FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Den patents



      
           
This page is updated frequently with new Den-related patent applications. Subscribe to the Den RSS feed to automatically get the update: related Den RSS feeds. RSS updates for this page: Den RSS RSS


Date/App# patent app List of recent Den-related patents
08/21/14
20140237683
 Expression enhancing intron sequences patent thumbnailExpression enhancing intron sequences
The invention relates to methods for the identification and use of introns with gene expression enhancing properties. The teaching of this invention enables the identification of introns causing intron-mediated enhancement (ime) of gene expression.
08/21/14
20140237681
 Methods and compositions for targeted polynucleotide modification patent thumbnailMethods and compositions for targeted polynucleotide modification
A variety of methods and compostions are provided, including methods and compositions for targeted modification of a specific target site in a cell or organism, methods for integrating polynucleotides of interest, methods to assess promoter activity, directly select transformed organisms, minimize or eliminate expression resulting from random integration into the genome of an organism, such as a plant, remove polynucleotides of interest, combine multiple transfer cassettes, invert or excise a polynucleotide, silence a gene, and identify and/or characterize transcriptional regulating regions. The methods involve the introduction of a cell proliferation factor and a double-strand break-inducing enzyme into an organism..
08/21/14
20140237679
 Genetic loci associated with fusarium ear mold resistance in maize patent thumbnailGenetic loci associated with fusarium ear mold resistance in maize
The invention relates to methods and compositions for identifying and selecting maize plants with enhanced resistance to fusarium ear mold. Maize plants generated by the methods of the invention are also a feature of the invention..
08/21/14
20140237630
 Screening method patent thumbnailScreening method
The present invention provides a method of screening a mammal for the onset or predisposition to the onset of a neuropsychiatric disorder. More particularly, the present invention provides a method of screening a mammal for the onset or predisposition to the onset of schizophrenia by screening for a decrease in the functional level of protein 14-3-3ζ.
08/21/14
20140237614
 Communication system and method patent thumbnailCommunication system and method
There is provided a system, including a network that is defined by its novel approach to privacy, security and freedom for its users, namely privacy by allowing access anonymously, security by encrypting and obfuscating resources and freedom by allowing users to anonymously and irrefutably be seen as genuine individuals on the network and to communicate with other users with total security and to securely access resources that are both their own and those that are shared by others with them. Functional mechanisms that the system are able to restore open communications and worry-free access in a manner that is very difficult to infect with viruses or cripple through denial of service attacks and spam messaging; moreover, it will provide a foundation where vendor lock-in need not be an issue..
08/21/14
20140237608
 System and method for masking email addresses patent thumbnailSystem and method for masking email addresses
The present invention is directed to a system and method for masking email addresses. In an exemplary embodiment, a consumer responds to a marketing offer by supplying consumer information, including an actual email address, to a lead specialist.
08/21/14
20140237607
 Identifying exploitation of vulnerabilities using error reports patent thumbnailIdentifying exploitation of vulnerabilities using error reports
A tool and method examine error report information from a computer to determine not only whether a virus or other malware may be present on the computer but also may determine what vulnerability a particular exploit was attempting to use to subvert security mechanism to install the virus. A system monitor may collect both error reports and information about the error report, such as geographic location, hardware configuration, and software/operating system version information to build a profile of the spread of an attack and to be able to issue notifications related to increased data collection for errors, including crashes related to suspected services under attack..
08/21/14
20140237601
 Operation of a dual instruction pipe virus co-processor patent thumbnailOperation of a dual instruction pipe virus co-processor
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a content object is stored by a general purpose processor to a system memory.
08/21/14
20140237598
 Reducing the spread of viruses and errors in social networks and affinity groups patent thumbnailReducing the spread of viruses and errors in social networks and affinity groups
An approach is provided to reduce the spread of malware within a group of users. In the approach, a malware program (e.g., virus, trojan, worm, etc.) is detected at a system that is utilized by one of the users that is a member of a peer affinity group.
08/21/14
20140237595
 Apis for obtaining device-specific behavior classifier models from the cloud patent thumbnailApis for obtaining device-specific behavior classifier models from the cloud
The various aspects provide a system and methods implemented on the system for generating a behavior model on a server that includes features specific to a mobile computing device and the device's current state/configuration. In the various aspects, the mobile computing device may send information identifying itself, its features, and its current state to the server.
08/21/14
20140237593
Method, device and system for detecting security of download link
A method, a device and a system for detecting security of a download link are provided. The method comprises: pre-acquiring an information set of download link security (s101); performing a feature matching between information of a download link and content of the information set of download link security (s102); and identifying security of the download link according to a result of the feature matching, and presenting an identification result to a user (s103).
08/21/14
20140237589
Personalization data of an active application
A device to detect biometric information of a user, identify the user based on the biometric information, identify an active application of the device and identify metadata of the active application associated with the user, and modify personalization data of the active application with the metadata associated with the user.. .
08/21/14
20140237587
Managed biometric identity
A computing system such as a game console maintains and updates a biometric profile of a user. In one aspect, biometric data of the user is continuously obtained from a sensor such as an infrared and visible light camera, and used to update the biometric profile using a machine learning process.
08/21/14
20140237584
System and method for redirected firewall discovery in a network environment
A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection.
08/21/14
20140237582
Authenticating a node in a communication network
A method and apparatus for authenticating a first node's identity in a communication network. An authentication node receives from a second node an authentication request.
08/21/14
20140237580
Server system and control method
There is provided a method of a server system including identifying a first token and a second token based on an identifier received from a first external information processing apparatus, acquiring data from the first external information processing apparatus with use of the first token, generating a document from the acquired data, transmitting the second token to an authentication processing apparatus, acquiring a verification result of the second token from the authentication processing apparatus, and transmitting the generated document to a second external information processing apparatus with use of the second token.. .
08/21/14
20140237579
Device for controlling network user data
If required, a user has the option of searching from among the plurality of aliases linked to other users according to attributes which are of interest to the user, for example according to place of residence. The search option is ensured by the provision of an attribute search unit.
08/21/14
20140237578
Location based augmented reality system for exchange of items based on location sensing methods and devices related thereto
Location-based augmented reality systems configured exchange of items based on location sensing and associated triggering icons, and methods and devices related thereto. In one exemplary embodiment, a first, provider user identifies a specific physical location; associates a triggering icon representing a value item with the specific physical location; and, transmits the existence of the triggering icon and specific physical location to a second, mobile recipient user computing device.
08/21/14
20140237576
User authentication method and apparatus based on audio and video data
A computer-implemented method is performed at a server having one or more processors and memory storing programs executed by the one or more processors for authenticating a user from video and audio data. The method includes: receiving a login request from a mobile device, the login request including video data and audio data; extracting a group of facial features from the video data; extracting a group of audio features from the audio data and recognizing a sequence of words in the audio data; identifying a first user account whose respective facial features match the group of facial features and a second user account whose respective audio features match the group of audio features.
08/21/14
20140237574
Methods, systems, and products for identity verification
Methods, systems, and products verify identity of a person. A signature, representing the presence of a device, is acquired.
08/21/14
20140237573
Method and system using a cyber id to provide secure transactions
A method and system for securing a user transaction involving a subscriber unit (“su”) (having a processor, memory, and a display configured to accept user input), a credential information manager (“cim”) (having a processor and memory), and a transaction service provider (“tsp”) (having a processor and memory). A cyber identifier (“cyberid”), a subscriber identifier (“subscriberid”), and subscriber information, each associated with the user, is stored in the cim.
08/21/14
20140237570
Authentication based on social graph transaction history data
Techniques user or user device authentication using data based on social associations and interactions of users or user devices are presented herein. In an aspect, a method includes receiving social graph transaction history data associated with a user identity of a user and contact information associated with the user identity, wherein the social graph transaction history data includes data relating to usage of the contact information for communication between users via respective user devices.
08/21/14
20140237568
Unique identification for an information handling system
A mobile information handling system (ihs) includes an application (app) that may include a unique-identification tool and a device capability determination tool. The unique-identification tool may generate a signature string that is unique to the mobile ihs.
08/21/14
20140237567
Authentication method
An improved authentication method for authenticating user identity for access to a computer service.. .
08/21/14
20140237566
Password audit system
A password audit system is provided for determining the strength of user passwords in a computer system, application or network to which users have access via a user identification and password. The password audit system may include: an interface for establishing a data connection between the password audit system and the computer system, application or network, configured to retrieve cipher text user passwords stored thereon; a central processing unit, configured to successively generate different plain text passwords, encode them into corresponding cipher text passwords, and compare the encoded cipher text passwords to a given one of the retrieved cipher text passwords, until a match is found or a predetermined time has elapsed; and data storage means for storing data relating to the strength of the user passwords, the strength being dependent on the employed method to generate the different plain text passwords and/or the time needed to find a match..
08/21/14
20140237565
Method and system for generation of dynamic password
A method and system of independent generation of dynamic password by a client and a server for subsequent verification of the generated password by either the server or the client is provided. The method includes registration of user id for identification of the client and associating client's related information.
08/21/14
20140237564
Secure access credential updating
One or more first servers may receive a token, generated by a second server based on the second server validating an authorization parameter received by a third server; receive, from the second server, a token parameter, associated with the token and being associated with the authorization parameter and identifying a credential associated with the third server; receive, from the third server, a request to update the credential, the request including the token; validate the token; form an updated credential based on the token parameter and based on validating the token; and provide the updated credential to the third server. The credential may be replaced, by the third server, with the updated credential without interaction with a user of the third server..
08/21/14
20140237563
Online user account login method and a server system implementing the method
The present application provides a webpage login method involving two client devices and a server. The server receives an information access request from a first client device.
08/21/14
20140237562
Authentication system and method
A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access to the secured resource; means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving a response string corresponding to the challenge string; and a means for evaluating the response sting to authenticate the identity of the requestor.. .
08/21/14
20140237560
Security context passing for stateless system management
Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system.
08/21/14
20140237553
Securely updating information identifying services accessible via keys
A first device may receive a service authorization instruction from a second device. The service authorization instruction may include one or more authorization parameters and an instruction to associate or disassociate a key, with a service, to permit or prevent the service to be accessed using the key.
08/21/14
20140237551
Systems and methods for identifying devices by a trusted service manager
Embodiments of the disclosure provide systems and methods for identifying devices by a trusted service manager. According to one example embodiments of the disclosure, a method for identifying communications is provided.
08/21/14
20140237550
System and method for intelligent workload management
The system and method for intelligent workload management described herein may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads, wherein the management threads may converge information for managing identities and access credentials, enforcing policies, providing compliance assurances, managing provisioned and requested services, and managing physical and virtual infrastructure resources. In one implementation, an authentication server may generate authentication tokens defining access credentials for managed entities across a plurality of authentication domains, wherein the authentication tokens may control access to resources in an information technology infrastructure.
08/21/14
20140237544
Authentication method, transfer apparatus, and authentication server
It is provided an authentication method for realizing a network authentication function for an authentication system, the authentication system including an authentication server for authenticating a terminal used by a user, and a switch for mediating an authentication sequence between the terminal and the authentication server. The authentication method includes steps of: providing, by the switch, identification information for identifying the switch to the authentication server in the authentication sequence; authenticating, by the authentication server, an authentication request transmitted from the terminal; transmitting, by the authentication server, an authentication result of the authentication to the switch based on the provided identification information on the switch; and authenticating, by the switch, access from the terminal based on the authentication result received from the authentication server..
08/21/14
20140237543
Method and apparatus for policy-based network access control with arbitrary network access control frameworks
A method and apparatus for integrating various network access control frameworks under the control of a single policy decision point (pdp). The apparatus supports pluggable protocol terminators to interface to any number of access protocols or backend support services.
08/21/14
20140237541
Scalable security services for multicast in a router having integrated zone-based firewall
A multicast-capable firewall allows firewall security policies to be applied to multicast traffic. The multicast-capable firewall may be integrated within a routing device, thus allowing a single device to provide both routing functionality, including multicast support, as well as firewall services.
08/21/14
20140237540
Establishing an interactive environment for rendered documents
A system for identifying an electronic counterpart for a rendered document is described. The system receives an indication of a text capture operation performed from a rendered document.
08/21/14
20140237539
Identity propagation
In one implementation, identity based security features and policies are applied to endpoint devices behind an intermediary device, such as a network address translation device. The access network switch authenticates an endpoint based on a user identity and a credential.
08/21/14
20140237537
Method and technique for application and device control in a virtualized environment
A data loss prevention (dlp) manager running on a security virtual machine manages dlp policies for a plurality of guest virtual machines. The dlp manager identifies a source associated with a file open or create event.
08/21/14
20140237534
Control plane architecture for multicast cache-fill
A multicast content delivery system can use both multicast and unicast streams to efficiently use available bandwidth to deliver content. Available multicast content can be identified to gateways serving consumption devices, and the gateways can receive requests for unicast content deliver, but honor the requests with multicast group sessions..
08/21/14
20140237533
Method and system for managing interactive multimedia content broadcast on television
Method for managing interactive multimedia content designed to be displayed on the screen of a television set (30), this method comprising the following steps—identification of at least one interactive element contained in the interactive multimedia content (10);—labelling of a copy of the identified interactive element;—storage of the labelled interactive element;—provision of the stored interactive element to at least one television viewer.. .
08/21/14
20140237529
Information processing apparatus, information processing method, and program
Identification information “common” that is common to all business operators can be set as an organization id for specifying a business operator providing an application. In addition, when the common identification information “common” is set as an organization id of an acquired xml-ait, an application controller (508) does not judge that an activation of an application corresponding to the xml-ait is unpermitted based on the organization id.
08/21/14
20140237527
Method and apparatus for presenting media programs
A system that incorporates teachings of the present disclosure may include, for example, a controller to collect data indicative of temporal actions initiated by a group of users during presenting a media program. The data indicative of the temporal actions are collected in a collective metadata archive.
08/21/14
20140237520
Content management in a cloud-enabled network-based digital video recorder
This disclosure describes systems and methods related to content management in a cloud-enabled network-based digital video recorder. In some embodiments, a request to view a listing of content assets associated with a user account may be received from a user device.
08/21/14
20140237519
Control device and control method
A device that controls devices in a network includes a storage unit configured to store registration information in which one or more pieces of identification information that identifies a device as a control target from among devices in the network are registered beforehand, and a processor configured to execute a process including detecting devices in the network from a response message in response to a device search message transmitted simultaneously to devices in the network and to extract a device whose identification information is registered in the registration information from among the detected devices, displaying the extracted device in a display device in a selectable manner, and performing a prescribed manipulation on a selected device when the processor detects that a user has selected one of the devices displayed in the display device.. .
08/21/14
20140237516
Capture of stylized tv table data via ocr
In certain implementations consistent with the present invention, a method of detecting text in a television video display table involves saving a frame of video to a memory device; determining that the frame of video contains a table having cells containing text; storing a working copy of the frame of video to a memory; isolating text in the table by: removing any table boundaries from the image; removing any cell boundaries from the image; determining if the image has three dimensional or shadow attributes and removing any three dimensional or shadow attributes identified; thereby producing text isolated against a contrasting color background; and processing the isolated text using an optical character recognition (ocr) engine to extract the text as data. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract..
08/21/14
20140237510
Personalized augmented a/v stream creation
A personalized audio and/or video (av) stream is created for a user. A first stream of av data is selected by reference to predetermined user preferences.
08/21/14
20140237501
Systems and methods for customizing presentation of video content
Systems and methods for customized presentation of video content. In one embodiment, a system includes a processor coupled to one or more data sources that store video content and skip data which identifies potentially objectionable portions of the video content.
08/21/14
20140237499
Simulcast resolution in content matching systems
Example methods disclosed herein to identify media sources include determining whether a first time difference between a first meter signature and a second meter signature associated with presented media is equivalent to a second time difference between a first reference signature determined to match the first meter signature and a second reference signature determined to match the second meter signature, the first and second reference signatures being associated with a first one of a plurality of media sources. Such example methods also include, in response to determining that the first time difference and the second time difference are equivalent, appending the second reference signature to a first tracking segment associated with the first one of the media sources to cause a first time length associated with the first tracking segment to be increased based on at least a respective timestamp associated with the second reference signature..
08/21/14
20140237497
Systems and methods for automated media programming (amp)
Automated media programming (amp) systems and methods are provided. In one embodiment of an amp system, a computer server is communicatively coupled to the internet and provides a website for enabling uploading of media content, sorting the media content, and downloading the media content.
08/21/14
20140237495
Method of providing user specific interaction using device and digital television(dtv), the dtv, and the user device
An interactive method includes displaying image content received through a television (tv) network, identifying an object of interest of a user among a plurality of regions or a plurality of objects included in the image content, and providing additional information corresponding to the object of interest.. .
08/21/14
20140237492
Systems and methods for automated media programming (amp)
Automated media programming (amp) systems and methods are provided. In one embodiment of an amp system, a computer server is communicatively coupled to the internet and provides a website for enabling uploading of media content, sorting the media content, and downloading the media content.
08/21/14
20140237489
Application implementation method and device
One aspect of the disclosure provides an application implementation method. In one embodiment, the method comprises receiving a behavior configuration table of an application to be implemented.
08/21/14
20140237482
Computational resource management
Computational tasks are completed using third-party (user) devices. The tasks are delivered to a computational resource manager (broker) by a task originator.
08/21/14
20140237479
Virtual machine-to-image affinity on a physical server
Techniques, systems, and articles of manufacture for improving virtual machine-to-image affinity on a physical server. A method includes identifying physical machines in a network as candidate source physical machines, wherein each candidate source physical machine stores a first virtual machine image and a set of additional virtual machine images, identifying physical machines in the network as candidate target physical machines, wherein each candidate target physical machine stores one of the additional virtual machine images, and selecting a virtual machine image from the set of additional virtual machine images and selecting a physical machine from the candidate target physical machines such that migrating the selected virtual machine image from a candidate source physical machine to the selected target physical machine results in a maximized image affinity per virtual machine in comparison to each image migration scenarios for the set of additional virtual machine images..
08/21/14
20140237477
Simultaneous scheduling of processes and offloading computation on many-core coprocessors
Methods and systems for scheduling jobs to manycore nodes in a cluster include selecting a job to run according to the job's wait time and the job's expected execution time; sending job requirements to all nodes in a cluster, where each node includes a manycore processor; determining at each node whether said node has sufficient resources to ever satisfy the job requirements and, if no node has sufficient resources, deleting the job; creating a list of nodes that have sufficient free resources at a present time to satisfy the job requirements; and assigning the job to a node, based on a difference between an expected execution time and associated confidence value for each node and a hypothetical fastest execution time and associated hypothetical maximum confidence value.. .
08/21/14
20140237474
Systems and methods for organizing dependent and sequential software threads
Systems and methods are provided for the organization of dependent and sequential software threads running multiple threads of execution on a computing device in order to improve performance and reduce the complexity of thread management. Computing tasks, or jobs, are organized into job wrappers for ordered execution.
08/21/14
20140237470
Virtual machine-to-image affinity on a physical server
Systems and articles of manufacture for improving virtual machine-to-image affinity on a physical server include identifying physical machines in a network as candidate source physical machines, wherein each candidate source physical machine stores a first virtual machine image and a set of additional virtual machine images, identifying physical machines in the network as candidate target physical machines, wherein each candidate target physical machine stores one of the additional virtual machine images, and selecting a virtual machine image from the set of additional virtual machine images and selecting a physical machine from the candidate target physical machines such that migrating the selected virtual machine image from a candidate source physical machine to the selected target physical machine results in a maximized image affinity per virtual machine in comparison to each image migration scenarios for the set of additional virtual machine images.. .
08/21/14
20140237467
Prompting user action in conjunction with tagged content on a social networking system
A social networking system user is prompted to take an action or is provided with additional information associated with a location where the user has checked-in or has associated with content using a tag. When an input including the check-in or tagged location is received, the social networking system selects one or more actions based on the location, the user, and/or contextual information included in the input.
08/21/14
20140237466
User experience and dependency management in a mobile device
A method, system, and device supporting installation of updates to software and/or firmware in memory of an electronic device is described. The update information may be automatically generated based upon a list of all software components or packages already present on the electronic device, and may comprise software components for all dependencies of an application being installed by the update that are not already present on the electronic device..
08/21/14
20140237465
Software download method and software download apparatus
A method for updating game software is performed at a first client device. While a game session related to the game software is running at the first client device, the first client device performs steps including: identifying updating data for the game software and predefined criteria for locating one or more other client devices that possess the updating data; locating at least one second client device in accordance with the predefined criteria; sending an outgoing downloading request to the located at least one second client device; and upon acceptance of the outgoing downloading request by the at least one second client device, downloading the updating data from the located at least one second client device.
08/21/14
20140237459
Method for exploiting massive parallelism
A method of statically testing dependence in a dataflow program is provided, the method comprising receiving a dataflow program which provides parameters, including consumption rates, production rates on connections between actors in the program and a number of initial samples (delays) on the connections, generating from the parameters a model of a precedence graph for the dataflow program representing dependence constraints between distinct firings of the number of actors. For the model, determining a feedback distance between multiple firings of a same actor, determining sets of parallel regions comprising a given number of actor firings of a same actor, composing mutually independent component regions comprising at least a part of the sets of parallel regions, and composing one or more composite regions comprising one or more component regions and/or one or more sets of parallel regions, being composed so that a pre-determined criteria is satisfied..
08/21/14
20140237458
Systems and methods for efficient just-in-time compilation
Systems and methods for just-in-time (jit) code compilation by a computer system. An example method may comprise identifying a defined pattern in a byte stream, evaluating a conditional expression associated with the pattern, and compiling the byte stream into a native code, while excluding, in view of the evaluating, a portion of byte stream associated with the pattern..
08/21/14
20140237452
Call stacks for asynchronous programs
Embodiments provide call stacks for asynchronous programming. A set of all asynchronous call stacks is found by first identifying all threads and all outstanding tasks that have not yet been completed.
08/21/14
20140237447
Method for programming language dependent merging of program codes
Method executed by a computer for automatically merging changes applied to a first modified program code of a program code and to a second modified program code of the program code, both modified program codes being electronically coded and comprising one or more items, the items being items of a specific programming language; the method comprising the steps of determining from each of the program code, the first modified program code and the second modified program code a respective data structure by programming language dependent parsing of the program code, the first modified program code and the second modified program code, thereby obtaining a syntax information of the program code and the first and second modified program code; determining a first data structure difference between the data structure of the program code and the data structure of the first modified program code by comparing items xi in the data structure of the program code with items yj in the data structure of the first modified program code and identifying items ym′ for which no equivalent in the data structure of the program code can be identified, the first data structure difference comprising the items ym′; determining a second data structure difference between the data structure of the program code and the data structure of the second modified program code by comparing items xi in the data structure of the program code with items zj in the data structure of the second modified program code and identifying items zk′ for which no equivalent in the data structure of the program code can be identified, the second data structure difference comprising the items zk′; generating a final program code by including at least one of the items ym′ and/or zk′ in the program code.. .
08/21/14
20140237440
Methods, systems, and articles of manufacture for implementing electronic circuit designs with simulation awareness
Disclosed are methods, systems, and articles of manufacture for implementing electronic designs with simulation awareness. A schematic is identified or created and simulated at the schematic level to characterize the functional behavior of the circuit or to ensure the circuit design meets the required design specifications.
08/21/14
20140237435
Layout method and system for multi-patterning integrated circuits
A method identifies, as an independent node, any node representing a circuit pattern in any odd loop of a layout of a region of a layer of an ic that is not included in any other odd loop of the layout. The layer is to have a plurality of circuit patterns to be patterned using at least three photomasks.
08/21/14
20140237434
Photolithography mask design simplification
A photolithography mask design in simplified. In one example, a target mask design is optimized for a photolithography mask.
08/21/14
20140237430
System and process for roof measurement using aerial imagery
The present disclosure shows creating a first layer and a second layer, in computer memory and substantially overlapping at least a segment of line from said first layer with at least a segment of another line from said second layer. A first non-dimensional attribute is different from said second non-dimensional attribute of the two lines.
08/21/14
20140237425
System and method of using context in selecting a response to user device interaction
A system, method and architecture of using context in determining a response to user interaction with a device, such context may be context of content being output by the device, the device's context, the user's content, or some combination of contexts. In accordance with one or more embodiments, a response may comprise a menu the content of which, e.g., one or more user-selectable actions or options, can be determined based on a determined context, or contexts, or a determination may be made to provide a response other than an option menu, which determination may be made based on a determined context or combination of contexts.
08/21/14
20140237423
Data processing apparatus, data processing system, and non-transitory computer readable medium
A data processing apparatus includes a display control unit that controls browsing document data to be displayed, the browsing document data being configured by plural browsing object data items, a position information acquisition unit that acquires position information, the position information being pointed by a pointing unit and indicating a position corresponding to the browsing document data displayed by the display control unit, a direction identification unit that identifies a direction pointed by the pointing unit, starting from the pointed position, based on a history of a motion by the pointing unit, and an attention data identification unit that identifies attention data indicating browsing object data that is focused, among the plural browsing object data items, based on the position information acquired by the position information acquisition unit and a direction identified by the direction identification unit.. .
08/21/14
20140237421
Intelligent window placement with multiple windows using high dpi screens
The subject technology discloses configurations for determining a minimum dots per inch (dpi) setting for displaying graphical content in a window based on a native pixel density of a display. Respective graphical content is scaled for displaying in a first window based on the minimum dpi setting to fit a horizontal dimension of the first window.
08/21/14
20140237407
User interface navigation utilizing pressure-sensitive touch
An approach is provided to direct data to different applications based upon the amount of pressure applied by a user of a pressure sensitive touch-enabled screen. In this approach, a touch input is received at a location of the pressure sensitive touch-enabled screen.
08/21/14
20140237389
Event listening integration in a collaborative electronic information system
In an embodiment, a computer-implemented data processing method comprises, in a collaborative electronic information management system that is hosted using a collaboration computer, establishing operation of a plurality of event listener units, wherein each of the event listener units is configured to communicate with or listen for a plurality of application events that have been generated by a particular corresponding external application; determining that one or more of the application events relate to a particular content item from among a plurality of content items that are managed in the system; generating and causing displaying, as a part of a graphical user interface of the system for a user account associated with a user computer, a set of notifications comprising one or more first notifications generated from the system and one or more second notifications that are based upon the application events, in association with data identifying the particular content item.. .
08/21/14
20140237388
Two-level processing of approval notifications in a collaborative electronic information system
In another embodiment, a computer-implemented data processing method comprises receiving, in a collaborative electronic information management system that is hosted using a collaboration computer, a plurality of application events that have been generated by a plurality of external applications; determining that one or more of the application events relate to a particular content item from among a plurality of content items that are managed in the system; generating and causing displaying, as a part of a graphical user interface of the system for a user account associated with a user computer, a set of notifications comprising one or more first notifications generated from the system and one or more second notifications that are based upon the application events, in association with data identifying the particular content item; receiving third input indicating selection of an approval control that is displayed in association with the data identifying the particular content item, and in response, updating the tasks-notifications sub panel to indicate an approval of the particular content item; receiving third input indicating selection of an approval control that is displayed in association with the particular notification, and in response, updating the tasks-notifications sub panel to indicate an approval of the particular notification.. .
08/21/14
20140237387
Integrated notifications in a collaborative electronic information system
In an embodiment, a data processing method comprises receiving, in a collaborative electronic information management system that is hosted using a collaboration computer, a plurality of application events that have been generated by a plurality of external applications; determining that one or more of the application events relate to a particular content item from among a plurality of content items that are managed in the system; generating and causing displaying, as a part of a graphical user interface of the system for a user account associated with a user computer, a set of notifications comprising one or more first notifications generated from the system and one or more second notifications that are based upon the application events, in association with data identifying the particular content item.. .
08/21/14
20140237386
Crowdsourced image analysis platform
A crowdsourced search and locate platform, comprising an application server and a client interface application. The application server: receives connections from crowdsourcing participants; navigates a first crowdsourcing participant to a specific geospatial location; sends an image corresponding to the geospatial location to the first crowdsourcing participant; receives tagging data from the first crowdsourcing participant, the tagging data corresponding to a plurality of objects and locations identified by the first crowdsourcing participant.
08/21/14
20140237383
Apparatus and method for handling a message
A system for handling automated messages from a travel supplier includes a messaging client configured to receive an automated message generated by a remote travel supplier. The message comprises a link to a web address for completing a travel action associated with the link.
08/21/14
20140237375
Web-based operating system framework
The disclosure generally describes computer-implemented methods, software, and systems for providing a web-based operating system framework for client devices. One computer-implemented method includes receiving portal login credentials from a client device, analyzing, by operation of a computer, configuration data to determine a desired graphical user interface (gui) for the portal to present on the client device, determining to present a particular web operating system (wos) gui configuration on the client device, displaying a graphical element representing an available application on the determined wos gui configuration, and monitoring the wos for gui interactions associated with the graphical element..
08/21/14
20140237372
System and method for secure unidirectional transfer of commands to control equipment
A system for securely transferring commands to a recipient device. An access interface allows a user to enter a command for the recipient device.
08/21/14
20140237366
Context-aware augmented reality object commands
Embodiments are disclosed that relate to operating a user interface on an augmented reality computing device comprising a see-through display system. For example, one disclosed embodiment includes receiving a user input selecting an object in a field of view of the see-through display system, determining a first group of commands currently operable based on one or more of an identification of the selected object and a state of the object, and presenting the first group of commands to a user.
08/21/14
20140237356
Text input method and device
The present invention relates to a computer-implemented method for inputting text into an electronic device (10). The method includes selecting a first set of candidate words stored in a database.
08/21/14
20140237355
Disambiguation of dependent referring expression in natural language processing
A method for disambiguation of dependent referring expression in natural language processing is provided in the illustrative embodiments. A portion of a document in a set of document is selected, the portion including a set of dependent referring expression instances.
08/21/14
20140237353
Systems, methods and articles to automatically transform documents transmitted between senders and recipients
A document transformation system automatically transforms documents electronically transferred between senders and recipients, even where documents of a given type from a given sender which are assumed to be identically formatted differ in various aspects, for instance in scaling, alignment, concatenating, resizing, etc. Document transformation instructions selected based on sender, recipient, or both specify transformation instructions which include one or more maps, document layouts, page layouts, sections extraction instructions, allowing extraction of data or information, and generation of documents or information in a format specified by recipient.
08/21/14
20140237346
Method and apparatus for importing hyper text markup language (html) web projects into a web content management system
A computer implemented method and apparatus for receiving a web project into a web project management tool, wherein the web project comprises web project source code comprising at least one tag, wherein the at least one tag defines at least one component to be editable; parsing the web project source code on the at least one tag to identify the at least one editable component; displaying the web project, wherein the at least one editable component is marked in a user interface to indicate that the component is editable; receiving at least one modification to the at least one editable component; and displaying the web project with the at least one modification.. .
08/21/14
20140237345
Techniques for validating hierarchically structured data containing open content
Techniques for validating hierarchically structured data according to a collected hierarchical object rule set. The validation techniques account for any open content in the hierarchical object and any downscoped rules in the hierarchical object rule set.
08/21/14
20140237342
System and method for information gathering utilizing form identifiers
A system, apparatus and method for filling forms, including using a graphical capture device, are described herein.. .
08/21/14
20140237340
Dynamic loading of tabular data
Dynamic data loading of tabular data includes identifying a plurality of formulas within tabular data of a document, wherein the tabular data is arranged in cells. Using a processor, a hierarchy for the tabular data is determined according to cell dependencies defined in the formulas.
08/21/14
20140237337
Machine data web
Methods and apparatus consistent with the invention provide the ability to organize and build understandings of machine data generated by a variety of information-processing environments. Machine data is a product of information-processing systems (e.g., activity logs, configuration files, messages, database records) and represents the evidence of particular events that have taken place and been recorded in raw data format.
08/21/14
20140237322
Storage at m bits/cell density in n bits/cell analog memory cell devices, m>n
A method for data storage includes accepting data for storage in a memory that includes multiple analog memory cells and supports a set of built-in programming commands. Each of the programming commands programs a respective page, selected from a group of n pages, in a subset of the memory cells.
08/21/14
20140237318
Bandwidth optimization in a non-volatile memory system
A method of bandwidth optimization in a non-volatile memory system includes: retrieving hard data bits; generating soft information from the hard data bits; applying a lossless compression to the soft information for calculating syndrome bits; and executing a low density parity check (ldpc) iterative decode on the hard data bits and the syndrome bits.. .
08/21/14
20140237315
Method and system for improving data integrity in non-volatile storage
A method for improving data integrity in a non-volatile memory system includes: accessing a non-volatile memory cell for retrieving hard data bits; generating soft information by capturing a reliability of the hard data bits; calculating syndrome bits by applying a lossy compression to the soft information; and generating a host data by executing a low density parity check (ldpc) iterative decode on the hard data bits and the syndrome bits.. .
08/21/14
20140237306
Management device, management method, and medium
A management device comprises a failure detection unit 10 which detects a failure in a plurality of paths connecting servers, on at least one of which a virtual machine operates, with a storage device, a specifying unit 11 which specifies the virtual machine operating on the failed server that is the server connected by the path in which the failure is detected, a redundancy calculation unit 12 which calculates, for each of the servers, a first redundancy degree of the server with respect to the storage device, a selection unit 13 which selects, among the servers, a server having the degree of redundancy higher than the degree of redundancy of the failed server on the basis of the first redundancy degrees of the servers, and a transmission unit 14 which transmits migration instruction information including an identifier of the specified virtual machine and an identifier of the selected server.. .
08/21/14
20140237300
Data processing apparatus and trace unit
A data processing apparatus has processing circuitry for executing program instructions and trace circuitry for generating trace data indicating processing activities of the processing circuitry. The trace circuitry may detect a lockup state of the processing circuitry in which the processing circuitry does not make forward progress of execution of the program instructions.
08/21/14
20140237293
Application monitoring through continuous record and replay
A method, system, and computer-readable storage medium for application monitoring through continuous record and replay are described herein. The method includes continuously recording execution traces including external non-deterministic input data for an application at a user device and analyzing the recorded execution traces to identify relevant execution traces for determining a behavior of the application.
08/21/14
20140237287
Implementing raid in solid state memory
The present disclosure includes systems and techniques relating to implementing fault tolerant data storage in solid state memory. In some implementations, a method includes receiving a data request for a solid state memory; identifying a logical block grouping corresponding to the data request, wherein the logical block grouping indicates physical data storage blocks spanning at least two distinct memory units of the solid state memory; reading stored data and parity information from at least a portion of the physical data storage blocks spanning the at least two distinct memory units; and recovering data of at least one block of the logical block grouping based on the stored data and the parity information..
08/21/14
20140237277
Hybrid performance scaling or speech recognition
Aspects of the present disclosure describe methods and apparatuses for executing operations on a client device platform that is operating in a low-power state. A first analysis may be used to assign a first confidence score to a recorded non-tactile input.
08/21/14
20140237273
Information processing apparatus, information processing method, and program
An information processing apparatus includes: a wakeup-target identifying section configured to identify a wakeup target in response to a wakeup trigger; and a wakeup processing section configured to wake up the wakeup target identified by the wakeup-target identifying section.. .
08/21/14
20140237268
Moisture shutdown control
Aspects of shutdown control of a device in the presence of moisture are described. In one embodiment, a moisture detection signal is received from a moisture detector.
08/21/14
20140237264
Authentication method
According to one embodiment, an authentication method comprising: generating a second key by the first key, the first key being stored in a memory and being prohibited from being read from outside; generating a session key by the second key; generating first authentication information, the secret identification information stored in a memory and being prohibited from being read from outside; transmitting encrypted secret identification information to an external device and receiving second authentication information from the external device, the encrypted secret identification information stored in a memory and readable, the second authentication information generated based on the encrypted secret identification information; and determining whether the first authentication information and the second authentication information match.. .
08/21/14
20140237258
Device and authentication method therefor
According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information..
08/21/14
20140237257
Scalable precomputation system for host-opaque processing of encrypted databases
A method, system, and computer program product to generate results for a query to an encrypted database stored on a host are described. The method includes generating indexes from the encrypted database, each index identifying records of the encrypted database associated with a range of data for at least one field stored in the records of the encrypted database, and generating index metadata associated with each index, the index metadata indicating the range of data identified by the associated index.
08/21/14
20140237250
Registration and network access control
In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client device. In another embodiment, a network interface device can receive a network access request from a client device to access a secure network utilizing extensible authentication protocol (eap), and the request is communicated to an authentication service to authenticate a user of the client device based on user credentials.
08/21/14
20140237249
Device and authentication method therefor
According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information..
08/21/14
20140237245
Device and authentication method therefor
According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information..
08/21/14
20140237244
Device and authentication method therefor
According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the host, second authentication information by calculating the secret identification information generated by decrypting the encrypted secret identification information with the host session key in one-way function operation. The method further includes comparing, by the host, the first authentication information with the second authentication information..
08/21/14
20140237241
Mapping a glyph to character code in obfuscated data
In a font applying device on a client side in a computer system composed of the client and a server, an obfuscated font storing section stores an obfuscated font in which a character different from a character identified by the server based on a character code and having the same width of the character identified by the server is mapped to the character code. An obfuscated document receiving section receives an obfuscated document obtained by obfuscating document data as a result of converting the character code to a character code to which a character identified by the server based on the character code in the document data is mapped in the obfuscated font.
08/21/14
20140237240
Method and systems for the authentication of a user
A computer security system used to identify and authenticate a user. In one aspect, a method for identifying and authenticating a user is provided.
08/21/14
20140237238
Document authentication data embedding method and apparatus
A method of embedding authentication data in an electronic document image is described. Data related to an item of information on an image of at least one page in the electronic document is acquired.
08/21/14
20140237235
Information processing device, information storage device, server, information processing system, information processing method, and program
Content usage control is realized on condition of the establishment of user authentication without having to communicate with a server or the like. An information storage device such as a memory card stores an encrypted content, a converted title key obtained by converting a title key which is an encryption key, and a user token obtained by converting binding secret information to be applied to calculate the title key from the converted title key.
08/21/14
20140237234
Enhanced system security
Methods and systems for maintaining the confidentiality of data provided by an organization for storage on a third party database system are provided. The data can be encrypted on an internal network of the organization and sent to the third party database system for storage.
08/21/14
20140237231
Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program. The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network.
08/21/14
20140237230
Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program the application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers.
08/21/14
20140237229
Bluetooth device as security access key
This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example a key identifier or an instruction to perform an operation, within a personal area network created by the communications circuitry.
08/21/14
20140237228
Smart card renewal
A method includes storing creating a smart card with an expiration date and renewing the smart card after the expiration date. The smart card may be created with data stored upon the smart card for use in the renewal process.
08/21/14
20140237223
System boot with external media
Various aspects of the present disclosure provide for a system that is able to boot from a variety of media that can be connected to the system, including spi nor and spi nand memory, universal serial bus (“usb”) devices, and devices attached via pcie and ethernet interfaces. When the system is powered on, the system processor is held in a reset mode, while a microcontroller in the system identifies an external device to be booted, and then copies a portion of boot code from the external device to an on-chip memory.
08/21/14
20140237188
Electronic information caching
Electronic information is made more readily available to one or more access requestors based on an anticipated demand for the electronic information using a process, system or computer software. For instance, electronic information stored on a first storage medium is identified for transport (e.g., in response to a request of at least one of the access requestors), and the electronic information is transported accordingly.
08/21/14
20140237186
Filtering snoop traffic in a multiprocessor computing system
Filtering snoop traffic in a multiprocessor computing system, each processor in the multiprocessor computing system coupled to a high level cache and a low level cache, the including: receiving a snoop message that identifies an address in shared memory targeted by a write operation; identifying a set in the high level cache that maps to the address in shared memory; determining whether the high level cache includes an entry associated with the address in shared memory; responsive to determining that the high level cache does not include an entry corresponding to the address in shared memory: determining whether the set in the high level cache has been bypassed by an entry in the low level cache; and responsive to determining that the set in the high level cache has not been bypassed by an entry in the low level cache, discarding the snoop message.. .
08/21/14
20140237185
One-cacheable multi-core architecture
Technologies are generally described for methods, systems, and devices effective to implement one-cacheable multi-core architectures. In one example, a multi-core processor that includes a first and second tile may be configured to implement a one-cacheable architecture.
08/21/14
20140237179
Information system and data transfer method of information system
Availability of an information system including a storage apparatus and a host computer is improved. A host system includes a first storage apparatus provided with a first volume for storing data, and a second storage apparatus for storing the data sent from the first storage apparatus.
08/21/14
20140237176
System and method for unlocking additional functions of a module
A system for interfacing with a co-processor or input/output device is disclosed. According to one embodiment, the system performs a maze unlock sequence by operating a memory device in a maze unlock mode.
08/21/14
20140237170
Storage device, and read command executing method
A storage device of the embodiment includes memory, a control section, a table holding section for managing a table for holding an identifier, a logical address, and a data length based on a read command, an issuing section for issuing the logical address and the data length for each identifier to the control section, a buffer for holding data received from the memory along with the identifier, and an identifier queue for receiving the identifier of a number proportional to a data length when the data of the logical address of the same identifier is received in the buffer. The storage device of the embodiment includes a transfer section for transferring the data corresponding to the identifier received in the buffer to outside when the identifier is held as incomplete readout in the table in order from the identifier at a head of the identifier queue..
08/21/14
20140237161
Systems and methods for user configuration of device names
A system includes a device, a bios, and a processor. The bios includes a storage operable to store predefined identifier/user defined name pairs.
08/21/14
20140237137
System for distributing flow to distributed service nodes using a unified application identifier
In one embodiment, a method includes obtaining a flow, identifying an application associated with the flow, and identifying a first unique application identifier (uaid) for the application. The first uaid uniquely identifies the application.
08/21/14
20140237131
Secured communication channel between client device and device management service
Systems and methods are described that comprise issuing a request to a client device from a platform. The request is an electronic message that includes an electronic link.
08/21/14
20140237130
Device management service
Systems and methods are described that comprise receiving at a platform an enrollment request from a client device. The enrollment request comprises a request key and device data of the client device.
08/21/14
20140237129
Service redirection from a policy and charging control architecture
For authorizing redirection services in a policy and charging control architecture, a policy and charging control rules function (pcrf) server determines control rules and redirection information per service in an internet protocol connectivity access network session, and a policy charging and enforcement function (pcef) device receives control rules and redirection information per service basis, determines redirection per service request, and triggers the redirection. Upon a first request for a service, the pcef device returns a redirection message with a redirection identifier; and upon completion of the service redirection, the first request for the service reaching the pcef, the pcef verifies the service is authorized and submits a service allowance toward the service server in charge of the service.
08/21/14
20140237127
Extending sip p-served user header over ims interfaces
The invention provides a method of handling sip messages in an ims core network. The method comprises receiving a first network entity, a first si p message that includes an identification of a served user to which the first sip message relates.
08/21/14
20140237124
Scripting support for data identifiers, voice recognition and speech in a telnet session
Methods of adding data identifiers and speech/voice recognition functionality are disclosed. A telnet client runs one or more scripts that add data identifiers to data fields in a telnet session.
08/21/14
20140237123
System and method of establishing communication between electronic devices
A contactability of a user can be maintained by identifying a secondary device and causing a contact device to establish a communication session with the secondary device when a primary device becomes unavailable. In some embodiments, when a power level of a primary device falls below a threshold, the primary device can identify a secondary device previously associated with the primary device.
08/21/14
20140237118
Application aware elephant flow management
A network device manages elephant flows. The network device filters received network data according to an application-specific criteria and identifies the elephant flow from the filtered network data.
08/21/14
20140237115
Method and system for securely capturing workloads at a live network for replaying at a test network
Methods and system for securely capturing workloads at a live network for replaying at a test network. The disclosed system captures file system states and workloads of a live server at the live network.
08/21/14
20140237114
Method and system for managing servers
A method of managing servers includes at a central server having one or more processors and memory for storing one or more programs to be executed by the processors: obtaining configuration file for clustering servers; classifying each server into one layer of a hierarchical structure based on business logic associated with the server defined in the configuration file; receiving an operation command from an administrator; analyzing the operation command to identify a target server for executing the operation command; and forwarding the operation command to the target server through a path in the hierarchical structure defined in the operation command.. .
08/21/14
20140237109
Techniques for determining a mobile application download attribution
A proxy server and a method for determining a mobile application download attribution are provided. The method includes identifying an application downloaded from an application repository to a mobile device; analyzing previously logged requests sent from the mobile device to identify a most recent request directed to the application repository from the mobile device; analyzing the identified most recent request to detect a source that causes the application download and at least one identifier of the application; determining the download attribution respective of the source that causes the application download; and generating an application metadata respective of the download attribution and the application identifiers.
08/21/14
20140237105
Estimation of user location based upon access patterns
Exemplary methods, apparatuses, and systems store an identifier for a user device when the user device is determined to be accessing a network service and store a time at which the user device is determined to be accessing the network service for each instance of the user device being determined to be accessing the network service. Periods of time during each day of the week in which the user device is likely to accessing to the network service are determined based upon the stored identifier and times.
08/21/14
20140237099
System and method for intermediating between subscriber devices and communication service providers
A system and method are disclosed which may include receiving an activation request from a first subscriber device at a communication convergence platform; identifying a service provider associated the first subscriber device; composing a service activation request compatible with a communication protocol for the identified service provider; and transmitting the service activation request from the platform to the identified service provider.. .
08/21/14
20140237097
Receiving data packets
At least one connection is defined between protocol entities hosted by network nodes in a packet data communication network. Data packets that include information identifying communicating protocol entities are received.
08/21/14
20140237095
Data center node management
A distributed computing system may allow multiple devices to distribute master node responsibilities. The various nodes in the system may be given unique, sequenced, node identifiers, and may periodically report their status to a central monitor or current master node.
08/21/14
20140237085
Communication method of content requester and content provider to provide content and real-time streaming content in content-centric network (ccn) based on content name
Provided is a communication method of a content requester to provide content in a content-centric network (ccn). The method is based on a content name, including generating a content request packet including an identifier indicating a content request based on a predetermined time unit to request content, transmitting the generated content request packet, and receiving segments of the content that correspond to the predetermined time unit.
08/21/14
20140237076
Content management and delivery of on location engagements
A system and method for content management and delivery of on location engagements is disclosed. Content is identified by the use of a beacon at each location of interest.
08/21/14
20140237071
Caching in mobile networks
There is described a method for optimising the distribution of data objects between caches in a cache domain of a resource limited network. User requests for data objects are received at caches in the cache domain.
08/21/14
20140237069
Assigning pre-existing processes to select sets of non-uniform memory access (numa) aligned resources
A system and a method are disclosed for assigning pre-existing processes to select sets of non-uniform memory access (numa) aligned resources. In one example, the method includes receiving, by a processing device, a report indicating a measure of resources available on each respective non-uniform memory access (numa) node of a plurality of numa nodes in a system, and a measure of resources consumed by a first process being executed on a first numa node of the plurality of numa nodes in the system, determining that the first process being executed requires an additional resource, determining whether the first numa node has capacity for the additional resource, when the first numa node does not have the capacity for the additional resource, identifying a second numa node for the first process in view of the report, and binding, by the processing device, the first process to the second numa node..
08/21/14
20140237068
Method, system and server of removing a distributed caching object
The present disclosure discloses a method, a system and a server of removing a distributed caching object. In one embodiment, the method receives a removal request, where the removal request includes an identifier of an object.
08/21/14
20140237055
Electronic message distribution lists
A distribution list identifies a plurality of recipient addresses for electronic messages. Normal updates to the distribution list can be performed via update commands from an authorized address that is stored in association with the distribution list as authorized to update the distribution list.
08/21/14
20140237053
User-generated community publication in an online neighborhood social network
A method of user-generated community publication in an online neighborhood social network is disclosed. In one embodiment, a method comprising generating an online neighborhood social network in which residents are represented as users, and in which residents have associated meta-data indicating at least one of a verified physical location and a privacy setting of the users; automatically generating a community publication based on the article submitted by a community journalist at a periodically occurring interval, wherein the community journalist is a resident of a private neighborhood constrained only to neighbors living in the private neighborhood through the online neighborhood social network; and publishing the community publication in the geospatial environment to targeted users distributable to an electronic location of at least a subset of the targeted users subscribing to the community publication when the electronic location is available in the private neighborhood of the online neighborhood social network..
08/21/14
20140237050
Method for hiding activity group member identification information, server and terminal
A method at a server system includes: grouping multiple users into an activity group, where each user has a unique identifier across different activity groups; generating, for each user of the activity group, a dynamic identifier within the activity group and a mapping between the dynamic identifier and the user's corresponding unique identifier, where the dynamic identifier may identify different users within different activity groups; receiving an operation instruction from a first user of the activity group, the operation instruction including a first unique identifier associated with the first user; identifying a first dynamic identifier associated with the first user within the activity group based on the first unique identifier associated with the first user; associating with the operation instruction the first dynamic identifier associated with the first user within the activity group; and sending the operation instruction and the first dynamic identifier to the users of the activity group.. .
08/21/14
20140237049
Methods and systems for providing a consistent profile to overlapping user sessions
Just in time delivery of a consistent user profile to overlapping user sessions, where a first user session issues a request for a first file of a user profile to a server agent. Upon receiving the request, the server agent retrieves the first file from a base user profile, and just in time delivers the retrieved first file to the first user session.
08/21/14
20140237043
Dynamic stunt cards using user device displays
A server device may receive one or more event instruction schedules. Each of the one or more event instruction schedules may identify one or more events and corresponding instructions.
08/21/14
20140237041
Automatic future meeting scheduler based upon locations of meeting participants
In a network that supports communications between client devices and at least one meeting server, a meeting request that includes one or more meeting constraints to be satisfied is monitored prior to scheduling or initiating a meeting between a plurality of meeting participants associated with respective client devices. At least one meeting constraint includes a location constraint that identifies a location for a client device associated with a meeting participant prior to scheduling or initiating the meeting.
08/21/14
20140237034
Method, apparatus, system and computer readable storage medium of adding instant message contact
There are provided a method, apparatus, system and computer readable storage medium of adding an instant message contact. The method includes: receiving a joining-in request for a group from a client where a user locates, the joining-in request comprising a group identifier; acquiring audio and/or video information of other user in the group, based on the group identifier; and transmitting the audio and/or video information of the other user to the client where the user locates, for adding by the client where the user locates the instant message contact based on the audio and/or video information of the other user.
08/21/14
20140237033
Method, device and mobile terminal for controlling interface display
A method of displaying user interfaces on an electronic device comprising: detecting a first user input to access an application by a first user, including identifying information of the first user. In response to detecting the first user input, determining whether there is confidential data associated with the application cached in memory.
08/21/14
20140237028
Methods, systems and devices for automatic linking of activity tracking devices to user devices
Methods, systems and devices are provided for automatically linking a device to an activity tracking device. One method includes obtaining, at the device, a identifier from a website.
08/21/14
20140237022
Maintaining independent states for multiple web browser instances
A method includes receiving a request for a target web page, the request containing a session identifier (id) associated with an instance of a web browser, and determining if the session id is new or existing. If the session id is new, the method includes creating a window session object, and initializing the window session object with data defining a state of the instance of the web browser.
08/21/14
20140237016
System and method for hand-offs in cloud environments
A system, method, and computer-readable storage medium for handling hand-offs in a cloud computing environment is provided. The method includes identifying, at a cloud governance module of a server device, a plurality of applications executing on a plurality of servers belonging to a plurality of cloud computing service providers.
08/21/14
20140237013
Pseudo-random bit sequence generator
The present invention discloses a pseudo-random bit sequence (prbs) generator which outputs the entire datapath, or entire pseudo-random bit sequence, over one single clock cycle. This is accomplished by removing redundancy, or any redundant exclusive-or gates from linear feedback shift registers; using logic to identify the critical path and optimal shift for the critical path; and dividing the datapath into several pipeline stages to increase the clock rate (i.e., transmission speed)..
08/21/14
20140237009
Servicing database operations using a messaging server
A client computing system publishes a database operation request to a global exchange on an advanced message queuing protocol (amqp) server, wherein the database operation request identifies an operation to be performed on a database using a different application layer protocol. The client computing system obtains database operation result data from a client queue, on the amqp server, that corresponds to the client computing system in response to publishing the database operation request and converts the database operation result data from a wire level format to a data format for the different application layer protocol..
08/21/14
20140237007
Compression and storage of computer aided design data
Systems and methods for access to compressed data. A method includes initiating access to a lightweight data file for selected data and identifying data segments of the lightweight data file that correspond to the selected data.
08/21/14
20140237001
System and method for fast identification of variable roles during initial data exploration
Systems and methods are provided for identifying data variable rules during initial data exploration. In one example, a computer-implemented method of determining a role for a data variable is disclosed.
08/21/14
20140237000
Building an ontology by transforming complex triples
An approach for building an ontology is provided. Syntactically transformed complex triples whose core terms are identified are semantically transformed into simplified triples referring to new conceptualized core terms formed by user selections from a lexical database or by adding a suffix to core terms.


Popular terms: [SEARCH]



Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



1.307

9218

5 - - 163