets, location offsets of search spaces corresponding to the epdcch sets; and determining, according to the location offsets of the search spaces corresponding to the epdcch sets, the search spaces corresponding to the epdcch sets.
Huawei Technologies Co., Ltd.


08/20/15
20150237615 

Network infrastructure identification


This disclosure relates to network infrastructure identification by a wireless user equipment (ue) device. According to one embodiment, one or more requests for infrastructure identification information may be transmitted.
Apple Inc.


08/20/15
20150237613 

Method and transmitting control information in wlan system


A method and apparatus for signal transmission in a wireless local area network (wlan) system. The method according to one embodiment includes generating a first very high throughput (vht) signal, generating a second vht signal, and transmitting the first vht signal and the second vht signal.
Lg Electronics Inc.


08/20/15
20150237596 

Automatic detection of device type for filtering of data


Methods are provided for filtering, collecting, and analysing location data for a plurality of devices in a wireless network. Location data for one or more devices is received, for each device the location data includes a unique identifier.
Telefonaktiebolaget L M Ericsson (publ)


08/20/15
20150237593 

Power conservation on user devices having location identification hardware


A user device may detect, using a first radio associated with the user device, a presence of a location reference device; and determine a location associated with the user device. When determining the location associated with the user device, the user device is to receive location information from the location reference device, via the first, and refrain, based on detecting the presence of the location reference device, from determining the location using a second radio associated with the user device while the user device is within a communication range of the location reference device..
Verizon Patent And Licensing Inc.


08/20/15
20150237591 

Determination of ncs parameter and logical root sequence assignments


A method for configuring a zerocorrelationzoneconfig (ncs) parameter of a base station is provided. The method comprises determining a count of timing synchronization failures between a mobile device and the base station.
Qualcomm Incorporated


08/20/15
20150237577 

Ue paging method, base station, and ue


A ue paging method, a base station, and a ue are disclosed. The method includes receiving, by the base station, a paging message that is used for paging the ue and delivered by a core network side, where the paging message includes an edrx cycle that serves as a first parameter, and a second parameter used for identifying a quantity of super frames for which a normal state lasts in the edrx cycle; calculating, by the base station according to a ue identifier of the ue, the first parameter, and the second parameter, a super frame used for paging the ue; and if it is determined that a current super frame matches with the super frame used for paging the ue, that is, the current super frame is in a normal state, delivering, by the base station, the paging message to the ue in the current super frame..
Huawei Technologies Co., Ltd.


08/20/15
20150237565 

Early arrival path detection


Determining the early arrival path (eap) based on a channel energy response (cer) can involve the use one or more masks to identify one or more peaks in the cer. Masks can be applied to the cer in an iterative process that can help identify the earliest peak corresponding to the eap.
Qualcomm Incorporated


08/20/15
20150237564 

Method and system for a wireless multi-hop relay network


In a wireless multi-hop relay network arranged in a tree topology, the base station and one or more relay stations are associated as a virtual base station (vbs). The base station and each relay station have a unique virtual base station identifier (vbs-id) associated with the path defined by the base station and the one or more relay stations.
Apple Inc.


08/20/15
20150237562 

Control method by receiving device, receiving device, and communication system


A receiving device associates a first one-way function value determined by an operation using a one-way function with a first destination. Next, the receiving device determines a second one-way function value by the operation using the one-way function from identification information stored in the receiving device and element information received from a transmitting device.
Fujitsu Limited


08/20/15
20150237549 

Fast cell selection in a mobile wireless device


A method and apparatus for fast cell selection by a mobile wireless device. The mobile wireless device detects when a first wireless cell fails a set of stored suitability criteria and searches for and locates a set of candidate wireless cells to associate with.
Apple Inc.


08/20/15
20150237547 

Assistance information for evolved node b (enb) parameter tuning


Technology for providing core network assistance information from a mobility management entity (mme) in an evolved packet core (epc) is disclosed. An average radio resource control (rrc) connected state time for a ue is determined.
Intel Ip Corporation


08/20/15
20150237539 

Method and device for accessing and obtaining user equpiment context and user equipment identity


A method and device for accessing and obtaining user equipment (ue) context and ue identity are provided. The method for access includes: when a ue accesses a system architecture evolution (sae) network, judging, by a network node, whether a globally unique mobility management entity identifier (gummei) carried by the ue or a mobility management entity group identity (mmegi) in the gummei is allocated or mapped by the sae network; if the gummei or mmegi is allocated by the sae network, selecting, by the network node, a mobility management entity (mme) according to the gummeia network device includes an identity attribute obtaining module and a network resource node allocation module.
Huawei Technologies Co., Ltd.


08/20/15
20150237534 

Wireless communications method and apparatus


A communications apparatus, suitable for establishing a wireless communications connection with a further apparatus, comprises first and second communications means. The first communications means is suitable to establish a wireless communication connection with the further apparatus and the second communications means is operable to retrieve identification information from such further apparatus.
Kabushiki Kaisha Toshiba


08/20/15
20150237520 

Efficient use of reference symbol resources in a hierarchical heterogeneous cell deployment


Techniques for collecting channel-state-information (csi) feedback in a wireless network that comprises a plurality of geographically separated transmission points include methods in which a set of csi reference symbol (csi-rs) resources are identified, which correspond to the union of csi-rs resources used by multiple transmission points in the primary transmission point's coverage area. A mobile station is configured to measure csi-rs on a subset of the csi-rs resources, the subset corresponding to csi-rs resources used by a subset of the transmission points.
Telefonaktiebolaget L M Ericsson (publ)


08/20/15
20150237512 

Network data optmization


A device is configured to obtain base station information for base stations indicating whether data communicated via a respective base station should receive optimization processing. The device may obtain a base station identifier from a base station.
Verizon Patent And Licensing Inc.


08/20/15
20150237511 

Predictive indicator of network slowdown


A system and method for automatically providing an indication of network delay is disclosed. Software integrated into a user device is configured to identify one or more network delay indications with respect to an http communication made over a network communication path, and automatically performing a network diagnostic test in response to the one or more network delay indications.
Google Inc.


08/20/15
20150237507 

Network setting-up a network system


A network system and a method of setting-up the network system are disclosed. The network system can be used to safely transmit sensitive information such as service set identifiers and keys.
Aevoe International Ltd.


08/20/15
20150237501 

Encryption in a wireless telecommunications


An example of the present invention is a method of transmitting encrypted user data to a mobile terminal in a wireless telecommunications network. The method comprises sending to the mobile terminal a data packet.
Alcatel Lucent


08/20/15
20150237488 

On-demand, real-time interpretation system and method


A system and method for on-demand, real-time interpretation services. The system includes a mobile hands-free communicator that cooperates with a two-way radio frequency communication device.
Real Time Translation, Inc.


08/20/15
20150237487 

Network architecture


A telecommunications system is provided comprising a mobile device and an ip multi-media sub-system (ims), the mobile device being connected to a public land mobile network (plmn). The mobile device is adapted to: identify if the plmn supports customised applications for mobile network enhanced logic (camel) and, upon receiving an attempt to initiate a call to a dialled number, if the plmn supports camel, allow the call to proceed.
Vodafone Ip Licensing Limited


08/20/15
20150237486 

Signature control for sms


A social messaging hub provides communication services for a data enabled device having internet network access capabilities. A user is given a registered phone number and unique ip addressable identification which serve as a source and destination identifier of the associated data enabled device.

08/20/15
20150237481 

Navigation


Disclosed are methods, assemblies and devices useful for identifying the location and/or motion of a mobile device in a specified area, for assisting in mapping a specified area and also to methods, assemblies and devices for determining a location of anchors found at fixed locations in a specified area.. .
Ariel-university Research And Development Company Ltd.


08/20/15
20150237477 

System for maintaining the integrity of a tour group


A group of tourists traveling, for example, in a foreign land needs to be sure that no-one becomes lost. Embodiments of the present invention take advantage of mobile wireless terminals colloquially known as “smartphones” to quickly identify any members of a tour group that stray from the group, and to help them rejoin the group.
Worldstrides


08/20/15
20150237476 

Systems and methods for associating communication information with a geographic location-aware contact entry


Disclosed herein are systems and methods for associating communication information with a geographic location-aware contact entry. According to embodiments of the present disclosure, a method may include identifying a geographic location.
Modena Enterprises, Llc


08/20/15
20150237472 

Content geofencing


Systems, methods, and computer-readable storage media for invitational content geofencing. A system first sends, to a server location data associated with the system, the location data being calculated at the system.
Apple Inc.


08/20/15
20150237466 

Radio access system, controlling apparatus, and terminal apparatus


A radio access system includes a controlling apparatus that when the terminal apparatuses to which delivery data is to be delivered are concentrated in a particular area, groups the terminal apparatuses as a terminal apparatus group, selects a representative server terminal apparatus from the terminal apparatuses, creates data map information indicating a delivery rule for delivering the delivery data from the representative server terminal apparatus to another terminal apparatus, adds information for identification of the representative server terminal apparatus to the data map information, transmits the group information and the data map information to the terminal apparatuses, and instructs a delivery data server to deliver the delivery data to the representative server terminal apparatus; and a terminal apparatus that obtains the delivery data by communicating, in accordance with the received data map information, with the another terminal apparatus within the terminal apparatus group included in the received group information.. .
Fujitsu Limited


08/20/15
20150237459 

Group based pdcch capability for lte


A group-based pdcch capability in lte. Information common to a group of ues, such as those common to a virtual carrier, may be signalled in a group search space within the pdcch.
Sony Corporation


08/20/15
20150237457 

Sim based data operation method and electronic device supporting the method


An electronic device is provided. The electronic device includes a subscriber identity module (sim) card configured to store sim information, a control module configured to combine the sim information with stored address information on a server device to create combined address information, to control a connection with the server device based on the combined address information, and to control a reception of a list of applications comprising information related to application installation or update corresponding to a type of the sim information, and a communication module configured to establish communication with the server device..
Samsung Electronics Co., Ltd.


08/20/15
20150237445 

Audio signal correction and calibration for a room environment


Disclosed are an apparatus and method of processing an audio signal to optimize audio for a room environment. One example method of operation may include recording the audio signal generated within a particular room environment and processing the audio signal to create an original frequency response based on the audio signal.
Amx Llc


08/20/15
20150237442 

Digital microphone and position-to-frequency converter


A digital microphone includes: a cavity resonator operatable in a micrometer, millimeter, or electromagnetic waveband, the cavity resonator having a metal wall including a conductive membrane 32 that vibrates in response to incident acoustic waves and converts the shift of the membrane 32 into a resonance frequency of the cavity resonator; an fm-signal generator that modulates the resonance frequency of the cavity resonator in response to the shift of the membrane 32 and outputs fm signals from the metal wall other than the membrane; and a ΔΣ-modulated-signal generator that generates ΔΣ-modulated signals from the fm signals. The fm-signal generator includes a slot 36, a micro-strip line 38, and a negative resistive element 40.
National University Corporation University Of Toyama


08/20/15
20150237414 

Using a digital video effect to generate a video stream


In one aspect, a method involves (i) accessing data representing a traffic schedule for a television broadcast; (ii) selecting a record from the traffic schedule, wherein the record identifies video content; (iii) determining a type of the identified video content; (iv) using the determined type of the identified video content as a basis to select a dve; and (v) causing a computing device to run the selected dve, wherein running the selected dve causes the computing device to generate a modified version of an input video stream representing the identified video content.. .
Tribune Broadcasting Company, Llc


08/20/15
20150237410 

System and providing content-aware persistent advertisements


A method and system of providing content-aware persistent advertisements comprises the steps of ingesting and collecting vdna (video dna) fingerprints of media contents playing on various network-enabled terminals including internet browsers, mobile devices, tablets, smart televisions and so on; sending the ingested fingerprints along with other information such as metadata, user's location, etc, to the content identification server via internet or mobile networks, and selecting accurate advertisements according to the media content and relevant information, then finally pushing the advertisements back to user's terminal. With vdna fingerprint identification, media contents are identified by content instead of metadata or other surrounding information, so that the result of identification can be considered genuine, and the chosen advertisements based on the media content can be persistent across multiple terminals playing the same media content..

08/20/15
20150237408 

Wireless transmission terminal, wireless receiving terminal, wireless communication system, wireless communication method, and computer readable storage device


A wireless transmission terminal wirelessly transmits data in a multicast manner to wireless receiving terminals that set whether to wirelessly transmit responses for wirelessly received data, wirelessly transmit priority information representing a priority of a reception side terminal, and serve as any one of response-enabled terminals for which wireless transmission of the responses is enabled and response-disabled terminals for which wireless transmission of the responses is disabled. The wireless transmission terminal includes: a wireless communication unit; a storage unit; and a control unit configured to store the priority information in the storage unit in correlation with identification information for identifying the wireless receiving terminal having wirelessly transmitted a connection request for receiving data wirelessly transmitted in a multicast manner when the connection request and the priority information have been wirelessly received in the wireless communication unit..
Olympus Corporation


08/20/15
20150237394 

Device activation for a service using an outputted representation


In one embodiment, a method activates a first device for using a service. A second device receives, from a third device, a user identifier for a user and a unique identifier for the first device.
Hulu, Llc


08/20/15
20150237393 

Using a digital video effect to generate a video stream


In one aspect, a method involves (i) accessing data representing a traffic schedule for a television broadcast; (ii) selecting a record from the traffic schedule, wherein the record identifies a video source; (iii) determining a type of the identified video source; (iv) using the determined type of the identified video source as a basis to select a dve; and (v) causing a computing device to run the selected dve, wherein running the selected dve causes the computing device to generate a modified version of an input video stream received from the identified video source.. .
Tribune Broadcasting Company, Llc


08/20/15
20150237389 

Methods and systems for generating and providing program guides and content


Systems and methods for identifying, assembling, and publishing content are described. A content item, such as a video, having a first time length, is identified by a system to be included in a program scheduled for a first time period.
Pluto Inc.


08/20/15
20150237383 

Methods and revenue-optimized delivery of content in a network


Methods and apparatus for optimizing the distribution and delivery of multimedia or other content within a content-based network. In one embodiment, the network comprises a broadcast switched cable television network, which utilizes a network optimization controller (noc) that processes subscriber program viewing requests to identify options available to fulfill the request (including, e.g., the creation of one or more “microcasts” specifically targeting one or more users), and evaluate these options to determine one that optimizes network operation.
Time Warner Cable Enterprises Llc


08/20/15
20150237381 

Multi-threaded implementations of deblock filtering


Multi-threaded implementations of deblock filtering improve encoding and/or decoding efficiency. For example, a video encoder or decoder partitions a video picture into multiple segments.
Microsoft Technology Licensing, Llc


08/20/15
20150237341 

Method and managing audio visual, audio or visual content


To manage audio visual content, a stream of fingerprints is derived in a fingerprint generator and received at a fingerprint processor that is physically separate from the fingerprint generator. Metadata is generated by processing the fingerprints to detect the sustained occurrence of low values of an audio fingerprint to generate metadata indicating silence; comparing the pattern of differences between temporally succeeding values of a fingerprint with expected patterns of film cadence to generate metadata indicating a film cadence; and comparing differences between temporally succeeding values of a fingerprint with a threshold to generate metadata indicating a still image or freeze frame..
Snell Limited


08/20/15
20150237340 

Stereo-projection device, stereo-projection projecting stereoscopic images


A stereo-projection device comprises at least one light source, at least one collimator for converting visible light generated by the light source into light with a substantially parallel beam path, and at least one interference filter which is transparent at a given angle of incidence for at least one wavelength interval having an interval width of at most 50 nm and which is designed to cross the light with the substantially parallel beam path.. .
Infitec Gmbh


08/20/15
20150237329 

Systems and methods for estimating depth using ad hoc stereo array cameras


Systems and methods for stereo imaging with camera arrays in accordance with embodiments of the invention are disclosed. In one embodiment, a method of generating depth information for an object using two or more array cameras that each include a plurality of imagers includes obtaining a first set of image data captured from a first set of viewpoints, identifying an object in the first set of image data, determining a first depth measurement, determining whether the first depth measurement is above a threshold, and when the depth is above the threshold: obtaining a second set of image data of the same scene from a second set of viewpoints located known distances from one viewpoint in the first set of viewpoints, identifying the object in the second set of image data, and determining a second depth measurement using the first set of image data and the second set of image data..
Pelican Imaging Corporation


08/20/15
20150237319 

Projection system and projection method thereof


A projection system and a projection method thereof are provided. A plurality of image source signals is combined into a combination image signal.
Coretronic Corporation


08/20/15
20150237306 

Method and device for obtaining configuration parameter


Disclosed are a method and device for obtaining configuration parameter. The method comprises: the terminal management platform obtains identifier information of the videoconferencing terminal to be configured; the terminal management platform determines the conference room in which the videoconferencing terminal is located according to the identifier information; and the terminal management platform issues to the videoconferencing terminal at least one configuration parameter preconfigured which corresponds to the conference room.
Zte Corporation


08/20/15
20150237292 

Projection system and projection method thereof


A projection system and a projection method thereof are provided. An illumination beam is outputted through a light-uniforming element which an aspect ratio of a light emitting terminal conforms to an ultrawide projection ratio.
Coretronic Corporation


08/20/15
20150237289 

Imaging device and camera system with photosensitive conversion element


An imaging device including a pixel array section functioning as a light receiving section which includes photoelectric conversion devices and in which a plurality of pixels, which output electric signals when photons are incident, are disposed in an array; a sensing circuit section in which a plurality of sensing circuits, which receive the electric signals from the pixels and perform binary determination regarding whether or not there is an incidence of photons on the pixels in a predetermined period, are arrayed; and a determination result integration circuit section having a function of integrating a plurality of determination results of the sensing circuits for the respective pixels or for each pixel group, wherein the determination result integration circuit section derives the amount of photon incidence on the light receiving section by performing photon counting for integrating the plurality of determination results in the plurality of pixels.. .
Sony Corporation


08/20/15
20150237285 

Comparator, solid-state imaging device, electronic apparatus, and driving method


A solid-state imaging device that outputs a pixel signal having a signal level corresponding to charges generated by a photoelectric conversion includes a comparator. The comparator has a first amplifying unit with first and second transistors configured as a differential pair and provides a signal output by amplifying a difference of signals input to the gate electrodes of the first and second transistors.
Sony Corporation


08/20/15
20150237273 

Image capture device, anomalous oblique incident light detection method, and recording medium


In an aspect of the invention, plural pixels constituting a color image pickup device include a first pair of rb pixels and a second pair of rb pixels both constituted by a red pixel r having a red color filter and a blue pixel b having a blue color filter in a horizontal direction a and vertical direction b, the red pixel and the blue pixel being adjacent to each other. A position of the red pixel r and a position of the blue pixel b are opposite to each other between the first pair of rb pixels and the second pair of rb pixels.
Fujifilm Corporation


08/20/15
20150237250 

Image reception device, image capture device, image capture system, image reception method, and non-transitory medium saving program


An image reception device includes a storage module that associates and stores first identification information which is used for identifying an image capture device or a lens module and second identification information which is used for visually identifying establishment of communication connection between the image capture device and the image reception device; an information acquisition unit that acquires the first identification information from the image capture device; a second communication module that transmits, to the image capture device, first control information which instructs the first display interface to display first information after the communication connection with the image capture device is established and receives image data from the image capture device; and an information output unit that outputs second control information which instructs a second display interface to display second information to the second display interface after the communication connection with the image capture device is established.. .
Olympus Corporation


08/20/15
20150237233 

Printed matter identifying device and printed matter identifying system


A printed matter identifying device that identifies a printed matter printed by a predetermined printing apparatus and having on its surface at least two or more areas that are different in surface property to each other includes: an image reading unit that controls an external light source and camera so that reflected images displayed by the light source respectively on the areas of the surface of the printed matter are captured by the camera to acquire respective image information of the reflected images; an image processing unit that performs image-processing of the image information of the reflected images acquired by the image reading unit; and an image determination unit that uses a differential value between the image information of the reflected images obtained by the image-processing by the image processing unit, to determine whether or not the printed matter is a printed matter printed by the predetermined printing apparatus.. .
Mitsubishi Electric Corporation


08/20/15
20150237229 

Equipment unit, information processing system, information processing method, and program


An equipment unit is disclosed, including a first obtaining unit which obtains first identification information for a parameter set for calculating a use amount of the equipment unit; a comparison unit which compares the first identification information and second identification information for a parameter set for calculating a use amount of the equipment unit; a second obtaining unit which obtains information on a difference between the parameter set related to the first identification information and the parameter set stored in the equipment unit when the first identification information and the second identification information differ; and a control unit which calculates an amount of use of the equipment unit based on the parameter set stored in the equipment unit, and the information on the difference and controls the use of the equipment unit by the user.. .
Ricoh Company, Ltd.


08/20/15
20150237220 

Tracking source of job parameters in print jobs


Methods and devices receive a print job, evaluate the print job to identify job parameter settings and associated sources of the job parameter settings, transmit the job parameter settings and the associated sources to a database, and transmit the print job to a marking device to cause the marking device to print the print job. These methods and devices also provide access to the database to view the job parameter settings and the associated sources, and/or change the job parameter settings.
Xerox Corporation


08/20/15
20150237219 

Methods and systems for automatically converting a mobile rendering job to a secure rendering job


Methods, systems and processor-readable media for converting a mobile rendering job to a secure rendering job. A secure rendering module can be configured in association with a print path with respect to a mobile telecommunications device.
Xerox Corporation


08/20/15
20150237216 

Systems, methods, and computer program products for providing service credit to customer accounts in a wireless communications service network


Systems, methods, and computer program products use combinations of international mobile equipment identity (imei), international mobile subscriber identity (imsi), and account information to determine if a customer is eligible for service credit in near real-time. The customer needs an active account prior to inserting a subscriber identity module (sim) into a device and powering on the device for the system to determine credit eligibility.
At&t Mobility Ii Llc


08/20/15
20150237213 

Systems and methods for routing callers to an agent in a contact center


Techniques for handling contacts and agents in a contact center system are disclosed. In one particular embodiment, the techniques may be realized as a method for handling contacts and agents in a contact center system including identifying a plurality of contacts ordered for assignment to a plurality of agents, and assigning a first out-of-order contact from the plurality of contacts to a first agent of the plurality of agents who becomes available for assignment to any contact of the plurality of contacts based on information about the first agent..
Satmap International Holdings Ltd.


08/20/15
20150237211 

Systems and methods for routing callers to an agent in a contact center


Techniques for handling contacts and agents in a contact center system are disclosed. In one particular embodiment, the techniques may be realized as a method for handling contacts and agents in a contact center system including identifying a plurality of agents ordered for assignment to a contact queue, and assigning a first out-of-order agent from the plurality of agents to a first contact that arrives at the contact queue based on information about the first contact..
Satmap International Holdings Ltd.


08/20/15
20150237208 

Systems and methods for routing callers to an agent in a contact center


Techniques for handling contacts and agents in a contact center system are disclosed. In one particular embodiment, the techniques may be realized as a method for handling contacts and agents in a contact center system including identifying a first contact available for assignment to a first agent, comparing information about the first contact with information about the first agent, and postponing assignment of the first contact and the first agent based on the comparing..
Satmap International Holdings Ltd.


08/20/15
20150237206 

Method and analyzing leakage from chat to voice


The customer experience is enhanced by detecting leakage-to-voice from chats and providing recommendations to operations, chat agents, and customers. A chat is classified into leakage-to-voice or leakage-to-text chat and actionable recommendations are then provided to operations, chat agents, and customers based on the leakage information.
24/7 Customer, Inc.


08/20/15
20150237204 

Customer service call routing


Customer service calls to media service providers are addressed by remotely monitoring and diagnosing the customer's installed equipment. Such remote diagnosis decreases the need for assistance from customer service representatives and on-site repair technicians.
Echostar Technologies L.l.c.


08/20/15
20150237203 

System and automatic call scheduling


A computer system for connecting a user to a scheduled call, including a processor in communication with non-volatile memory and code for receiving a user phone number where the user may be contacted and information allowing access to the user's calendar or email, code for accessing the user's calendar or email and identifying the scheduled call in the user's calendar or email, the scheduled call having information including at least a scheduled call number and a scheduled call time, code for placing a call to the scheduled call number before the scheduled call time, code for placing a call to the user at the user phone number before the scheduled call time, code for confirming the user has answered the call to the user, and code for connecting the call to the user to the call to the scheduled call number.. .

08/20/15
20150237202 

Techniques for telecommunications contact management on an end user device


Various embodiments are directed to techniques managing telephone numbers and other telecommunication identifiers when placing and receiving calls or messages from a single device. In some embodiments, one of a plurality of outbound telephone numbers or other identifiers associated with the device or an application executing on the device may be selected when making an outbound telephone call or sending a message.
Bandwidth.com, Inc.


08/20/15
20150237201 

Telephone caller authentication


Techniques for authenticating the identity of a caller in a telephone call are disclosed. The device generating the call implements encrypting caller identification information and initiating the telephone call, said initiating comprising providing a voice carrier signal including tire caller identification information; and simultaneously providing a data carrier signal including tire encrypted caller identification information.
International Business Machines Corporation


08/20/15
20150237192 

Smart phone having emergency call button


The present invention relates to a smart phone having an emergency call button, including an emergency button (110) which is engraved on a rear surface of the smart phone so as not to protrude from the rear surface and has a touch detection unit (111) provided on the rear surface of the smart phone to detect a touch signal according to manipulation of a user, and a decompression detection unit (112) provided on a lower portion of the touch detection unit (111) to detect a decompression signal according to the manipulation of the user; and an emergency call transmission unit (120) which, when the touch signal and the decompression signal are received from the emergency button (110), transmits preset emergency rescue request information to a guardian terminal (10) and an agency server (20) and records a voice coming from the scene of an accident in real time and transmits the live recording information to a mobile communication company server (30). According to the present invention as described above, when an emergency situation occurs, a smart phone user touches and decompresses a single emergency button provided on the rear surface of a smart phone instead of decompressing a plurality of buttons so as to transmit emergency information to a preset guardian terminal and agency server, thereby promoting the touching and decompressing of the emergency button while preventing the user from panicking in the emergency situation, the emergency button is engraved on the rear surface of the smart phone so as to insert the emergency button into the inside of a case, thereby minimizing friction or interference according to normal use of the smart phone, and the emergency information is transmitted to the preset guardian terminal and agency server as soon as the user decompresses a button-type camera provided on the rear surface of the smart phone, thereby transmitting the emergency situation without the need for an additional button..

08/20/15
20150237187 

Electronic apparatus and selectively applying security in mobile device


A mobile device includes a display unit to display a screen to set the mobile device in a security mode and a condition as a safe zone in the security mode, a user interface to receive a user input to activate the mobile device, and a control unit to selectively apply the security mode in response to the user input when a current condition is identical to the set condition.. .

08/20/15
20150237184 

Method, device, and terminal for storing communication log in subscriber identity module/user identity model


A method, device and terminal for storing a communication log in a subscriber identity module/user identity model. The method includes: after communicating with a phonebook contact person in a subscriber identity module/user identity model, formatting time and duration information of the current communication based on a preset communication log format, and obtaining and storing a byte stream of a current communication log; writing the formatted byte stream of the current communication log into an ef_ext1 file of the subscriber identity module/user identity model, and categorizing the current communication log according to a preset communication type identifier..
Zte Corporation


08/20/15
20150237179 

Backward looking robust header compression receiver


Robust header compression (rohc) offers a way to compress packet header information for more efficient transmission of data. The compression is achieved through various confidence modes set up by the transmitter and the receiver.
Thomson Licensing


08/20/15
20150237165 

Bulk uploading of multiple self-referencing objects


A computer implemented method, computer program product, and system for performing create, read, update, or delete operations on a plurality of resources in a client-server environment. In an embodiment, the computer implemented method includes the steps of identifying individual resources requiring operations to be performed, assigning local references for any resources to which a uri (uniform resource identifier) has not been provided by the server, generating metadata describing the local references and operations to be performed, wrapping each individual resource with the metadata to provide a plurality of wrapped resources arranging the wrapped resources into a single payload, and transmitting the single payload to the server..
International Business Machines Corporation


08/20/15
20150237161 

System and method to provide pre-populated personal profile on a social network


Methods, systems, and media are directed to the creation of a user-controlled, pre-populated personal information profile to be used in conjunction with social networks. The creation of the personal profile information includes electronically transmitting first instructions requesting entry of unique personal identification information of the potential new user, determining the validity of the received unique personal identifier information, and electronically transmitting second instructions requesting entry of profile information of the new user.
Shocase, Inc.


08/20/15
20150237158 

Method and system for accessing website


The present invention relates to the technical field of network and discloses a method and a device for accessing a website. The method comprises: constructing a first domain name query request according to a domain name in a webpage request of a client, and sending the request to a first domain name server; obtaining an identification ip address returned by the first domain name server, wherein the identification ip address is used to identify whether an target ip address corresponding to the domain name in the webpage request belongs to a predetermined ip address library or not; according to the identification ip address, judging to replace the target ip address corresponding to the domain name in the webpage request with an ip address of a proxy server, and according to the ip address corresponding to the proxy server, sending the webpage access request to the proxy server.
Beijing Qihoo Technology Company Limited


08/20/15
20150237152 

Method and device for pushing information


A method and device for sending information are disclosed in the present disclosure. The method comprises the steps of: receiving the current updated message of an information source; deriving the message which satisfies a preset condition from the current updated message; when the message satisfying the preset condition is non-subject message, deriving the user information and subject message correlated to the non-subject message from a server; and sending the information context, identification or link address corresponding to the non-subject message, the correlated user information and subject message to a third party.
Tencent Technology (shenzhen) Company Limited


08/20/15
20150237150 

System and managing events associated with the detection of wireless devices


The disclosed embodiments provide a system and method for managing events associated with the detection of wireless devices. The disclosed embodiments utilize a residential wireless access point for detecting the signal transmitted by a wireless device.
Centurylink Intellectual Property Llc


08/20/15
20150237148 

Method for registering at least one public address in an ims network, and corresponding application


The invention relates, in particular, to a method for registering at least one public address in an ims network including a terminal that interacts with a security element. According to the invention, the security element includes an application that invites the user of the terminal, upon the occurrence of an event, to enter a public address, selected by the user, via the man/machine interface of the terminal, the application transmitting the public address, accompanied by at least one identifier of the security element, to a remote network via the terminal such that the remote network associates the public address with the identifier..
Gemalto Sa


08/20/15
20150237147 

Systems and methods for automatically saving a state of a communication session


A system comprising a computer-readable storage medium storing at least one program and a computer-implemented method for automatically saving and presenting a state of a communication session are presented. The communication session may be established between a client device of a user and an application server of a content publisher.

08/20/15
20150237143 

Image session identifier techniques


Image session identifier techniques are described. In one or more implementations, a request is received to create an image sharing session and a session identifier is generated for the image sharing session that is configured to act as a credential to join the image sharing session as a member.
Adobe Systems Incorporated


08/20/15
20150237136 

Information display system, information display method, server, control server, and program


An information display system of the present invention includes: an information processing device capable of reading an identifier of a tag; and a server capable of performing communication with the information processing device through a network. The server: stores an identifier of a first tag and an identifier of a second tag corresponding to the first tag in a manner of being related to each other; stores information in a manner of being related to each of the identifier of the first tag and the identifier of the second tag; when the identifier of the first tag or the identifier of the second tag and an acquisition request for the information corresponding thereto are received from the information processing device, transmits to the information processing device the information stored in a manner of being related to the received identifier and, when the identifier of one tag selected from the identifier of the first tag and the identifier of the second tag as well as a setting request for the information corresponding to the other tag are received from the information processing device, stores the information requested in the setting request, in a manner of being related to the identifier of the other tag.
Biglobe Inc.


08/20/15
20150237135 

System and maintaining cache coherency


Described herein is a system and method for maintaining cache coherency. The system and method may maintain coherency for a cache memory that is coupled to a plurality of primary storage devices.
Netapp, Inc.


08/20/15
20150237124 

Network-based collaboration for secure data interchange for image data records having confidential components


A network-based system (and method) is disclosed for the collaboration of transmission nodes and receiver nodes for secure data interchange for radiological image data records including confidential components. The processing node provides a set of virtual clients, wherein a virtual client is associated with a respective receiver node and is intended to provide the intended pseudonymized image data record.
Siemens Aktiengesellschaft


08/20/15
20150237119 

Naming of distributed business transactions


The present technology monitors a web application provided by one or more services. A service may be provided by applications.
Appdynamics Inc.


08/20/15
20150237115 

Methods and systems for predicting conversion rates of content publisher and content provider pairs


Systems and methods for predicting a conversion rate of a content publisher-third-party content provider pair are disclosed. A processor identifies, from log data, a plurality of publisher-provider pairs.
Google Inc.


08/20/15
20150237113 

Method and system for file transmission


A file transmission method and system relate to the technical field of communications networks, which can perform file resource sharing, so as to accelerate file transmission and publication, reduce time consumption, and save storage space. A browser upload plug-in at a client scans a to-be-uploaded file, acquires a unique identifier of the to-be-uploaded file, and sends the unique identifier to an instant-publishing management server.
Tencent Technology (shenzhen) Company Limited


08/20/15
20150237112 

Generic download and upload functionality in a client/server web application architecture


The present invention relates generally to client-server architectures for allowing generic upload and download functionality between a web application at a server and a client. One exemplary method includes sending a download/upload request to a web application at the server, where the download/upload request specifies at least one file to download/upload; receiving a transmission from the server; parsing the transmission to identify a download/upload command and an associated download/upload manifest, where the download/upload manifest includes executable code that, when executed on the client, will perform the download/upload of the at least one file..
Aol Inc.


08/20/15
20150237104 

Communication system, communication apparatus, and communication method


A communication system including: a communication apparatus including: a transmitter, and a processor coupled to the transmitter and configured to: set an operation mode in the communication apparatus for forwarding data, to be one of a first operation mode and a second operation mode, the first operation mode in which the data is forwarded without a protocol conversion, the second operation mode in which the data is forwarded with the protocol conversion, detect identification information of the data included in the data that is received from an upstream communication apparatus and forwarded to a downstream communication apparatus, and when the operation mode in the communication apparatus is the first operation mode and the identification information detected by the first processor is a first given value, switch the operation mode in the communication apparatus from the first operation mode to the second operation mode.. .
Fujitsu Limited


08/20/15
20150237100 

Systrem and advertisement augmentation via a called voice connection


Disclosed herein are methods, systems, and non-transitory computer-readable storage media for streaming audio via a telephone call. The method includes receiving a telephone call from a user via a client device, presenting available audio streams to the user and receive an audio stream selection from the user, contacting a website associated with the selection and communicating the selected audio stream with the user, and while streaming the audio stream, replacing advertisements with new advertisements selected from an advertisement database.
Alpine Audio Now, Llc


08/20/15
20150237088 

Tagging users of a social networking system in content outside of social networking system domain


Users of a social networking system can tag other users in content items that are provided outside of the social networking system, such as pictures that are viewable on a website that is external to the social networking system. To enable a user to tag another user in a content item, an external system provides a user interface that enables the user to tag another user, optionally define a portion of the content item in which the tagged user appears, and provide an identity of the tagged user.
Facebook, Inc.


08/20/15
20150237084 

Dynamically enabling an interactive element within a non-interactive view of a screen sharing session


A non-interactive screen sharing session executing within a computing device can be identified. The device can be communicatively linked to different computing devices of the screen sharing session.
International Business Machines Corporation


08/20/15
20150237082 

Dynamically enabling an interactive element within a non-interactive view of a screen sharing session


A non-interactive screen sharing session executing within a computing device can be identified. The device can be communicatively linked to different computing devices of the screen sharing session.
International Business Machines Corporation


08/20/15
20150237078 

Method and playlist synchronization


The present application is applicable to the field of network technologies, and provides method and apparatus for playlist synchronization, where the method includes: detecting a user operation on a playlist of multimedia documents at a first terminal; generating an operation code according to the user operation on the playlist, the operation code including an identifier of the playlist; extracting identification information, the identification information including a user identifier and a globally unique identifier (guid) of the first terminal; and sending the operation code and the identification information to the server, wherein the server is configured to identify a second terminal according to the operation code and the identification information and send the operation code to the second terminal such that the second terminal can perform a synchronization operation to a playlist of multimedia documents at the second terminal according to the operation code.. .
Tencent Technology (shenzhen) Company Limited


08/20/15
20150237074 

Role-based attribute based access control (rabac)


Systems and methods are disclosed for receiving an access request from a user device, the access request including an identity claim for a user; evaluating a risk of access based on matching an attribute of the user device with attributes stored in a user information database; authenticating the access request based on the identity claim and the risk evaluation to determine an authentication confidence level; generating a token based on the confidence level and the attribute matched; producing an authorization response based on inputs from the token, a risk based access control, a role based access control, and an attribute based access control, in which the authorization response determines whether to allow access to a system, deny access to the system, or request additional input from the user device.. .
Ebay Inc.


08/20/15
20150237070 

Systems and methods for applying data loss prevention policies to closed-storage portable devices


A computer-implemented method for applying data loss prevention policies to closed-storage portable devices may include (1) injecting a data loss prevention component into at least one application process that is running on a computing device, (2) intercepting, via the data loss prevention component, an attempt by the application process to transfer a file to a closed-storage portable device that is connected to the computing device, (3) identifying a data loss prevention policy that applies to the attempt by the application process to transfer the file, (4) determining that the attempt by the application process to transfer the file violates the data loss prevention policy, and (5) performing a security action in response to determining that the attempt by the application process to transfer the file violates the data loss prevention policy. Various other methods, systems, and computer-readable media are also disclosed..
Symantec Corporation


08/20/15
20150237065 

Ordered computer vulnerability remediation reporting


Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform.
Risk I/o, Inc.


08/20/15
20150237064 

Method and predicting the impact of security incidents in computer systems


Systems or methods gather information within a network of computers regarding the distribution of documents to calculate the impact of a cyber security incident for a given computer. Specific embodiments analyze word usage within data files and to determine that data files are different versions of a document and use presence of documents on a given computer to determine the impact of a security breach at that computer..

08/20/15
20150237062 

Risk meter for vulnerable computing devices


Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform.
Risk I/o, Inc.


08/20/15
20150237056 

Media dissemination system


Methods and systems for providing content for a brand to an authorized party via a distributed computer system are disclosed. A plurality of content is curated for a brand wherein the plurality of content has been aggregated from data resulting from a search of a network that, at least in part, seeks out databases with an online profile for the brand.
Openaura, Inc.


08/20/15
20150237054 

System and methods for authorizing operations on a service using trusted devices


Disclosed are systems and methods for ensuring confidentiality of information of a user of a service. One example method includes receiving a request to perform an operation for a service; selecting, based on a database of trusted devices, a trusted device for authorizing the operation of the service; establishing a secure connection with the trusted device; sending to the trusted device via the secure connection a request to enter confidential information on the trusted device to authorize the operation of the service; receiving the confidential information from the trusted device; and determining whether to authorize the operation of the service based on the confidential information..
Kaspersky Lab Zao


08/20/15
20150237052 

User identification based access control


A user's access to software applications installed on a device is limited by evaluating the context in which the user requests access to the application and determining, based on the context analysis, whether or not the user is to be given access to the application. When it is determined that the user requesting access is not a primary authorized user, the primary authorized user may be notified of the attempt to access the application..
Nagravision S.a.


08/20/15
20150237048 

Identity verification


A method and a device, of identity verification are disclosed. The method includes: receiving by a server, an identity verification request seat, from a terminal, where the identity verification request contains a specified user identifier; based on a user relationship chain of the specified user identifier, obtaining a verified user information set which includes user's information on the user relationship chain; providing the verified user information set to the terminal, in order to subsequently receive returned selected user's information; determining whether the received selected users information from the terminal matches the user's information on the user relationship chain; if the selected user's information received matches the user's information on the user relationship chain, confirming that the identity verification being successful.
Tencent Technology (shenzhen) Co., Ltd.


08/20/15
20150237041 

Attribute-based access control


Attribute-based access control is performed across a first and a second security domain in a federated distributed processing environment. A security token received in the second security domain from a first service provider in the first security domain includes access control attributes.
International Business Machines Corporation


08/20/15
20150237035 

Securing organizational computing assets over a network using virtual domains


A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the server system, wherein the encrypted identifying information is changed per client system per session.
Vidder, Inc.


08/20/15
20150237034 

Method and system for accessing data in a distributed network system


Disclosed are a method and a system for accessing data by a client device in a distributed network system having a central server system, at least one client device, and at least one business object server. The client device and business object server are coupled to the central server system via a communication network.
Oms Software Gmbh


08/20/15
20150237033 

Creating awareness of accesses to privacy-sensitive devices


Techniques for providing intuitive feedback to a user regarding which applications have access to a data stream captured by a privacy-sensitive device, such as a camera, a microphone, a location sensor, an accelerometer or the like. These techniques apprise the user of when an application is receiving potentially privacy-sensitive data and the identity of the application receiving the data.
Microsoft Technology Licensing, Llc


08/20/15
20150237032 

Method and authenticating a communication device


A method and apparatus for authenticating a communication device is disclosed. An system that incorporates teachings of the present disclosure may include, for example, an authentication system having a controller element that receives from a communication device over a packet-switched network a terminal id and a request to authenticate said communication device, generates a first registration id, stores the first registration id and a first communication identifier, transmits the first registration id to the communication device, receives from an interactive response system a second communication identifier and a second registration id that the interactive response system received during a communication session with the communication device over a circuit-switched network, and authenticates the communication device in response to detecting a match between the first and second communication identifiers and the first and second registration ids.
At&t Intellectual Property I, Lp


08/20/15
20150237031 

Secure authentication in a multi-party system


An authentication server transmits a random number to and receives a other information from a service provider. Later, the first random number is received from a requester and a provider identifier, the received other information and provider authentication policy requirements are transmitted to the requester.
Authentify, Inc.


08/20/15
20150237029 

Systems and methods for importing relation chain and providing contact information


A computer system, serves as a first platform, provides a user with a first user account on the first platform. The user has a second user account on a second platform; the second user account includes a second contact identification associated with a contact of the user on the second platform; and the contact has a first contact account on the first platform associated with a first contact identification.
Tencent Technology (shenzhen) Company Limited


08/20/15
20150237028 

Operating system monitoring and protection method utilizing a variable request string generator and receiver algorithm


A novel method of monitoring and protecting on-line computer access from intrusions (hackers, viruses, worms, etc.) through the through the implementation of a specific algorithm that permits continuous and direct communication with both the user computer's operating system and the accessed server (at multiple contact points) for verification purposes during any on-line access event. The overall system depends on a string variable algorithm method that accords a contact point identifications to and for all operating systems and servers monitored thereby in order to provide a four-level protection system to allow for instantaneous and reliable recognition and identification of all components within such transactions by initiating electronic communication between the server and the algorithm system, the algorithm system and the operating system, and, ultimately, the operating system and the server..

08/20/15
20150237025 

Storing a key to an encrypted file in kernel memory


Storing a key to an encrypted file in a kernel memory is disclosed. Authentication data may be received and authentication credentials of the authentication data may be stored in a file.
Red Hat, Inc.


08/20/15
20150237024 

Iterative data secret-sharing transformation


Provided are a method, system, and article of manufacture for iterative data secret-sharing transformation and reconversion. In one aspect, data secret-sharing transformation and reconversion is provided in which each bit of an input stream of bits of data is split, on a bit by bit basis, into a pair of secret-sharing bits, and the secret-sharing bits of each pair of secret-sharing bits are separated into separate streams of secret-sharing bits.
International Business Machines Corporation


08/20/15
20150237022 

System and method employing an agile network protocol for secure communications using secure domain names


A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the first network device, a request to look up a network address of the second network device based on an identifier associated with the second network device; (b) determine, in response to the request, whether the second network device is available for a secure communications service; and (c) initiate a virtual private network communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, wherein the secure communications service uses the virtual private network communication link..
Virnetx, Inc.


08/20/15
20150237021 

Method and querying content protected by identity-based encryption


An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at least in part, transmission of a query associated with a first user described according to a first set of criteria.
Nokia Technologies Oy


08/20/15
20150237017 

Communication information transmitting process and system


It discloses a type of communication information transmitting process and system, which belongs to the field of communication technology. The process comprises: acquire selected fingerprint information of communication information receiving terminal, makes use of the fingerprint information of communication information receiving terminal to conduct identity authentication.
Wwtt Technology China


08/20/15
20150237007 

Method, device, and system for automatically selecting ipv6 address transmission mode


A method, device, and system for automatically selecting an ipv6 address transmission mode are provided. The method includes a gateway general packet radio service (gprs) support node (ggsn) device adding an identifier of a currently adopted address allocation mode through configuration, and informing it to a mobile terminal; the mobile terminal device obtaining ipv6 address identifier information issued by the ggsn device after completing packet data protocol (pdp) context activation; the mobile terminal device sending a standard router solicitation (rs) message to the ggsn device; the ggsn device attaching the currently adopted address allocation mode when responding with allocated ipv6 address prefix information to the mobile terminal device; and the mobile terminal device analyzing the current address allocation mode sent by the ggsn device, and determining whether the current address allocation mode is to allocate a unique identifier or a unique prefix, and then executing corresponding processing..
Zte Corporation


08/20/15
20150237003 

Computerized techniques for network address assignment


Computer-implemented systems, methods, and computer-readable media are provided for assigning an ip address to a client device through an authentication process without needing to receive a dynamic host configuration protocol (dhcp) discover message to trigger the authentication process. In accordance with some embodiments, a message requesting assignment of an ip address to the client device is received, and a determination is made that identification information for the client device is not stored in a storage device.
Benu Networks, Inc.


08/20/15
20150237000 

Enabling mapping identification of online identities between different messaging services


A method and system for populating identities in a message service involves registering a user of a first messaging service with a second messaging service. User identities for users other than the registered user may be identified.
Facebook, Inc.




Popular terms: [SEARCH]



Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.


0.8583

5369

7 - - 130