Follow us on Twitter
twitter icon@FreshPatents


Den patents

      

This page is updated frequently with new Den-related patent applications.




 Soldering station with automatic soldering connection validation patent thumbnailSoldering station with automatic soldering connection validation
A soldering iron station and a method thereof for a soldering joint connection validation, the method including: identifying a type of the soldering cartridge being used; performing a preliminary validation by measuring the soldering tip temperature, after the soldering event has started; monitoring the power level delivered to the soldering tip to detect liquidus occurrence; determining the thickness of an intermetallic component (imc) of the soldering joint; determining whether the thickness of the imc is within a predetermined range, within a predetermined cooling time period; and indicating that a reliable soldering joint connection is formed, when the thickness of the imc is within the predetermined range, within the predetermined cooling time period.. .
Ok International Inc.


 Target system for irradiation of molybdenum with particle beams patent thumbnailTarget system for irradiation of molybdenum with particle beams
A target system for irradiation of molybdenum with charged particles from an accelerator to produce technetium and molybdenum radioisotopes. The target system comprises a molybdenum-100 material brazed with a brazing alloy to a backing material.
Triumf


 Electronic vaporiser system patent thumbnailElectronic vaporiser system
An electronic cigarette vaporiser includes a heating element and a microcontroller; the microcontroller monitors or measures electrical characteristics of the heating element and uses that to automatically identify the type of heating element and as a control input. The microcontroller automatically applies different heating parameter controls to the heating element, including optimal and maximum operating temperature, depending on the type of heating element that is identified..
Beyond Twenty Ltd.


 Method for releasing a sidelink radio bearer for d2d communication system and device therefor patent thumbnailMethod for releasing a sidelink radio bearer for d2d communication system and device therefor
The present invention relates to a wireless communication system. More specifically, the present invention relates to a method and a device for releasing a sidelink radio bearer for d2d communication system, the method comprising: receiving configuration information including a targetid, a sourceid, and an lcid from a peer ue, wherein the ue receives data from the peer ue over the sidelink radio bearer; configuring a sidelink radio bearer identified by the targetid, the sourceid, and the lcid; establishing a rlc and a pdcp entities for the sidelink radio bearer based on the configuration information received from the peer ue; starting a timer for the sidelink radio bearer; and releasing the sidelink radio bearer when the timer expires..
Lg Electronics Inc.


 Data transmission patent thumbnailData transmission
A data transmission method including sending, by a base station, request information, an identifier of a wireless local area network (wlan) access point (ap), and a first internet protocol (ip) address of the base station to user equipment, receiving, by the base station, a second ip address assigned by the wlan ap to the user equipment and confirmation information that are sent by the user equipment, and performing, by the base station, multi-stream aggregation data transmission to the user equipment using the wlan ap and through the ip tunnel, where the ip tunnel is determined using the first ip address and the second ip address.. .
Huawei Technologies Co., Ltd.


 Wireless data transmission system patent thumbnailWireless data transmission system
A system and a method are disclosed for enabling communication between mobile communication devices. A mobile communication device receives a message sent by a sender, the message including a recipient, a message identification, and a payload.
Beartooth Radio, Inc.


 Method for associating a mobile device with an appliance patent thumbnailMethod for associating a mobile device with an appliance
A method for associating a mobile device with an appliance includes capturing an image of a graphic identifier on the appliance with a camera of the mobile device, identifying a credential within the image of the graphic identifier, and establishing a wireless connection between the appliance and the mobile device if the credential from the step of identifying is correct.. .
General Electric Company


 Information processing apparatus and information processing method having communication function patent thumbnailInformation processing apparatus and information processing method having communication function
The present invention is an information processing apparatus which obtains identification information of an electronic device and makes communication with the electronic device via a network based on the identification information. When a portable telephone (11) is placed on an input display section (2) of a personal computer (1), a reader/writer built in the personal computer (1) reads a telephone number of the portable telephone (11) stored in an rf tag built in the portable telephone (11).
Sony Corporation


 Connection identifier for high-efficiency wireless networks patent thumbnailConnection identifier for high-efficiency wireless networks
Various embodiments are generally directed to techniques to identify the target of a packet in a wireless network. A transmitter node may include a connection identifier to generate a unique identifier corresponding to a connection between the transmitter node and a receiver node in the wireless network and a data packet transmitter to embed the unique identifier into a physical layer convergence protocol header corresponding to a packet to be transmitted to the receiver node.
Intel Ip Corporation


 Methods and apparatuses for notifying or updating prose temporary identifier patent thumbnailMethods and apparatuses for notifying or updating prose temporary identifier
Methods and apparatuses for notifying or updating a proximity-based services (prose) temporary identifier are provided. The method for notifying a prose temporary identifier includes: determining that a prose temporary identifier acquired by an announcing ue is revoked; and notifying the announcing ue that the prose temporary identifier acquired by the announcing ue is revoked.
Zte Corporation


System and improved emergency messaging

A method to manage operations between a backend server and a set of devices, each device comprising a customer account number and a wi-fi broadcast system (wfbs), the wfbs iteratively performing the following steps at a predefined time interval: (1) generating at a given wfbs a customer identification number for each customer account (2) broadcasting the customer identification number to each wfbs on the subnet of the given wfbs (3) receiving the customer identification number from each wfbs on the subnet of the given wfbs (4) processing the received customer identification number at the given wfbs, and (5) designating the given wfbs as a master wfbs for a given time integral if the given wfbs satisfies a predetermined criterion before performing a set of master operations.. .
Swn Communications, Inc.

Improving multimedia broadcast service efficiency

This document discloses a solution of maintaining service continuity in a multimedia broadcast service provided by a cellular network in a multimedia broadcast service area. A base station may transmit, in at least one cell provided by the base station, control information comprising an information element, wherein the information element may comprise an identifier of the multimedia broadcast service area and an indication that may cause at least one terminal device located in the at least one cell to request the multimedia broadcast service content as a transmission addressed to the at least one terminal device.
Nokia Solutions And Networks Oy

Reiterated downlink grant design for multiple transmission time interval grant support in ecc

Enhanced robustness for downlink burst transmissions using reiterated grants. A user equipment (ue) may receive multiple transmissions during multiple (e.g., consecutive, etc.) transmission time intervals (ttis) as part of a downlink burst from a base station, where at least some of the ttis may include an iteration of a grant and a data transmission.
Qualcomm Incorporated

Reception device and reception method

Disclosed are a transmission device and a transmission method with which it is possible to prevent delays in data transmission and to minimize the increase in the number of bits necessary for the notification of a cc to be used, in cases where a cc to be used is added during communication employing carrier aggregation. When a component carrier is to be added to a component carrier set, a setting section provided in a base station: modifies a cif table that defines the correspondence between code points, which are used as labels for the respective component carriers contained in the component carrier set, and the identification information of the respective component carriers; and assigns a vacant code point to the component carrier to be added, while keeping the correspondence between the code points and the component carrier identification information defined in the cif table before modification..
Sun Patent Trust

Method and configuring a signal field including allocation information for a resource unit in wireless local area network system

Proposed is a control field including allocation information regarding a resource unit (ru) in a wireless local area network (wlan) system supporting a plurality of rus. A data field may be transmitted in unit of the ru.
Lg Electronics Inc.

Techniques for contention window adjustment for transmissions in a shared radio frequency spectrum band

Techniques for adjusting a contention window (cw) for transmissions in a shared radio frequency spectrum band may include identifying a number of nodes attempting to transmit using a channel of a shared radio frequency spectrum band and determining a target cw based on the number of nodes attempting to transmit. A new cw value may then be determined based on a prior cw value and the target cw value, and a listen-before-talk (lbt) procedure (e.g., a clear channel assessment (cca)) to access the channel of the shared radio frequency spectrum band may be performed to access the channel..
Qualcomm Incorporated

Techniques for managing uplink transmissions in a shared radio frequency spectrum band and a dedicated radio frequency spectrum band

Techniques are described for wireless communication. One method includes identifying a priority parameter associated with data to be transmitted on an uplink carrier; selecting, based at least in part on the identified priority parameter, between a first type of message for requesting uplink resources in a shared radio frequency spectrum band or a dedicated radio frequency spectrum band, or a second type of message for requesting uplink resources in the dedicated radio frequency spectrum band; and transmitting the selected type of message..
Qualcomm Incorporated

Managing service acquisition on a wireless communication device

Methods and devices are disclosed for enabling improved service acquisition on at least one sim of a wireless communication device. After a first sim has lost service, the wireless communication device may identify, in a first radio access technology (rat) priority list configured to support the first sim, a highest ranked radio access technology.
Qualcomm Incorporated

Method and performing hybrid per station and per flow uplink allocations

In an embodiment, a wireless transmit/receive unit (wtru) may include: at least one antenna; a transceiver operatively coupled to the at least one antenna; and a processor operatively coupled to the transceiver. The at least one antenna is configured to receive a first signal that includes a control message.
Interdigital Patent Holdings, Inc.

Operation methods of communication node in network supporting licensed and unlicensed bands

Disclosed are operation methods of a communication node in a network supporting licensed and unlicensed bands. An operation method of a user equipment (ue) may comprises receiving, from a base station, a physical downlink control channel (pdcch) including downlink control information (dci) in a subframe n−1 of an unlicensed band; decoding the dci using a common radio network temporary identifier (rnti); and identifying the number of symbols of the subframe n−1 or a subframe n based on the decoded dci.
Electronics And Telecommunications Research Institute

User equipment, base station, communication access method, and communication method

In user equipment for communicating with a base station in a radio communication system including the base station and the user equipment, the user equipment includes a receiver that measures received power of reference signals associated with a plurality of different identification information items, the reference signals being transmitted from the base station, and that selects a specific reference signal based on a measurement result; and a transmitter that transmits a random access signal including a preamble sequence, the preamble sequence corresponding to the identification information item of the reference signal selected by the receiver.. .
Ntt Docomo, Inc.

Network performance in high density environments

Systems and methods for managing a network are disclosed. One method can comprise determining signal information relating to a first network device such as an access point.
Comcast Cable Communications, Llc

Electronic device and identifying location information thereof

An electronic device and method for identifying location information are provided. The electronic device may include a receiver circuit for receiving location-related information from external devices, and a controller.
Samsung Electronics Co., Ltd.

Method and signaling in dense network operations

A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus identifies first entity and transmits a very low duty cycle signal (ldcs) configuration of the first entity.
Qualcomm Incorporated

Communication control method, user terminal, cellular base station, and access point

A communication control method according to a first aspect is a method for performing offloading to switch traffic to be transmitted and received between a user terminal and a cellular base station to a wireless lan system. The communication control method comprises: a step a in which the user terminal transmits a wireless lan terminal identifier being an identifier of the user terminal in the wireless lan system, to the cellular base station; and a step b in which the cellular base station, before performing the offloading, transmits the wireless lan terminal identifier received from the user terminal to an access point of the wireless lan system.
Kyocera Corporation

Methods and apparatus to manage data connections for multiple subscriber identities in a wireless communication device

Apparatus and methods to manage data connections to multiple wireless networks in a wireless communication device supporting multiple subscriber identities via multiple subscriber identity modules (sims) are disclosed. A representative method includes detecting an application request to establish a data connection; obtaining a preference for prioritization of data connections for the multiple sims; and based on the preference, establishing the data connection with a wireless network associated with one of the multiple sims.
Apple Inc.

Wireless communication device control of wireless communication access systems

A wireless communication network enables a user to select data communication accounting systems. A wireless communication device attaches to a wireless access system, and the wireless access system transfers network data characterizing billing identifiers (bids) to the wireless communication device.
Sprint Communications Company L.p.

Enhanced cell global identifier-based handover from an enodeb to a home enodeb

Examples are disclosed that facilitate using enhanced cell global identifier to effectively manage the handover of cellular communication services for a mobile device in an lte network from a source, or serving, evolved node b (enb) to a target home evolved node b (henb). The increased use of henbs to provide service to mobile devices creates issues for the management of tracking area identifiers associated with the enb and henbs and may increase tracking area update (tau) signaling in the cellular network.
Verizon Patent And Licensing Inc.

Balancing paging load and tracking area updates

A method for assigning a tracking area (ta) is disclosed. A mobility state of a wireless transmit/receive unit (wtru) is determined and the ta is assigned based on the determined mobility state.
Interdigital Technology Corporation

Harq adaptation for acquisition of neighbor cell system information

A method in a mobile station including receiving an order from a serving cell for system information acquisition of a neighbor cell, wherein the order includes at least a physical cell identifier and a time limit for acquisition of the system information of the neighbor cell, acquiring the system information of the neighbor cell within the time limit for the acquisition of the system information, and reporting at least a part of the acquired system information to the serving cell.. .
Google Technology Holdings Llc

Mobility design for emtc

Aspects of the present disclosure provided techniques for wireless communications by a user equipment (ue). An exemplary method, performed by the ue, generally includes identifying a level of coverage enhancement (ce) for the ue to communicate on at least one narrowband region within a wider system bandwidth in which the ue communicates with a base station (bs) and taking one or more actions to alter one or more procedures related to mobility of the ue, based on the level of ce..
Qualcomm Incorporated

User equipment in mobile communication controlling the same

A user equipment (ue) and method for controlling the ue are provided. The ue includes a memory configured to store network identification information, the network identification information including information about a radio access technology (rat) corresponding to a type of a network; and a communication device comprising a transceiver, and a processor configured to control the transceiver, in response to a network reselection event while the ue is connected to a first network, to connect the ue to a second network based on the network identification information..
Samsung Electronics Co., Ltd.

Mobile wlan gateway

A technique for operating a mobile station as wireless local-area network [“wlan”] gateway. The mobile station is provided with a gateway application to control the following operations: activating (3-0) the wlan means as a wlan base station capable of communicating with at least one wlan terminal over a wlan network; creating a network identifier (3-2, 3-4) for the wlan base station; assigning (3-8, 3-10) an intemet protocol address for the at least one wlan terminal; resolving domain name service [“dns”] queries (3-12 .
Huawei Technologies Co., Ltd.

Method and supporting full-duplex communication operation in wireless communication system supporting full-duplex communication

A method for performing a full-duplex radio (fdr) operation in a wireless communication system that supports the fdr is disclosed. The method includes exchanging fdr capability information that represents whether to have a capability of performing the fdr operation between a user equipment (ue) and a base station (bs); receiving, by the ue, inter-device-interference (idi) measurement configuration information from the bs; performing, by the ue, an idi measurement based on the received idi measurement configuration information; reporting, by the ue, a result of the idi measurement to the bs; and receiving, by the ue, a control message notifying that the ue is included in a group related to the fdr operation from the bs, where the fdr capability information includes indication information that represents whether to support an fdr mode that transmission and reception operations are available to be performed simultaneously using an identical radio resource..
Lg Electronics Inc.

Computing nodes

In examples provided herein, upon receiving notification of a computational task requested by a package to provide an experience to a user, a remote node management engine identifies computing nodes for performing the computational task and determining available processing resources for each computing node, where a computing node resides at networked wearable devices associated with the user. The remote node management engine further selects one of the computing nodes as a primary controller to distribute portions of the computational task to one or more of the other computing nodes and receive results from performance of the portions of the computational task by the other computing nodes, and provides to the selected computing node information about available processing resources at each computing node..
Hewlett Packard Enterprise Development Lp

Method and directed adaptive control of access point-to-client interaction in wireless networks

The present invention relates to wireless networks and more specifically to systems and methods for selecting and implementing communication parameters used in a wireless network to optimize communication between access points and client devices. In one embodiment, the present invention includes a wi-fi coordinator device that receives client device information from client devices connected to an access point in a network.
Network Performance Research Group Llc

Information processing apparatus and non-transitory computer-readable recording medium

A computer is caused to perform a communication environment information acquisition procedure; a procedure that acquires position information; a procedure that, when the computer is located in a positioning-difficult area or in a positioning-inaccurate area, acquires movement information; and a procedure that identifies a position at which the communication environment information acquisition procedure was performed in the positioning-difficult area or the positioning-inaccurate area, based on the movement information and the position information that is measured by the positioning means in a positioning-possible area where the positioning accuracy of the positioning means is higher than a predetermined value after the computer has moved from the positioning-difficult area or the positioning-inaccurate area to the positioning-possible area.. .
Agoop Corp.

Method and communication in wireless communication system

The present disclosure relates to a 5g or pre-5g communication system for supporting a data rate higher than that of the 4g system. A method by a terminal in a wireless communication system according to the present disclosure includes receiving a first message comprising first information indicating a number of symbols in an uplink pilot time slot (uppts) region, identifying at least one symbol for transmitting a sounding reference signal (srs) based on the first information, and transmitting the srs..
Samsung Electronics Co., Ltd.

Method for allocating communication channels to access points in a communications network

A method for allocating communication channels to access points in a communications network comprising: identifying, amongst the access points, one or more interference-prone pairs of access points, wherein each interference-prone pair comprises a first access point and a second access point that are currently using the same or overlapping communication channels to communicate with their respective client user devices, determining the number n of non-overlapping channels that are available for allocating to the access points; allocating the n non-overlapping channels between the access points in such a way as minimise the number of interference-prone pairs of access points; and where an access point cannot be allocated any one of the n channels without it comprising part of an interference-prone pair, selecting a particular one of the n channels to allocate to the access point based on a selection criterion.. .
Kabushiki Kaisha Toshiba

Delegated profile and policy management

Identities of mobile communications devices and subscription credentials are maintained by an enterprise server. The subscription credentials are operative to enable access to subscription services of a mobile network operator.
Microsoft Technology Licensing, Llc

Virtualization of the evolved packet core to create a local epc

Systems and methods are disclosed for a local evolved packet core (epc) that interoperates with an enodeb and a remote epc. In one embodiment, a method for establishing an ad hoc local network may be disclosed, comprising: monitoring an availability of a connection to a remote core network; creating a first data connection between a first mobile device and a local core network module, thereby permitting a first mobile device to attach to a local network base station without connectivity to the remote core network; identifying, at a local core network module, reconnection to the remote core network; sending, from the local core network module to the remote core network, a service request message based on a prior message received from the first mobile device at the local core network module; creating a second data connection between the local network base station and the remote core network; and forwarding downlink data, received from the remote core network via at the second data connection, to the first mobile device via the first data connection..
Parallel Wireless, Inc.

System and improved identification of a mobile device

An improved technique for identifying a user's mobile device is discussed. A persistent and unified identifier that bridges mobile app to mobile web and to other web browser-compatible mediums is utilized.
Ack Ventures Holdings, Llc

Systems, methods and apparatuses for enabling wearable device user access to secured electronic systems

Systems, methods, and apparatuses disclosed enable wearable device (e.g., smartwatch) user access to secured electronic systems based on at least one of user authentication for access to secured electronic system by the wearable device, user biometric authentication by a wireless carrier, user biometric authentication by remote server, user location, and user proximity to a secured electronic system. A wearable device can include a telecommunications carrier identification module (e.g., sim), cellular rf communications, and short-range rf communications.

Network access identifier including an identifier for a cellular access network node

A user equipment (ue) sends, to a wireless access node in a wireless local area network (wlan), a network access identifier (nai) that includes an identifier for a cellular access network node. The ue receives an authentication challenge based on information in the nai..
Blackberry Limited

Id-based control unit-key fob pairing

A method for pairing a key fob with a control unit is provided. The key fob executes an id authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key.
Texas Instruments Incorporated

Method of deleting ssid of access point stored in information processing apparatus

In a method, that is executed in an information processing apparatus, of deleting an ssid (service set identifier) of an access point stored in the information processing apparatus, information indicating ssids stored in the information processing apparatus is obtained from the information processing apparatus, and an ssid satisfying a predetermined condition is specified among the ssids included in the obtained information. The information processing apparatus is instructed to delete the specified ssid..
Canon Kabushiki Kaisha

System, method, and facilitating selection of a serving node

A method, apparatus, and system is provided for establishing communication between a wireless communication device (wcd) and one of a plurality of serving nodes (sns). Each of the sns is configured to perform mobility management and session management.
Telefonaktiebolaget L M Ericsson (publ)

Method and system for controlling access of csg in dual-connection architecture

The present document discloses a method and a system for controlling access of a closed subscriber group (csg) in a dual-connection architecture. The method includes: a base station acquiring csg identity state information of a user equipment (ue); and the base station determining a csg access policy of the ue according to the acquired csg identity state information of the ue..
Zte Corporation

Communication management system, communication management method, and computer program product

A communication management system includes: a group management unit that manages group identification information for identifying a group to which an addition request source terminal requesting to add a destination candidate belongs, in association with group identification information for identifying a group to which an addition request target terminal being able to become the destination candidate belongs; a receiving unit that receives an addition request transmitted by a first communication terminal and requesting to add a second communication terminal as a destination candidate; and a transmission controlling unit that does not transmit the approval request to the second communication terminal, when first group identification information for the first communication terminal is group identification information for an addition request source terminal, and second group identification information for the second communication terminal is not included in at least one corresponding piece of group identification information for an addition request target terminal.. .

Detection of unauthorized wireless personal area network low energy devices

In an approach for determining an unauthorized device, a computer receives detection information from a computing device, wherein the detection information includes a broadcast transmission from one or more devices. The computer creates a state trajectory map based on the received detection information, wherein the state trajectory map identifies connections between at least the computing device and a first device of the one or more devices and the computing device and a second device of the one or more devices.
International Business Machines Corporation

Systems and methods to identify home addresses of mobile devices

Systems and methods including a database storing the identifiers of cells representing residential parcels of real estate properties. Mobile devices determine the coordinates of their locations during a period of time using a location determination system, such as a global positioning system.
Ninthdecimal, Inc.

System for collecting, analyzing, and transmitting information relevant to transport networks

When individual persons or vehicles move through a transportation network, they are likely to be both actively and passively creating information that reflects their location and current behavior. In this patent, we propose a system that makes complete use of this information.
Apple Inc.

Method and providing location information

A method of an electronic device and the electronic device including a first processor operable at a first power level and a second processor operable at a second power level are provided. The method includes receiving first location information of the electronic device from an external electronic device through at least one first sensor functionally connected with the first processor, and upon failure to identify second location information of the electronic device from the external electronic device through the at least one first sensor using the first processor, obtaining the second location information through at least one second sensor functionally connected with the second processor using the second processor..
Samsung Electronics Co., Ltd.

Method of managing geo-fence and electronic device thereof

Disclosed are a method of managing geo-fences by an electronic device and an electronic device therefor. An operation of the electronic device may include: identifying a deletion of at least some geo-fences among a plurality of geo-fences stored in the electronic device or an addition of other geo-fences; identifying a number of remaining geo-fences among the plurality of geo-fences according to the deletion or the addition; and when the number of remaining geo-fences is larger than a number of geo-fences which can be allowed by hardware resources, grouping the remaining geo-fences as one or more geo-fence groups..
Samsung Electronics Co., Ltd.

Travel recommendations on online social networks

In one embodiment, a social-networking system may receive, from a client system of a first user of an online social network, an indication that the first user is traveling to a first geographic location, and identify one or more second geographic locations within a threshold distance from the first geographic location. The second geographic locations may be determined based on a travel-recommendation model.
Facebook, Inc.

Device with position determination means, server communicating with that device, receiving service in accordance with position, and program

A device capable of being used while moving and of receiving a service according to a position to which the device has moved comprises: positioning means for, based on positioning signals for location identification separately received from a plurality of positioning devices, determining their respective positional information; holding means for holding positional information determined by the positioning means for each type of the plurality of positioning devices; and notification means for, regarding positional information newly determined by the positioning means, determining with reference to the holding means whether to provide notification of the position in order to receive the service or not, and providing the notification according to the determination.. .

Automatic semantic labeling based on activity recognition

A method and device for automatic semantic labeling of unlabeled places using activity recognition. A method includes determining at least one activity based on analyzing electronic device sensor data.
Samsung Electronics Co., Ltd.

Systems and methods for enabling cellular data network access to portable devices via a smartwatch including a sim therein

Systems and methods enabling cellular data telecommunications carrier network access to portable devices via a smartwatch are disclosed. A smartwatch can include a subscriber identification module (sim), a wireless cellular data network communications module, and a short-range wireless data communications module.

State determination apparatus and system for a care-receiver

A state determination apparatus for a care-receiver is provided, comprising: a communication unit and a protective unit. The communication unit includes at least one first antenna module and a first wireless communication module.
Hello Nurse Medical Innovation, Inc. Taiwan Branch

User association with passive tags

Embodiments relate generally to methods and systems for user association with a gas detector using passive nfc tags. Applicants propose a gas detector with a near-field communication (nfc) reader built into the gas detector, thereby allowing the user to scan their employee identification (id) badge or a specialized individualized nfc tag.
Honeywell International Inc.

Apparatus and controlling other electronic device in electronic device

According to an embodiment of the present disclosure, a method for operating an electronic device includes displaying a result of recognizing at least one other electronic device as at least one item, and sending a message requesting the at least one other electronic device to output an identifiable signal.. .
Samsung Electronics Co., Ltd.

Methods, procedures and framework to provision an esim and make it multi-sim capable using primary account information

Some embodiments relate to methods for provisioning a secondary wireless device with an esim for wireless communication and activating multi-sim functionality between the secondary wireless device and a primary wireless device having a subscribed sim. The primary wireless device may act as a proxy in obtaining the esim for the secondary wireless device.
Apple Inc.

Method for a configuration error management for a sidelink radio bearer and device therefor

The present invention relates to a wireless communication system. More specifically, the present invention relates to a method and a device for a configuration error management for a sidelink radio bearer, the method comprising detecting configuration error for a sidelink radio bearer comprising a rlc entity and a pdcp entity, starting a timer when the configuration error for the sidelink radio bearer is detected, generating a configuration error recovery request including an identifier of the sidelink radio bearer, and transmitting the configuration error recovery request to a network or a peer ue directly connected to the ue via a sidelink..
Lg Electronics Inc.

Effect giving device

An effect giving device that can solve a problem that sound is localized inside a head when using a headphone and a problem that timbre changes depending on kind of the headphone is provided. A dsp 10 performs a speaker adjusting equalizer process that processes an entire bandwidth with seven bands.
Kawai Musical Instruments Manufacturing Co., Ltd.

Playback device calibration

Examples described herein involve calibration of a playback device. In an example, a system maintains a database of representative acoustic characteristics.
Sonos, Inc.

Media content based on playback zone awareness

Systems and methods are provided for providing media content based on playback zone awareness. In one aspect a server associated with a service provider may be configured to receive zone data identifying a name of a zone associated with a playback device, identify, based on the zone data, media content based on the zone data, and provide the media content to the playback device.
Sonos, Inc.

Method and outputting audio in electronic device

A method and device for processing an audio output in consideration of the hearing characteristics of a user and the characteristics of an audio device connected to an electronic device is provided. The electronic device includes a user interface; an audio interface configured to establish a connection to an audio device, a memory, and at least one processor electrically connected to the user interface, the memory, and the audio interface, wherein the at least one processor is configured to acquire at least one of identification information of the audio device and characteristics of the audio device, select audio adaptation information, change an audio signal, at least partially based on the audio adaptation information, and transmit the changed audio signal to the audio device..
Samsung Electronics Co., Ltd.

System and detecting advertisements in multimedia assets

Systems and methods for determining the location of advertisements in multimedia assets are disclosed. A method includes obtaining an audio signature corresponding to a time period of a multimedia asset, identifying a match between the obtained audio signature and one or more stored audio signatures, comparing programming data of the multimedia assets of the obtained audio signature and the matching audio signatures, and determining whether the time period of the multimedia asset contains an advertisement based on the comparison of the programming data of the multimedia assets of the obtained audio signature and the one or more matching audio signatures.
Arris Enterprises Llc

Interactive programming guide

Techniques of providing an interactive programming guide with a personalized lineup are disclosed. In some embodiments, a profile is accessed, and a personalized lineup is determined based on the profile.
Gracenote, Inc.

Display control system, display control and display device

A display control system and a method, and a display device, the above system comprising: an acquisition module configured to collect information of users within a target region, verify user identity according to said information, and also to detect whether exists a user viewing the display within said target region; a query module configured to query corresponding information about view habit according to the user identity; a control module configured to adjust an image output and/or an audio output of said display according to said information about view habit in a case where exists no user viewing the display within said target region. By the present technical solution, it is possible to control the display according to the user of different identities in a case where exists no user viewing the display within the target region..
Boe Technology Group Co., Ltd.

Program output apparatus, program management server, supplemental information management server, outputting program and supplemental information, and recording medium

A program output apparatus comprising a program receiving unit receiving a program; a channel identifier acquiring unit acquiring a channel identifier of the program that is being received by the program receiving unit; a program identifying information acquiring unit acquiring program identifying information corresponding to program specifying information containing the channel identifier; an assistance information acquiring unit acquiring assistance information corresponding to the program identifying information acquired by the program identifying information acquiring unit, the assistance information being received from a second server in which one or more pieces of assistance information corresponding to program identifying information are stored; and an output unit outputting the program received by the program receiving unit and the assistance information acquired by the assistance information acquiring unit. This configuration allows to acquire assistance information provided separately from a program that is being received, and to output the assistance information together with the program..
Astem Co., Ltd.

Simultaneous presentation of content on a second device

Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. A controlling device is identified that includes a display for presenting content to a user.
Google Inc.

Information processing system, server device, and control program

A server apparatus includes a storage, an acquisition unit, and a controller. The storage stores association information that associates access information on the program processing apparatus corresponding to user identification information with the user identification information.
Panasonic Intellectual Property Management Co., Ltd.

Determining user engagement with media content based on separate device usage

The various embodiments described herein include methods and systems for determining user engagement with media content. In one aspect, a method is performed at a computer system.
Google Inc.

Reducing signature matching uncertainty in media monitoring systems

Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) to reduce signature matching uncertainty in media monitoring systems are disclosed. Example media monitoring methods disclosed herein include executing a media signature matching procedure using a first analysis window on monitored media signatures representative of monitored media to identify the monitored media.
The Nielsen Company (us), Llc

System and continuous media segment identification

This invention provides a means to identify unknown media programming using the audio component of said programming. The invention extracts audio information from the media received by consumer electronic devices such as smart tvs and tv set-top boxes then conveys said information to a remote server means which will in turn identify said audio information of unknown identity by way of testing against a database of known audio segment information.

Method, system for calibrating interactive time in a live program and a computer-readable storage device

The disclosure is related to a method for calibrating an interactive time in a live program, and a system thereof. In the method, a user device is used to receive a live content embedded with a mark from a live program system.
Institute For Information Industry

Super-transform video coding

Super-transform coding may include identifying a plurality of sub-blocks for prediction coding a current block, determining whether to encode the current block using a super-transform, and super-prediction coding the current block. Super-prediction coding may include generating a super-prediction block for the current block by generating a prediction block for each unpartitioned sub-block of the current block, generating a super-prediction block for each partitioned sub-block of the current block by super-prediction coding the sub-block, and including the prediction blocks and super-prediction blocks for the sub-blocks in a super-prediction block for the current block.
Google Inc.

Video coding using reference motion vectors

Techniques described use a reference motion vector to reduce the amount of bits needed to encode motion vectors for inter prediction. One method includes determining a reference motion vector used to encode a current block of a current frame.
Google Inc.

Image coding method, image decoding method, image coding apparatus, image decoding apparatus, and image coding and decoding apparatus

An image coding method includes: writing, into a sequence parameter set, buffer description defining information for defining a plurality of buffer descriptions; selecting one of the buffer descriptions for each processing unit that is a picture or a slice, and writing buffer description selecting information for specifying the selected buffer description, into a first header of the processing unit which is included in the coded bitstream; and coding the processing unit using the selected buffer description, and the buffer description defining information includes long-term information for identifying, among a plurality of reference pictures indicated in the buffer descriptions, a reference picture to be assigned as a long-term reference picture.. .
Sun Patent Trust

Method and system for coding signals using distributed coding and non-monotonic quantization

A decoder includes a memory storing a map of a space of encoded values. The map includes a plurality of cells partitioning the space, such that each cell encloses a cluster of encoded values and quantizes the cluster of encoded values to a quantized encoded value.
Mitsubishi Electric Research Laboratories, Inc.

Reception device, display control method, transmission device, and transmission program content type

Previously, users could not be notified when the 3d mode type of a program being received by a digital broadcast receiver was not compatible with the digital broadcast receiver. A reception device is provided with: a reception unit which receives program content including video information and identification information including information for distinguishing whether the program content is 2d program content or 3d program content; and a display control unit which controls the display so as to display whether the aforementioned program content is 2d program content or 3d program content in response to the received aforementioned identification information..
Hitachi Maxell, Ltd.

Disturbance detection in video communications

Embodiments disclosed herein provide systems, methods, and computer readable media for detecting disturbances in a media stream from a participant on a communication. In a particular embodiment, a method provides identifying disturbance criteria defining a plurality of audible disturbances, a plurality of visual disturbances, and a plurality of communication disturbances.
Avaya Inc.

High definition surveillance image storage optimization apparatus and methods of retention triggering

A high definition surveillance video storage optimization system executes purging directives according to policy and retention meta data. Segments of video are purged from storage when thresholds of retention metrics are applied and when policy permits.

System and fine-grained control of privacy from image and video recording devices

Systems and methods for providing privacy control for digital capture of a recording include identifying a person within a digital capture that is a recording of a person within an environment based on received information regarding the person. A disposition tag is associated with an identified person in the recording.
International Business Machines Corporation

Systems and methods for variable video production, distribution and presentation

Methods, apparatus, systems and machine readable medium for variable video production, distribution and presentation are disclosed. An example system to generate a variable video includes a data center storing a plurality of media assets and a composer communicatively coupled to the data center over a network.
R. R. Donnelley & Sons Company

Imaging apparatus and imaging system

An imaging apparatus includes a pixel configured to generate a signal in accordance with an incident light by a photoelectric conversion; a differential amplifier including a first input terminal to which a voltage based on the signal from the pixel is input, and a second input terminal to which a reference voltage is input; a current supply unit configured to supply a bias current to the differential amplifier; and a comparing unit configured to compare the voltage of the first input terminal of the differential amplifier with a threshold voltage, and configured to output a control signal based on a comparison result to the current supply unit, and the current supply unit changes a magnitude of the bias current supplied to the differential amplifier in accordance with the control signal input from the comparing unit.. .
Canon Kabushiki Kaisha

Determining settings of a camera apparatus

Methods and computer program products for determining one or more settings of a camera apparatus are provided. The methods include obtaining one or more parameters of the camera apparatus and determining one or more settings of the camera apparatus using the one or more parameters and an image repository.
International Business Machines Corporation

Remote controlled studio camera system

A system for remotely controlling a camera is disclosed. The system includes five major subsystems; a first subsystem collocated with the camera; a second subsystem which serves as a gateway between the camera and the third subsystem; a third subsystem to remotely monitor the studio and control the camera; a fourth subsystem located at the destination of the video stream; and a fifth subsystem to receive and re-transmit a video control stream.
Videolink Llc

Systems and methods for iterative adjustment of video-capture settings based on identified persona

Disclosed herein are systems and methods for iterative adjustment of video-capture settings based on identified persona. In an embodiment, a method includes receiving video frames being captured by a video camera of an ongoing scene.
Personify, Inc.

Protocol for communications between platforms and image devices

In accordance with some embodiments, a protocol permits communications between platforms and image devices. This allows, for example, the platform to specify particular types of information that the platform may want, the format of information the platform may prefer, and other information that may reduce the amount of processing in the platform.
Intel Corporation

Printing system, printer, and non-transitory computer readable medium

A printing system includes a terminal and a printer communicable with the terminal. The terminal includes: an operation history recording unit that detects an operation performed by a user for changing a display area of an electronic document displayed on a screen of the terminal, and records operation history information that includes type information about the operation; and an instruction transmitting unit that transmits, to the printer, print instruction information including the operation history information recorded by the operation history recording unit and document information for identifying the electronic document.
Fuji Xerox Co., Ltd.

Systems, methods, and mobile devices for providing a user interface to facilitate access to prepaid wireless account information

A method for operating a mobile device includes, in response to receiving a swipe gesture via a user interface of the mobile device, displaying a balance of a prepaid wireless service account on a display of the mobile device. The balance may be displayed in a currency such as monetary currency or a proprietary currency such as minutes or credits provided by a wireless service provider.
At&t Mobility Ii Llc

Nurse call system, nurse call conversion unit, nurse call connection method, and program

In nurse call systems that enable communication from a plurality of cordless handsets with a plurality of extension terminals carried by nurses belonging to a group, a nurse call conversion unit is provided between a nurse call control device and a private branch exchange. A call signal for a group representative call in which only an identification number for a group is given is transmitted by the nurse call conversion unit from the nurse call control device to the private branch exchange.
Nippon Telegraph And Telephone West Corporation

Methods and systems for inbound call control

An indication of an incoming call may be received at a call control unit communicatively coupled to, and/or resident within, a telephone. The indication may include identification information for the incoming call.
Kedlin Company, Llc

System and determining and communicating presence information

A system and method for communicating presence information that can include at a first server of a communication platform, receiving an authorization token of a first client application; verifying at least one permission associated with the authorization token; registering a presence status of the first client application upon verifying the at least one permission of the authorization token; at a second server of the communication platform, accepting an incoming communication request; retrieving communication instructions according to the incoming communication request; identifying an instruction to communicate with a communication destination of the first client application; accessing the presence status resource of the first client application; establishing communication with the first client application according to the accessed presence status resource.. .
Twilio, Inc.

Techniques for providing telecommunication services to an accessory device

The embodiments described herein are generally directed to systems and methods for intelligently structuring, handling, and enhancing communication sessions between or among communication devices including traditional telephony endpoints (e.g., phones) and non-traditional endpoints (e.g., automobiles, accessory devices, wearable accessory devices) among others. Some embodiments are particularly directed to call forwarding policies for providing the ability to make and receive telephone calls intended for a specific telephony endpoint (e.g.
Bandwidth.com, Inc.

Telecommunication call management and monitoring system with voiceprint verification

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification.
Globel Tel*link Corp.

Smart automatic composition of short messaging responses

An electronic communication device and method for communication including automatically selecting, composing, and/or presenting a number of proposed responses to a message is disclosed. The device can present the incoming message content to the user together with an alert to the user that one or more proposed responses are available for review and selection.
Microsoft Technology Licensing, Llc

Patent for app, function, software, and/or utility that utilize cell phones and its cameras for on-the-road, (driving) recording, home security recording, and phone protection and safety recording

To include black box function into cell phones with an application, function, software widget, and utility that utilize cell phones which will provide continuous recording. The cell phones will utilize its front and rear camera to provide on-the-road recording that can be utilized for road accidents and vehicle theft-prevention, served as a security camera at home to monitor and record any suspicious or dangerous activities, and continuous recording which can be used to monitor and prevent any information leak from occurring to other users..

Control frame handling by a provider backbone bridge

A method and bridge in a provider backbone bridge network, pbbn, for enabling frames from a higher layer entity attached alternatively to a provider instance port on an i-component of a backbone edge bridge or to a customer backbone port on a b-component of the backbone edge bridge, to reach an intended entity in the pbbn. A virtual instance port service access point, vip sap, is configured for every vip and every higher layer entity configured on the i-component.
Telefonaktiebolaget Lm Ericsson (publ)

Method and system for processing machine-to-machine sensor data

An approach is described for registering a plurality of gateway devices to a sensor platform operated by a service provider, detecting at the gateway devices, one or more sensors from a personal area network of a subscriber, determining corresponding identifiers of the sensors, collecting data from the sensors over one or more coordinated personal area networks, and designating each of a plurality of agents to process the collected data for local analysis and acting on this analysis, wherein the agents are configured to communicate with other agents.. .
Verizon Patent And Licensing Inc.

Register files for i/o packet compression

Systems, apparatuses, and methods for reducing inter-node bandwidth are contemplated. A computer system includes requesting nodes sending transactions to target nodes.
Advanced Micro Devices, Inc.

Context parameters and identifiers for communication

In one aspect, a method related to communication. In addition, other method, system, and program product aspects are described in the claims, drawings, and/or text forming a part of the present application..
Triplay, Inc.

Methods and systems for providing a consistent profile to overlapping user sessions

Just in time delivery of a consistent user profile to overlapping user sessions, where a first user session issues a request for a first file of a user profile to a server agent. Upon receiving the request, the server agent retrieves the first file from a base user profile, and just in time delivers the retrieved first file to the first user session.
Citrix Systems, Inc.

Method, apparatus and system for distributed cache reporting through probabilistic reconciliation

Methods, apparatuses and systems may be used to populate and utilize content in distributed network attachment point (nap) caches with the help of a statistical cache report synchronization scheme that may be tuned in terms of bandwidth consumption for the synchronization and overall surety of the retrieval requests, and therefore, the incurred penalty in terms of latency. One example references a particular statistical synchronization scheme based on a bloom filter reconciliation set technique.
Interdigital Patent Holdings, Inc.

Method and pushing data in a content-centric networking (ccn) network

A method for pushing data in a content-centric networking (ccn) network comprises receiving a message from a source at an input interface device of a node device in the ccn network, the node device executing a ccn protocol. A determination is made that the received message is an interest-notification message.
Futurewei Technologies, Inc.

College readiness predictor and selection service using profile manager and translation validation

Systems and methods for managing profiles and performing translations, validating translations, and managing student profiles are disclosed. An exemplary method includes receiving a registration request, providing a registration interface to a user device, receiving an expertise area selection and a user identifier from the user device, converting the expertise area selection from a base language to a target language, sorting users by expertise area into a list, and transmitting the list in the target language to a target user.
Skynexus Technologies Inc.

Method for sharing photographed images between users

An image photographing method for sharing a shared image, which is a plurality of images obtained by photographing an identical subject 103 with a plurality of cameras or an image generated from the plurality of images, between a plurality of users of the plurality of cameras, the image photographing method including: judging whether a target camera that is one of the plurality of cameras photographs subject 103 (s401); and allowing a user of the target camera to browse the shared image according to a period in which the target camera photographs subject 103 (s403) when the judgement that the target camera photographs subject 103 is made (yes in s402).. .
Panasonic Intellectual Property Management Co., Ltd.

Systems and methods for maintaining ownership of and avoiding orphaning of communication sessions

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning of communication sessions when activities are terminated are also disclosed.
Unisys Corporation

Systems and methods for selecting and wirelessly programming a motor

A system for wirelessly programming and diagnosing a motor includes a server computer system, a portable electronic device, and a wireless communication device. The server computer system stores motor operating parameters and other motor data that can be accessed by the portable electronic device over a wireless communication network for identifying a suitable replacement motor for an unserviceable motor.
Nidec Motor Corporation

System and managing heterogeneous data for cloud computing applications

A method, system, and computer-readable storage medium for managing heterogeneous data for cloud computing applications are disclosed. For example, a method involves identifying data to be used by an application.
Nimbix, Inc.

Migrating cloud resources

First resources of a first cloud, a first dependency between the first resources, and second resources of a second cloud may be automatically discovered. Second resources of a second cloud may be discovered.
Hewlett Packard Enterprise Development Lp

Data copy storage method, terminal apparatus, and server apparatus

Provided are a data replica storage method, a terminal apparatus, and a server apparatus, which help to improve the reliability of a distributed data storage system without a central node and reduce an amount of migrated data when the number of nodes of the system changes. The method comprises: for each data replica to be stored, selecting child nodes level by level from a pre-selected intermediate node until a leaf node according to a tree-structured a distributed data storage system without a central node, and determining the leaf node as a target storage position of the data replica, selection of a child node comprising: combining an identification of data to be stored and an identification of a child node into a host image, obtaining a mapping value related to the child node using a preset mapping mode, selecting a sub-node of a central node according to the mapping value, and resetting a mapping relationship before each time when the child node is selected; and storing all data replicas to be stored at the target storage positions of the data replicas..
Beijing Jingdong Century Trading Co., Ltd.

Peer-to-peer enabled activation

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for peer-to-peer device activation. In one aspect, a method includes receiving, at a first user device associated with a first user account, an invitation to claim a second user device.
Google Inc.

Techniques for metadata-driven dynamic content serving

Metadata content is stored as a source instance. The metadata content is utilized to provide dynamically-constructed pages.
Salesforce.com, Inc.

System and distributing web events via distribution channels

A system, method, and computer program for distributing web events via distribution channels are provided. A web event is established in an origination channel.
Brighttalk Limited

Server-side path reference systems and methods

Various embodiments herein each include at least one of systems, methods, and software for server-side path reference. One server-side path reference embodiment in the form of a method includes receiving a request for a specific content item, such as a user interface or document, via a network interface device from a requestor.
Sap Portals Israel Ltd.

Content storage and identification

Content intended for delivery to one or more consuming users may be recorded by a content distribution system. The recording or archival of the content may allow users to retrieve the content at a later time without providing specific instructions to record the content.
Comcast Cable Communications, Llc

Synchronising playing of streaming content on plural streaming clients

It is presented a method for synchronising playing of streaming content between an initiating streaming client and a following streaming client. The method is performed by the initiating streaming client and comprises the steps of: initiating streaming of a media stream of the streaming content to the initiating streaming client; determining a session start time after which the media stream is to be started to be played by any client having access to the session start time; and sending a streaming info message for distribution to the following streaming client, the streaming info message comprising an identifier of the streaming content and the session start time..
Telefonaktiebolaget Lm Ericsson (publ)

Analyzing reading metrics to generate action information

Data reports are received from a plurality of clients including action reports and timing reports. Action reports describe actions performed by users of the clients at location within an ebook.
Google Inc.

Network-assisted fabric pairing

Systems and methods for joining a device to a fabric using an assisting device include an indication to add a joining device to a fabric. If the joining device supports network-assisted fabric pairing, a first connection is established between a commissioning device and the assisting device.
Google Inc.

Methods and graphical user interface environment for creating threat response courses of action for computer networks

A graphical user interface provides network security administrators a tool to quickly and easily create one or more courses of action for automatic response to a network threat. The courses of action are hardware and system agnostic, which allows a common response task to be implemented by an underlying response engine for any or multiple similar-function devices regardless of brand or version.
Invotas Cyber Solutions, Inc.

Phishing and threat detection and prevention

A threat detection system receives links from emails opened in web browsers. The received links are compared with a whitelist of trusted links and blacklisted links associated with security threats.
Salesforce.com, Inc.

Random identifier generation for offline database

Various embodiments of the present technology involve creating a secure unique identifier for a content item to be used in a synchronized content management system while off-line with the synchronized content management system. In some embodiments, securing the unique identifier involves generating a random key and applying a hash function to an input to generate a hash.
Dropbox, Inc.

Network based intervention

Methods and systems for network-based intervention are disclosed. The methods can include receiving a user response and analyzing the user response and other user data to determine a user typology.
Pearson Education, Inc.

Systems and methods for dynamic network security control and configuration

A computer-implemented method according to one embodiment of the present disclosure includes identifying, by a computer system, an asset associated with a logical zone; detecting a change in an attribute of the asset; and in response to detecting the change in the attribute of the asset, modifying, by the computer system, a configuration setting for a firewall. Among other things, the embodiments of the present disclosure can perform dynamically configure and control security features in response to changes in the computing environment, including asset attribute changes, security events, operational events, user input and environmental changes.
Catbird Networks, Inc.

Computer asset vulnerabilities

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network path between computer assets. One of the methods includes receiving an asset topology that includes an identifier for each computer-related asset that may be an entry point for an attack simulation, receiving threat data that identifies vulnerabilities of computer-related assets, determining a first computer-related asset that may be an entry point for an attack simulation, identifying one or more first vulnerabilities of the first computer-related asset, determining a path from the first computer-related asset to a second computer-related asset, determining one or more second vulnerabilities of the second computer-related asset, determining a probability that the second computer-related asset will be compromised by an adversary, and determining a change to the asset topology to reduce the probability that the second computer-related asset will be compromised by an adversary..
Accenture Global Services Limited

Detection of potential security threats based on categorical patterns

A metric value is determined for each event in a set of events that characterizes a computational communication or object. For example, a metric value could include a length of a url or agent string in the event.
Splunk Inc.

Selecting from computing nodes for correlating events

In response to determining that an event matches a condition of a rule, a given one of a plurality of computing nodes is selected to send the event, based on one or both of an attribute of the event and an identifier of the rule. Information of the event is sent to the given computing node to perform correlation of the event with another event..
Hewlett Packard Enterprise Development Lp

Method and system for network resource attack detection using a client identifier

Methods, systems, and techniques for network resource attack detection using a client identifier. A server receives from a device the client identifier and user credentials.
Wizard Tower Technoservices Ltd.

Analyzing network traffic based on a quantity of times a credential was used for transactions originating from multiple source devices

A device may receive network traffic information, associated with multiple transactions, that indicates, for each transaction of the multiple transactions, a credential and a source device identifier associated with the transaction. The device may determine, based on the network traffic information, a quantity of times that a common credential was used in two transactions occurring at different times and originating from different source devices.
Verizon Patent And Licensing Inc.

Methods and systems for blocking malware attacks

User identities, password, etc. Represent the barrier between a user's confidential data and any other third party seeking to access this data.

Apparatus, system and method

There is disclosed apparatus operative to provide intermediary gateway control for access to an item stored on a third party shareable data store, the apparatus operative to receive identification data identifying a first user having share access control to one or more items stored on a third party shareable data store. The apparatus is further operative to establish access rights to the third party shareable data store utilising access rights of the first user for accessing the one or more items on the third party shareable data store; and store the access rights in a first user data structure.
Sharewell Ltd

Data resource control data structure and method

Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving an authorization request from a device to utilize a protected resource within a datastore.
Cloudmode, Llc

Discovery of federated logins

A system includes download location information in an unprotected uniform resource locator (“url”), where the download location information identifies a download location for downloading an application provided by a cloud system. The system further includes login server information in the unprotected url, where the login server information identifies a login server that is configured to be logged in before downloading the application from the download location.
Oracle International Corporation

Mobile operator profile management delegation

Mobile communications devices are managed by an enterprise operating an enterprise server. The enterprise server receives data indicative of identities of mobile communications devices.
Microsoft Technology Licensing, Llc

Service to provide notification of mailing address changes

A method of managing access to a physical mailing address using a virtual mailing address is presented. The method includes: setting up a proxy system as a server, assigning, by a server, a virtual mailing address identifier to natural or juristic person that registers with the server; linking, by the server, a physical mailing address entered by the user to the virtual mailing address identifier to generate the virtual mailing address; and enabling, by the server, a second natural person to manually access the physical mailing address when the server determines that the second user has permission to access the virtual mailing address; enabling, by the server, an institute or business (juristic person) to access the physical mailing address automatically using an application programming interface (api) through a computer system when the server determines that the second user has permission to access the virtual mailing address..
International Business Machines Corporation

Isolating network resources in a virtualized environment

Embodiments of the disclosure provide techniques for isolating network resources in a virtualized environment. A method is provided that includes identifying a security context data structure including a first security context label, a resource identifier and a plurality of access types.
Red Hat, Inc.

Managing social network accessibility based on age

When a user having an age less than a threshold age (a child user) attempts to access an online service or perform actions using the online service, the online service obtains parental authorization from an additional user having a parental relationship to the user. The child user may identify the user having the parental relationship and the online service verifies the validity of the identified user's account, the age of the identified user, and/or a connection between the identified user and the child user having a parental relationship type.
Facebook, Inc.

Heterogeneous clustered anti-pass back host processing system and method

A heterogeneous clustered anti-pass back host processing system and method are provided in which different forms of an apb feature can co-exist and be processed by a single heterogeneous host system. Some methods can include a heterogeneous host system receiving a triggering signal from a first access controller in a plurality of access controllers irrespective of a type of anti-pass back feature associated with the first access controller, the heterogeneous host system identifying all areas referenced by the first access controller, a type of anti-pass back feature associated with each of the areas referenced by the first access controller, and a least restrictive type of the identified anti-pass back features, and the heterogeneous host system transmitting an anti-pass back status update message to access controllers in the plurality of access controllers in accordance with rules of the identified least restrictive type of anti-pass back feature..
Honeywell International Inc.

Cloud device identification and authentication

Methods and apparatuses for authentication and/or provisioning of wireless network devices, and in particular, methods and apparatuses for authentication and/or provisioning of wireless network devices that are communicating with and may be monitored and/or controlled by a remote (e.g., cloud) server.. .

Hardware root of trust (hrot) for software-defined network (sdn) communications

A software-defined network (sdn) determines hardware trust for sdn communications. A probe system transfers probe packets having an originating address, destination address, and hardware root-of-trust (hrot) reporting parameter.
Sprint Communications Company L.p.

Efficient browser-based identity management providing personal control and anonymity

A system allows a reliable and efficient identity management that can, with full interoperability, accommodate to various requirements of participants. For that a system is presented for providing an identity-related information about a user to a requesting entity.
International Business Machines Corporation

Crypto captcha and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems

The crypto captcha and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems (“socoact”) transforms login request, external feature add request, verification response inputs via socoact components into verification request, verification confirmation outputs. An external feature add request that identifies an external feature may be obtained from an authenticated user.
Fmr Llc

Secure element authentication

Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents.
Microsoft Technology Licensing, Llc

Confidence-based authentication

Disclosed are various embodiments that perform confidence-based authentication of a user. An identification of a user account is obtained from a user, and a minimum confidence threshold is determined.
Amazon Technologies, Inc.

System and secure personal identification

A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The system consisting of at least one client device associated with a user, at least one inquiring device associated with a host, a client information server and a network.

System and secure personal identification

A system and method for securely and automatically identifying users to an inquirer for purposes of obtaining user identifying information is described. The system consisting of at least one client device associated with a user, at least one inquiring device associated with a host, a client information server and a network.

Pre-delivery authentication

Pre-delivery authentication may be required prior to routing and delivery of electronic content. A sender of the electronic content, for example, may require that a recipient authenticate to ensure legitimate use or identity.
At&t Intellectual Property I, L.p.

Method, apparatus, and system for secure authentication

An apparatus and method allowing secure authentication between an application platform and a service invoker. The method includes generating, by the service invoker, a first signature based on a locally stored token, adding, by the service invoker, the first signature and an identification of the service invoker to a service invocation request, and transmitting, by the service invoker, the service invocation request to the application platform for secure authentication based on the first signature and the identification of the service invoker.
Alibaba Group Holding Limited

Domain joined virtual names on domainless servers

Services from domainless machines are made available in a security domain under a virtual name. Each machine is not joined to the domain but can reach a security domain controller.
Microsoft Technology Licensing, Llc

Search result relevance based on user account information

Techniques include receiving a search query from a user device, determining native applications that are installed on the user device and associated with user accounts, and identifying app state records based on the search query and the applications. Each app state record includes an application access mechanism (aam) and application state information (asi).
Quixey, Inc.

Storage of captured sensitive data with bypass of local storage

The claimed subject matter includes techniques for storing sensitive data. An example system includes a processor and a computer-readable memory storage device storing executable instructions that can be executed by the processor to cause the processor to send authentication credentials to a service to request authorization to store sensitive data with the service.
Microsoft Technology Licensing, Llc

Systems and methods for authenticating credentials when establishing secure communication connection sessions

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning of communication sessions when activities are terminated are also disclosed.
Unisys Corporation

Systems and methods for modifying access credentials using impersonation in computer systems

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning of communication sessions when activities are terminated are also disclosed.
Unisys Corporation

Enhanced security for registration of authentication devices

A system, apparatus, method, and machine readable medium are described for enhanced security during registration. For example, one embodiment of a method comprises: receiving a request at a relying party to register an authenticator; sending a code from the user to the relying party through an authenticated out-of-band communication channel; and verifying the identity of the user using the code and responsively registering the authenticator in response to a positive verification..
Nok Nok Labs, Inc.

Group membership block chain

A system and method for achieving authorization in confidential group communications in terms of an ordered list of data blocks representing a tamper-resistant chronological account of group membership updates. This method permits ad-hoc and decentralized group definition, dynamic and decentralized membership updates, open sharing, tamper resistance, and tracking of membership history.
Cisco Technology, Inc.

Document tracking on a distributed ledger

An apparatus for use in electronic document control includes a storage device a processor coupled to the storage device. The storage device storing software instructions for controlling the processor that when executed by the processor configure the processor to: receive a signal representing data including an original document, append a unique identifier to the original document to generate a modified document, generate a hash value of the modified document, and transmit the hash value corresponding to the modified document to an electronic distributed ledger..
Td Bank Group

Apparatus, system and method

There is disclosed apparatus operative to provide intermediary gateway control for access to an item stored on a third party shareable data store, the apparatus operative to receive identification data identifying a first user having share access control to one or more items stored on a third party shareable data store. The apparatus is further operative to establish access rights to the third party shareable data store utilising access rights of the first user for accessing the one or more items on the third party shareable data store; and store the access rights in a first user data structure.
Sharewell Ltd

Re-programmable secure device

A re-programmable wireless device can store data securely and use near field communication (nfc) to exchange functionality data and/or program code from a central server system through a mobile device. A user requests a new re-programmable wireless device or a new re-programmable wireless device function via an application on the mobile device.
Google Inc.

Method and secure energy delivery

A solar power conversion device embedded security module creates trusted metering data in relation to power generated and outputs it as metering data. The security module might be constructed as an ic card using semiconductor chip fabrication and assembly techniques integral with the solar power conversion device.
Trusted Renewables Limited

Mapping and obscuring digital representations of a number of user accounts on a social network map

Mapping and obscuring digital representations of a number of user accounts on a social network map includes identifying a primary user account from a number of user accounts of a social network, determining, based on metadata associated with the user accounts, a relationship for each of the user accounts relative to the primary user account, mapping, based on the relationship for each of the user accounts relative to the primary user account, a digital representation of each of the user accounts to a territory on a social network map, determining, based on the relationship for each of the user accounts relative to the primary user account, an obscurity level for each of the user accounts, and obscuring, based on the obscurity level, the territory associated with the digital representation of each of the user accounts on a social network map from the primary user account.. .
International Business Machines Corporation

Selectively performing man in the middle decryption

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for selectively performing man in the middle decryption. One of the methods includes receiving a first request to access a first resource hosted by a server outside the network, determining whether requests from the client device to access the first resource outside the network should be redirected to a second resource hosted by a proxy within the network, providing a redirect response to the client device, the redirect response including the second universal resource identifier, establishing a first encrypted connected between the client device and the proxy hosting the second resource, and a second encrypted connection between the proxy hosting the second domain and the server hosting the first resource, and decrypting and inspecting the encrypted communication traffic passing between the client device and the server hosting the first resource..
Iboss, Inc.

Transfer of a domain name through mobile devices

A domain name may be transferred from a donor account to a recipient account at a registrar using a donor mobile device and a recipient mobile device that may be in close proximity to each other. An application on the donor mobile device may send a donor request to an application on the recipient mobile device identifying the domain name.
Go Daddy Operating Company, Llc

Method for posing requests in a social networking site

A method poses requests in a social networking site by a submitting user by a terminal connected to a communication network to a previously unknown group of receiving users is disclosed. A relationship data model is provided which comprises objects linked to each other by semantic and/or a social relations.
Siemens Aktiengesellschaft

Privacy aligned and personalized social media content sharing recommendations

Systems and methods are provided that facilitate selecting videos to share in a messaging session. A system is provided that includes an accessible data mining component configured to generate a first set of data associated with a messaging session between a user and one or more other user, the first set of data excluding data that is inaccessible to the user and comprising data that is accessible to the user, and an identification component configured to identify a set of media items based on the first set of data.
Google Inc.

Autogeneration of application for a social network

A method for generating an application for sharing with users of a social network includes identifying a community for sharing community content related to a topic of interest. The community is associated with a social network accessed over a network.
Google Inc.

Dynamic communication participant identification

In one embodiment, a method includes receiving an identifier for a first user initiating a communication between a first device associated with the first user and a second device associated with a second user, retrieving, using the identifier, a privacy rule associated with the first user, determining, based on the privacy rule and social-networking information associated with the first user, whether one or more items of information associated with the first user are allowed to be revealed to the second user, and sending, to the second device, any of the items of information associated with the first user that are allowed to be revealed to the second user for display in association with the communication between the first device and the second device.. .
Facebook, Inc.

Systems and methods for invoking chatbots in a channel based communication system

Disclosed systems and methods join a user to pre-existing primary communication channels based upon the information obtained from a user profile. Each channel hosts a different plurality of users and facilitates electronic communication between a corresponding enterprise data source and a remote user device associated with the user.
Pypestream Inc.

Message queue replication with message ownership migration

The method including receiving, at a first node of a plurality of computing nodes, a message ownership migration request for a first message. The message ownership migration request can originate from a second node of the plurality of computing nodes.
60east Technologies, Inc.

Flood disable on network switch

Techniques related to network switch flooding are described. In one aspect, a network switch may receive a plurality of node identifiers.
Hewlett Packard Enterprise Development Lp

Resource notification method, device and system

The embodiments of the present document disclose a resource notification method, device and system. The method includes: receiving, by a local common service entity (cse), first indication information transmitted by an application entity (ae) of an application node, herein the first indication information includes an identity of a remote cse which needs to be notified and an address of an original resource; and finding, by the local cse, a search tag attribute of the original resource according to the address of the original resource in the first indication information, and making a response to the first indication information according to a state of the search tag attribute..
Zte Corporation

Method and system for identifying network resources

The disclosure relates to a method (50) performed in a distributed cloud network (1) for identifying a network resource of the distributed cloud network (1), wherein the distributed cloud network (1) is divided into a hierarchical distributed system comprising at least a first domain. The method (50) comprises receiving (51), in a first network node (11), a request from a client device (2) for a network resource to be used in providing a service, the request comprising at least one criterion relating to the network resource; resolving (52), in the first network node (11), a first part of the request, the first part corresponding to a first criterion relating to the network resource, thereby identifying one or more domains each comprising at least one network resource fulfilling the first criterion, and sending (53), from the first network node (11) to the client device (2), the one or more identifications corresponding to a respective one or more network resource fulfilling the at least one criterion.
Telefonaktiebolaget Lm Ericsson (publ)

Protocol type identification method and apparatus

The present invention relates to a protocol type identification method and apparatus. The method includes: acquiring a data packet transmitted on a connection that is established between a user terminal and a server; if multidimensional user information corresponding to the user terminal exists in a multidimensional user information table, performing, according to information that is identified by the found multidimensional user information and about all connections that are currently established by the user terminal, multidimensional user information based protocol type identification on the connection; and if the multidimensional user information corresponding to the user terminal is not found, performing, according to a packet characteristic of the data packet, data flow based protocol type identification on the connection on which the data packet is transmitted..
Huawei Technologies Co., Ltd.

Redirection ip packet through switch fabric

A method for redirecting internet protocol (ip) packets from a packet redirect source to a packet redirect destination through a switch fabric of ethernet switches is disclosed. At the packet redirect source, the topological location and the identifier of the packet redirect destination are put in a first set of bits and a second set of bits of the destination media access control (mac) address field of the packet to be redirected.
Luxar Tech, Inc.

Service application with learning capability

The present invention relates to a method, by a target node classification entity (100), to control an application of a service providing module (50) to a data packet flow, wherein the data packet flow is transmitted to a target node (310, 320) through a service network where the service providing module (50) applies a service to the data packet flow. The method comprises the following steps: first, from a flow classification entity (40), flow classification data about the data packet flow is received, the flow classification data including at least a flow classifier classifying the data packet flow, a flow identifier uniquely identifying the data packet flow, and a target node address to which the data packet flow is addressed.
Telefonaktiebolaget Lm Ericsson (publ)

Method, apparatus, and system for load balancing of service chain

A method, an apparatus, and a system are provided for load balancing of a service chain. The method includes: receiving, by a flow classifier, a service chain selection and control policy sent by a policy and charging rules function pcrf unit; hashing, by the flow classifier according to a hash quantity, a service flow corresponding to a service chain identifier, to obtain multiple subflows, and adding the service chain identifier and hashing factors to packets of the subflows, where different subflows correspond to different hashing factors; and sending, by the flow classifier, the packets of the subflows after the service chain identifier and the hashing factors are added, to a forwarding device..
Huawei Technologies Co., Ltd.

Dynamic group multipathing

The present disclosure is directed to a system and method for dynamic and adaptive load balancing. An example method includes receiving, at a network device, a data packet to be sent via one or more aggregation groups, where the aggregation groups each comprise a plurality of aggregate members.
Broadcom Corporation

Dynamic lsp resizing in a gmpls mesh network

A method to dynamically resize an lsp without releasing it includes: establishing a first path through a network from a first device to a second device; receiving a request to resize the first path; establishing a second path identical to the first path; simultaneously transmitting communication signals on the first path and the second path; and switching all communication signals from the first path to the second path.. .
Infinera Corporation

Segment routing label switch paths in network functions virtualization communications networks

A method is provided in one example embodiment and includes receiving a request to create a path through a network, wherein the path originates on a first network device and terminates on the second network device; identifying a first controller associated with the first network device, wherein the first controller proxies control plane functions for the first network device; identifying a second controller associated with the second network device, wherein the second controller proxies control plane functions for the second network device; and computing the path using the first controller as a source and the second controller as a destination. The first controller installs the computed path on the first network device and the second controller installs the computed path on the second network device..
Cisco Technology, Inc.

Systems and methods for identifying interconnections among physical-layer cross-connect switches

Presently disclosed are systems and methods for identifying interconnections among physical-layer cross-connect switches. One embodiment takes the form of a method of discovering external connections among a plurality of interconnected physical-layer cross connects (plccs).
Xcelor Llc

Static route configuration for logical router

Some embodiments provide a method for implementing a logical router in a logical network. In some embodiments, the method receives a configuration of a static route for the logical router, which includes several routing components with separate routing tables.
Nicira, Inc.

Locating traffic origin in a network

The switch port at which traffic associated with a specified media access control (mac) address originates is searched for in a local area network (lan). One or more switches receive a broadcast discovery message on a lan subnet.
Adtran, Inc.

Method and system for debugging in a software-defined networking (sdn) system

Temporal matching based debugging methods are disclosed. In one embodiment, the method is implemented in a software-defined networking (sdn) controller coupled to a sdn system.
Telefonaktiebolaget L M Ericsson (publ)

Systems and methods for managing network health

Implementations described and claimed herein provide systems and methods systems and methods for managing network health, including optimizing a network. In one implementation, an alarm list for a subnetwork of a telecommunucations network is obtained.
Level 3 Communications, Llc

Systems and methods for websphere mq performance metrics analysis

Systems and methods for the computer-automated mining and profiling of server monitoring data and related information are disclosed. Performance monitoring is performed through system commands and queries against particular software components arranged in a particular way that provides comparative information for the management and optimization of server and software resources through the identification of constraints and bottlenecks.
Txmq, Inc.

Method and system for transaction diagnostics

A method at a network element for monitoring, at the network element, transactions between the network element and at least one client device; applying rules to each transaction; and performing at least one of parsing, storing, or discarding each transaction based on the rules. Further, a method at a client device including storing a session identifier; generating a transaction message; adding the session identifier and a transaction identifier to the transaction message; and sending the transaction message with the session identifier and transaction identifier to a server..
Blackberry Limited

Method and systems to reduce filter engine rules for network packet forwarding systems

Methods and systems to reduce filter engine rules for network packet forwarding systems are disclosed. In part, the disclosed embodiments process packet filters to identify certain properties which, if present, allow for techniques to be applied to avoid generating rules that do not contribute to the real-time operation of the packet forwarding system.
Ixia

Method and device for managing resources with an external account

Method and device for managing cloud computing resources with an external account, the resources being associated with one or more internal main accounts. The method includes verifying an identity of the external account via a server, determining, if the identity of the external account is verified, whether a virtual sub-account is bound to the external account, the virtual sub-account being subordinate to an internal main account of the one or more internal main accounts, and allowing, if it is determined that the virtual sub-account is bound to the external account, the external account to manage the resources associated with the internal main account based on pre-configured rights of the virtual sub-account..
Alibaba Group Holding Limited

Core network analytics system

A method may include determining first network data corresponding to a first time period, including alarm data and incident data collected by a set of network devices of a core network during the first time period. The method may include creating, based on the first network data, an incident prediction model.
Accenture Global Services Limited

Method of and system for managing computing resources

According to one example of the present invention there is provided a method of managing a set of computing resources accessible to a client via a network. The method comprises monitoring computing resources of the set of computing resources and managing the computing resources in accordance with a set of computing resource guidelines.
Hewlett Packard Enterprise Development Lp

Automated electronic computing and communication system event analysis and management

Systems, apparatuses, and methods for automatic automated electronic computing and communication system event analysis and management are disclosed. Automatic automated electronic computing and communication system event analysis and management may include identifying an event, generating a computer readable representation of the electronic computing and communication system using automated topology enumeration, identifying an element of the electronic computing and communication system based on the representation, identifying a metric for the element, automatically investigating to determine a value for the metric, generating a remediation priority for the element based on a metric weight associated with the metric and a network layer value associated with a network layer associated with a network layer role associated with the element, and generating a graphical representation of the electronic computing and communication system indicating the remediation priority..
Servicenow, Inc.

Systems and methods for managing network health

Implementations described and claimed herein provide systems and methods systems and methods for managing network health, including alarm reduction in a subnetwork. In one implementation, an alarm list is received.
Level 3 Communications, Llc

Phase noise estimation

Methods, systems, devices, and apparatuses are described for phase noise estimation. A transmitting device identifies a phase noise metric associated with a receiving device.
Qualcomm Incorporated

Method and system for vxlan encapsulation offload

A method for virtual extensible local area network (vxlan) encapsulation. The method includes receiving a first augmented mac frame on a first ingress port of a first network device, where the first augmented mac frame includes a first egress port id (epid), a first ingress port id (ipid), and a first mac frame.
Arista Networks, Inc.

Method for controlling device and the device thereof

A method for controlling a device is provided. The method includes: receiving operation mode configuration information broadcast by a wearable device, in which the operation mode configuration information contains a device identifier corresponding to the wearable device; obtaining an operation parameter corresponding to the device identifier; and operating according to the operation parameter.
Xiaomi Inc.

Method and system for managing user location information in a communication system

A system that incorporates the subject disclosure may include, for example, receive a subscription from an application server where the subscription identifies a session event and/or sub-events occurring in a communication session for which the application server requests user location information, provide subscription information based on the subscription to core network nodes of the mobile communications network, receive user location information from the core network nodes responsive to a detection of a triggering event corresponding to the session event of the subscription, and provide the user location information to an ip multimedia subsystem network for delivery to the application server. Other embodiments are disclosed..
At&t Intellectual Property I, L.p.

Physically unclonable function generating systems and related methods

A physically unclonable function generating system and related methods. Implementations may include comparing at least one physical parameter of a memory cell with a threshold value of the physical parameter and identifying a relationship of the at least one physical parameter of the memory cell to the threshold value.
Arizona Board Of Regents Acting For And On Behalf Of Northern Arizona University

Device birth certificate

A device identification is generated for a programmable device. A security key is generated to protect a content of the programmable device.
Data I/o Corporation

Secure escrow service

A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys.
Apple Inc.

Block acknowledgement for multi-user transmissions in wlan systems

In wireless communications for multi-users, a station may generate a first frame and transmit the first frame to an access point. The first frame may include media access control protocol data units (mpdus).
Newracom, Inc.

Apparatus and generating scrambling codes for repetition transmissions

The present application describes solutions to initialize an initial state of a scrambling sequence generator in a wireless network requiring a number of repetitive transmission of control and/or data, signals, in order to maximize radio coverage and reduce interference. Methods and apparatus are provided for efficient scrambling code generation in a wireless network.
Spreadtrum Hong Kong Limited

Spectrum sleuth

A method for monitoring radio frequency (rf) transmitters in an environment, that fits a probability mixture model (pmm) comprising a plurality of probability density functions (pdfs) at least two of which are of a different type, to rf power measurements of rf signals received in the environment to determine a number and characteristics of rf transmitters operating in the environment.. .
Microsoft Technology Licensing, Llc.





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.


6.2738

file did exist - 9222

0 - 1 - 221