Follow us on Twitter
twitter icon@FreshPatents


Den patents

      

This page is updated frequently with new Den-related patent applications.




Method to increase server's density in datacenter
A method. A cooling fluid flows through a flexible tube into each rack container including a plurality of rack units via a cooling conduit that encapsulates the flexible tube and is secured at a first port on a top surface of each rack container.
International Business Machines Corporation


Enhancements to terminating access domain selection
A method of determining in an ip multimedia subsystem, ims, network which radio access type, rat, should be used to route a terminating session directed towards a user equipment, ue. The hss receives a terminating access domain selection, t-ads, query from an application server, as, of the ims network, the t-ads query relating to the terminating session and identifying the ue; and determines whether a packet data network gateway, pdn-gw, is registered for the ue.
Telefonaktiebolaget Lm Ericsson (publ)


System and proximity based networked mobile communication
Communication between users of mobile devices is provided based on proximities between the users. Users are given unique identifiers, which are stored on a server, and mobile devices with the unique identifiers broadcast transmissions with their unique identifiers.

Wireless communication method and wireless communication terminal for receiving data from plurality of wireless communication terminals
A wireless communication terminal communicating wirelessly with a base wireless communication terminal and unassociated with the base wireless communication terminal is disclosed. The wireless communication terminal includes: a transceiver; and a processor configured to receive, by using the transceiver, a multi-station block ack frame which indicates whether at least one of mac frames transmitted from at least one of wireless communication terminals is received by using a first field of the multi-station block ack frame for indicating an association identifier corresponding to an association of each of the at least one of wireless communication terminals and the base wireless communication terminal, from the base wireless communication terminal, and determine whether a mac frame transmitted from the wireless communication terminal is received by the base wireless communication terminal based on whether a second field of the multi-station block ack frame includes a mac address of the wireless communication terminal..
Wilus Institute Of Standards And Technology Inc.


Compressed system information for link budget limited ues in a radio access network
Techniques are disclosed relating to broadcasting and receiving system information in a radio access network (ran). In one embodiment, a base station includes at least one antenna, at least one radio, configured to perform cellular communication using a radio access technology (rat), and one or more processors coupled to the radio.
Apple Inc.


System and identifying and using an optimum shared spectrum segment as a delay tolerant, low duty-cycle, cooperative communication medium for terrain independent connection
Establishment of a terrain independent communication using—the hf band (3-30 mhz) and vhf (30 to 300 mhz) frequency spectrums that is provided for use as shared spectrum by the fcc. Different segments within the spectrum are in use today by emergency and utility companies in an intermittent fashion.
Rurisond, Inc.


Communication system, radio network controller and base station
The present invention has an object to provide a communication system capable of avoiding congestion in downlink communication or uplink communication and a shortage of radio resources arising therefrom. In the present invention, in a communication system including a normal user equipment (normal ue) that performs human to human communication and a machine type communication device (mtcd) that performs machine to machine communication, a base station device transmits a paging message to the normal ue and the mtcd for calling the normal ue and the mtcd.
Mitsubishi Electric Corporation


Coordinated resource discovery
Methods, systems, and devices for wireless communication are described that provide for discovery of resources in a wireless communications system. The wireless communications system supports operations for multiple network operating entities that share a radio frequency spectrum.
Qualcomm Incorporated


Tld wireless terminal and tld management system, and tld management method
Disclosed is a tld wireless terminal, a tld management system, and a method for managing the tld. A tld wireless terminal adhered to a tld and communicating with a plurality of repeaters including a first repeater and a second repeater located in a radiation controlled area may include a repeater determining unit configured to selectively determine the first repeater or the second repeater as a repeater for performing communication, and a first communication unit configured to transmit a packet including unique identification information of the wireless terminal to the first repeater..
U2ng Co., Ltd.


Interface selection
A wireless router having a wifi wireless network and including a small cell for routing lte cellular data to a mobile network core is configured to monitor connected mobile devices and determine whether each mobile device should be connect to the hub using wifi or lte in accordance with the current utilization of the wifi network and the current utilization of the lte small cell. Since the small cell data traffic transmitted in a data tunnel to the mobile network core is accessible to the monitor, the network identity information of the device's wifi interface and the device's lte interface can be determined by consulting an address mapping store in the cellular mobile network core.
British Telecommunications Public Limited Company


Unified in-vehicle wi-fi service

A system and method of providing a plurality of services through a plurality of vehicle-generated wi-fi channels includes: generating at a first wi-fi module a first wi-fi channel that includes a master list of services provided by the first wi-fi module as well as one or more other wi-fi modules; receiving a request for a service included on the master list at the first wi-fi module from a wireless device communicating; determining that the service is not available through the first wi-fi module; identifying a second wi-fi module that provides the service; and transmitting a message to the wireless device identifying the second wi-fi module that provides the service identified in the request.. .
Gm Global Technology Operations Llc

System information block transmission

Methods, systems, and devices for wireless communication are described. A network entity may identify a first frequency range of a system bandwidth that is used for transmission of synchronization information.
Qualcomm Incorporated

Method and performing application specific access control in wireless communication system

A method and apparatus for performing application specific access control in a wireless communication system is provided. A user equipment (ue) receives access control related system information from a network, identifies initiation of a specific application, and determines whether or not access attempt for the specific application is allowed, based on the received access control related system information.
Lg Electronics Inc.

Method for starting inter-frequency measurement and related device

A method for starting inter-frequency measurement is provided. The method is applied to an inter-frequency network, the inter-frequency network includes a first base station and a second base station, there is an overlapping area between a signal coverage area of the first base station and a signal coverage area of the second base station, and an access priority of the second base station is higher than an access priority of the first base station; user equipment accesses the first base station; a distance between the second base station and an ap is less than a first distance threshold, and the ap is controlled by an ac.
Huawei Technologies Co., Ltd.

Method and providing an indication regarding ip address preservation following a transfer involving a wireless local area network

A method, apparatus and computer program product are provided to facilitate the transition of user equipment between basic service sets within a wlan or from a basic service set within a wlan to a cellular data link of a cellular network. In the context of a method from the perspective of the user equipment, a message is received that identifies one or more basic service sets or cellular data links to which user equipment is potentially capable of transferring.
Nokia Technologies Oy

Techniques for transmitting patterns of signal transmissions or reference signals over an unlicensed radio frequency spectrum band

Techniques are described for wireless communication. A first method may include determining a pattern of signal transmissions for transmitting instances of a signal in a time period of an unlicensed radio frequency spectrum band; determining whether the unlicensed radio frequency spectrum band is unavailable to transmit at least one instance of the signal; and changing, in response to determining the unlicensed radio frequency spectrum band is unavailable to transmit an instance of the signal, the pattern of signal transmissions for the time period.
Qualcomm Incorporated

Location-specific data sharing

In one embodiment, a device in a network receives data associated with a particular location. The device determines when the device is at the particular location by monitoring a local position of the device relative to the particular location.
Cisco Technology, Inc.

Method, apparatus, and system for preventing diameter signaling attack in wireless network

A method includes receiving a diameter request message sent by a home subscriber server hss, where the diameter request message carries a source domain name and a user identity, and determining whether a binding relationship between the source domain name and the user identity is correct. If the binding relationship is incorrect, the method includes discarding the diameter request message or sending a diameter response message to the hss, where the diameter response message carries a failure code.
Huawei Technologies Co., Ltd.

Communication control apparatus, system, and method therefor

In a communication control method for wireless communication between a first communication device and a second communication device through a wireless communication unit, identification information is notified from the second communication device to the first communication device by using a communication unit other than the wireless communication unit. Wireless communication between the first and second communication devices is performed by the wireless communication unit using the first communication parameter shared in advance, and authentication processing based on identification information is performed.
Canon Kabushiki Kaisha

Methods and apparatuses for conditional wifi roaming

The embodiments herein relate to a mobile terminal and a method for accessing a wireless network in a roaming environment, the mobile terminal being pre-provided with credentials to access the wireless network, the mobile terminal further being provided with an application, said application includes a service part and an application part. The mobile terminal is configured to: send a request to a eap server, the request including the credentials of the mobile terminal; connect the service part of the application to an access control server which adds/creates an eap account for the mobile terminal for a predetermined time period; and to access the wireless network when the eap server validly authenticates the credentials of the mobile terminal.
Telia Company Ab

Communication terminal identification information identifying processing system

Objective is to provide a communication terminal identification information identifying processing system for identifying communication terminal identification information of a portable communication terminal used by a user when the user uses communication through an access point. Provided is a communication terminal identification information identifying processing system includes a person recognition processing unit that performs person recognition processing based on image information obtained by capturing a wireless lan communication spot by a capturing device, a communication terminal identification information acquisition processing unit that acquires communication terminal identification information, a communication terminal identification information storage unit that stores, for each person, candidate communication terminal identification information of the portable communication terminal used by the person, a communication terminal identification information comparison processing unit that compares the candidate communication terminal identification information of the portable communication terminal stored in the communication terminal identification information storage unit and the communication terminal identification information acquired in the communication terminal identification information acquisition processing unit, and generates new candidate communication terminal identification information, and an output processing unit that outputs a part or all of the candidate communication terminal identification information stored in the communication terminal identification information storage unit..
Allied Telesis Holdings K.k.

Device and controlling dirct access of a communication equipment to a virtual store of a network operator

A device is intended for controlling access of a communication equipment of a user to virtual stores of network operators accessible into servers. This device comprises a control means arranged, when this user provides the communication equipment of the user equipment with an access code associated to a virtual store of a network operator, for determining a communication identifier of a virtual store page corresponding to this access code and to data defining a context of the communication equipment into a table establishing correspondences between access codes and communication identifiers of pages of virtual stores providing offers corresponding to communication equipment contexts, then for triggering access by the communication equipment to the virtual store page associated to the determined communication identifier to allow the user to select an offer contained into this virtual store page..
Gemalto Sa

System and obtaining an identifier of a mobile communication terminal at a control checkpoint

Methods for obtain identifiers, such as international mobile subscriber identities (imsis) and international mobile station equipment identities (imeis), of mobile communication terminals, and associate these identifiers with other items of identifying information provided by users of the terminals. A local interrogation device may be installed that imitates a legitimate base station belonging to a cellular network, at a control checkpoint.
Verint Systems Ltd.

A gathering location information of vehicle user equipment in a wireless access system supporting v2x services

The present invention provides methods and apparatus for gathering location information of a vehicular user equipment (vue). In one aspect of the present invention, a method for gathering location information in a wireless access system supporting vehicle to everything (v2x) service, the method performed by a vehicular user equipment (vue) and comprising steps of receiving a tracking service request message including a v2x tracking service indication field indicating tracking service is triggered or not and an identifier of the vue; and transmitting a tracking service response message including location information of the vue in response to the tracking service request message, wherein the location information includes a location information field indicating a location coordinate of the vue, a time field indicating current time and time zone information corresponding to the location information field, and a fuel level field indicating fuel level of the vue..
Lg Electronics Inc.

Trip anomaly detection system

An anomaly detection system is provided in connection with a transport service. The anomaly detection system can construct routine route profiles for individual users of the transport service using historical route data.
Uber Technologies, Inc.

Analyzing movement of data collectors/gateways associated with retail displays

Systems and methods for using wireless beacons in point of purchase (“pop”) displays to facilitate the delivery of consumer oriented content to mobile devices is disclosed. Wireless beacons may be used to broadcast wireless signals from pop displays, where the wireless signals include data packets with unique identifiers for the wireless beacons.
Shelfbucks, Inc.

System and providing dynamic supply positioning for on-demand services

A method for providing on-demand service information is provided. One or more processors determine, for a given geographic region, position information for each of a plurality of requesters for an on-demand service and position information for each of a plurality of service providers that can provide the on-demand service.
Uber Technologies, Inc.

Time-delimited action suggestion system

Systems and methods for providing time-delimited action suggestions are provided. In one example embodiment, a method includes receiving, by one or more computing devices from a user device, data indicative of a user-requested time-bound activity.
Google Inc.

Dynamic geofence based on members within

In one embodiment, a method comprises receiving, via a mobile station, contextual information or geographic location data relating to a plurality of members of the population within the geographic region, identifying a common element in the received contextual information relating to at least two members of the population as a basis for defining a first boundary of the geofence to include the at least two members, wherein the common element is identified upon a comparison of the first and second contextual information, and defining the first boundary of the geofence.. .
Ebay Inc.

Mobile device path and user association

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: recording position data for a mobile device over time, the position data being associated to an identifier of the mobile device; outputting to a user an identification code associated to the identifier; receiving input data from a user, the input data including the identification code and user identifying information from a user; responsively to the receiving the input data from a user associating the identification code and the user identifying information; based on the associating processing the position data and user profile data associated to the user identifying information; sending a message to the user based on a result of the processing..
International Business Machines Corporation

Merchant bidding and rewards on consumer intent

A method of increasing transit ridership includes receiving a travel destination from a mobile device, identifying a plurality of entities positioned within a predefined radius of the travel destination, and alerting the entities that the mobile device has selected the travel destination. The method also includes receiving, in response to the alert, at least one transit ride option from at least some of the entities, providing the at least one transit ride option to the mobile device, and receiving a selection of one transit ride option of the transit ride option from the mobile device.
Cubic Corporation

Local data acquisition for retail displays with wireless beacons

Systems and methods for using wireless beacons in point of purchase (“pop”) displays to facilitate the delivery of consumer oriented content to mobile devices is disclosed. Wireless beacons may be used to broadcast wireless signals from pop displays, where the wireless signals include data packets with unique identifiers for the wireless beacons.
Shelfbucks, Inc.

Network location reporting broadcast bearer management

Various communication systems may benefit from network location reporting. For example, such reporting may be beneficial in the establishment of a multimedia broadcast/multicast service bearer for media traffic delivery from a group communication service application server or other similar device or system.
Nokia Solutions And Networks Oy

Determining service provider performance with ranged transmissions

A network system receives an order request from a requesting device including a list of requested items and a delivery location. The network system may create an order entry by selecting a source location and a provider for the order.
Uber Technologies, Inc.

Flash head and extension cable with identification electronics and a flash generator

A flash generator is capable of identifying which type of flash head and flash head extension cables that is connected to the flash generator. A flash head and flash head extension cable can be identified by the flash generator.
Profoto Ab

Coprime microphone array system

A coprime microphone array (cma) system, comprising: a cma arrangement that includes a pair of uniform linear microphone subarrays that are coincident and have a coprime number of microphones; a computing system that processing signals from each microphone in the cma arrangement and generates sound localization information.. .
Rensselaer Polytechnic Institute

Microphone circuits for canceling out the leakage characteristics of a transducer

A circuit for biasing a transducer including a first plate and a second plate includes a front-end buffer and a charge pump. The front-end buffer generates an internal signal at an internal node in response to a voltage signal of the second plate.
Fortemedia, Inc.

Content playback management

A server and method for terminating, at a target client device, playback of content provided from a server to the target client device. A target client device at which playback is to be terminated is identified.
British Telecommunications Public Limited Company

Reception device, receiving method, transmission device, and transmitting method

The technology is directed to keeping high image quality when a subtitle is superimposed on a video. A reception device includes circuitry configured to receive a video stream and a subtitle stream.
Sony Corporation

Media channel identification with video multi-match detection and disambiguation based on audio fingerprint

Disclosed are methods and systems to help disambiguate channel identification in a scenario where a video fingerprint of media content matches multiple reference video fingerprints corresponding respectively with multiple different channels. Given such a multi-match situation, an entity could disambiguate based on an audio component of the media content, such as by further determining that an audio fingerprint of the media content at issue matches an audio fingerprint of just one of the multiple channels, thereby establishing that that is the channel on which the media content being rendered by the media presentation device is arriving..
Gracenote, Inc.

Systems and methods for identifying a source of a user interface from a fingerprint of the user interface

Systems and methods are provided herein for determining aspects of a user interface, and determining therefrom a service or device that corresponds to the user interface. In doing so, a user's activity can be profiled, and aggregate usage data over a population of particular devices and ott applications can be tracked.
Rovi Guides, Inc.

Media channel identification with multi-match detection and disambiguation based on location

Disclosed are methods and systems involving location-based disambiguation of media channel identification, in a scenario where a fingerprint of media content being rendered by a media presentation device matches multiple reference fingerprints corresponding respectively with multiple different media channels. Upon detecting such a multi-match situation, a server or other entity will use a location of the media presentation device as a basis to disambiguate between the matching reference fingerprints and thus to determine the channel on which the media content being rendered by the media presentation device is arriving..
Gracenote, Inc.

A associating a data source with a mobile device

A system and method for associating an audio signal with a personal mobile device (pmd) of a user is provided and includes associating a user with the personal mobile device (pmd) of a user, associating at least one of the user and the pmd with a processing device, determining if the user is using an exercise machine having an exercise machine television and identifying which exercise machine the user is using, determining which channel is being displayed on the exercise machine television and transmitting the audio signal for the channel being displayed available to the user's pmd.. .
Mye Entertainment, Inc.

Portable terminal, information processing apparatus, content display system and content display method

A portable terminal includes a receiving unit which receives content information, an external device communication unit which conducts communication with an external information device, a display unit which displays the content information received by the receiving unit, an acquiring unit which acquires identification information identifying the content information displayed by the display unit, an operation unit which receives an operation indication from a user, and a control unit which conducts control such that if a transmission indication of the identification information is received by the operation unit while the content information is being displayed, the identification information acquired by the acquiring unit is transmitted to the external information device and the display of the content information by the display unit is terminated.. .
Hitachi Maxell, Ltd.

Portable terminal, information processing apparatus, content display system and content display method

A portable terminal includes a receiving unit which receives content information, an external device communication unit which conducts communication with an external information device, a display unit which displays the content information received by the receiving unit, an acquiring unit which acquires identification information identifying the content information displayed by the display unit, an operation unit which receives an operation indication from a user, and a control unit which conducts control such that if a transmission indication of the identification information is received by the operation unit while the content information is being displayed, the identification information acquired by the acquiring unit is transmitted to the external information device and the display of the content information by the display unit is terminated.. .
Hitachi Maxell, Ltd.

Methods, systems, and media for indicating viewership of a video

Methods, systems, and media for indicating viewership of a video are provided. In some embodiments, the method comprises: identifying a video; identifying a first group of users; determining an affinity score for each user with the identified video; receiving a request to present a page that includes a representation of the video; identifying a second group of users connected to the first user associated with the user device; determining a viewership status of each user in the second group of users corresponding to the video; identifying a subset of users in the second group of users based at least in part on the viewership status; and causing groups of indicators to be presented on the user device, wherein each indicator in the groups of indicators represents the viewership status of the user, and wherein the indicators are presented on the requested page in connection with the representation of the video..
Google Llc

Video data processing method and apparatus

A video data processing method. The method includes: acquiring a multiple program transport stream identifier of each ts packet; acquiring, a single program transport stream identifier of each ts packet; creating at least one scheduling queue for the at least one ts packet according to the single program transport stream identifier in the first information mapping table; selecting any scheduling queue, and determining a first ts packet of the any scheduling queue meets a scheduling condition, selecting at least one output channel to output the any scheduling queue, and continuing to perform determining on a first ts packet of another scheduling queue until determining on all scheduling queues is completed..
Huawei Technologies Co., Ltd.

Sequentially overlaying media content

A method, system, or device to determine when media content has been displayed. The method can include receiving a unique identifier (uid) and fingerprint for a media segment.
Sorenson Media, Inc.

Methods, systems, and media for identifying and presenting users with multi-lingual media content items

Methods, systems, and media for identifying and presenting users with multi-lingual media content items are provided. In some embodiments, the method comprises: receiving a video content item; identifying a first language associated with the video content item; identifying content within the video content item; determining a likelihood that the video content item is a multi-lingual content item that is not language specific based on the identified content within the video content item; receiving a request for media content; determining a second language associated with the request for media content, wherein the second language is different from the first language; in response to determining that the second language that is different from the first language, determining whether to present the video content item based on the determined likelihood; and responsive to the request for media content, causing the video content item to be presented in response to determining that the video content item is deemed to be multi-lingual content that is not language specific..
Google Llc

Identifying media content for simultaneous playback

Systems, devices, and methods for identifying and providing media content to a media-playback device for playback with simultaneous media content are provided. An example system and method for providing media content to a media-playback device for playback with simultaneous media content receives at a computing device a request for media content from a media-playback device, the request including an identification of simultaneous content to be played on the media-playback device.
Spotify Ab

Set-top box with interactive portal and use of same

A set-top box with an interactive portal and system and method for use of the same are disclosed. In one embodiment of the set-top box, the set-top box is deployed to provide an interactive portal in a hospitality establishment having multiple rooms, such as a hotel.
Enseo, Inc.

Block partitioning using tree structures

The techniques described herein relate to methods, apparatus, and computer readable media configured to encode an image or video. A slice is partitioned into a set of first units.
Media Tek Inc.

Determining variance of a block of an image based on a motion vector for the block

The present disclosure is directed to techniques for determining variance of a pixel block in a frame of video based on variance of pixel blocks in a reference frame of the video, instead of directly, for example, by calculating variance based on pixel values of the pixel block. The techniques include identifying a motion vector for a pixel block in a current frame, the motion vector pointing to a pixel block in a reference frame.
Ati Technologies Ulc

Frame output

The present disclosure teaches a frame output method including the steps of: compressing a nth frame into a compressed nth frame using a compression method identical to that of compressing a (n−1)th frame into a compressed (n-1)th frame; storing the compressed nth frame; decompressing the compressed nth frame into a decompressed nth frame using a decompression method identical to that of the decompressing the compressed (n−1)th frame into a decompressed (n−1)th frame; comparing the decompressed nth frame and the decompressed (n−1)th frame and obtaining a comparison result; and providing an output frame according to the decompressed nth frame and the comparison result. The present disclosure also teaches a frame output device.
Shenzhen China Star Optoelectronics Technology Co., Ltd.

Illumination compensation device and illumination compensation method

By either subsampling neighbor pixels and deriving an illumination variation parameter, or deriving one normalization shift value of two normalization shift values for normalizing parameters which are used when deriving the illumination variation parameter, with a dependency on the other normalization shift value, an amount of calculation for illumination compensation is reduced.. .
Sharp Kabushiki Kaisha

Systems and methods for detecting defective camera arrays and optic arrays

Systems and methods for detecting defective camera arrays, optic arrays and/or sensors are described. One embodiment includes capturing image data using a camera array; dividing the captured images into a plurality of corresponding image regions; identifying the presence of localized defects in any of the cameras by evaluating the image regions in the captured images; and detecting a defective camera array using the image processing system when the number of localized defects in a specific set of image regions exceeds a predetermined threshold, where the specific set of image regions is formed by: a common corresponding image region from at least a subset of the captured images; and any additional image region in a given image that contains at least one pixel located within a predetermined maximum parallax shift distance along an epipolar line from a pixel within said common corresponding image region within the given image..
Fotonation Cayman Limited

Laser projector with dynamically adaptable focus

A laser projector assembly for projecting a template onto an object is provided. The laser projector assembly includes a frame, a laser source for generating a laser beam being affixed to said frame, a sensor assembly, a lens assembly and a galvanometer assembly.
Virtek Vision International Ulc

Animated user identifiers

Implementations relate to providing animated user identifiers. In some implementations, a computer-executed method includes determining that a video call over a communication network is connected between a first device associated with a first user and a second device associated with a second user.
Google Llc

Video display modification for video environments

Provided herein are systems, methods, and software for facilitating a video environment. In at least one implementation, video of at least a first object to be displayed in the video environment is received.
Microsoft Technology Licensing, Llc

Binding separate communication platform meetings

Binding of separate communication platform meetings is provided. Video conference service interconnection with online meeting service may be achieved by allowing the online meeting service to provide a tenant identifier to the video conference service, which may be associated with the tenant and used in a key that is used by the video conference service to schedule and initiate meetings.
Microsoft Technology Licensing, Llc

Providing a log of events to an isolated user

A system, apparatus, and computer program product for monitoring a subject person's environment while the person is isolated from the environment. The system can use a microphone and/or a digital camera or imager to detect and capture sounds, voices, object, symbols, and faces in the subject person's environment, for example.
Harman International Industries, Incorporated

Image acquisition device and method

A method for acquiring an image comprises acquiring a first image frame including a region containing a subject at a first focus position; determining a first sharpness of the subject within the first image frame; identifying an imaged subject size within the first image frame; determining a second focus position based on the imaged subject size; acquiring a second image frame at the second focus position; and determining a second sharpness of the subject within the second image frame. A sharpness threshold is determined as a function of image acquisition parameters for the first and/or second image frame.
Fotonation Limited

Camera controller

A processing system for a camera, such as a panoramic camera, and an associated mobile device, vehicle, computer program product and method of use. The processing system being configured to access a data store that stores priority or value data, the priority or value data indicating respective priorities or values for each of a plurality of roads, locations, regions or areas.
Nctech Ltd

Photoelectric conversion apparatus and image pickup system

A photoelectric conversion apparatus includes a photoelectric conversion unit having a light incident surface and including: a first electrode; a second electrode disposed further toward the light incident surface; and a photoelectric conversion layer disposed between the first and second electrodes. The photoelectric conversion apparatus includes a member in contact with the photoelectric conversion layer and constituting a light guide together with the layer.
Canon Kabushiki Kaisha

Method and system for digitization of document

A method and a system for digitization of a document are disclosed. The document is scanned to generate an electronic document.
Conduent Business Services, Llc

System and routing interactions for a contact center based on intelligent and dynamic routing considerations

A system and method for enhanced interaction processing in a contact center that includes routing interactions based on adaptable business objectives. A processor detects a pending interaction with a customer.
Genesys Telecommunications Laboratories, Inc.

Multi-dimensional auditory notification composition based on sender categorizations

A method for generating a multi-dimensional communication notification for notifying a user is provided. The method may include receiving a plurality of contact details for a contact entry within a contact list.
International Business Machines Corporation

Call handling based on user profile identification

Technologies for handling a call based on user identification include determining a personal profile identification for a user of a communal mobile communication device and initiating a call to a personal communication device using a phone number of the personal communication device and the personal profile identification. The personal communication device may apply a call treatment to the incoming call based on the personal profile identification.
Intel Corporation

Application triggered media control in call centers

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving an input from a call center agent indicating a symptom of a quality of an electronic communication between the agent and a caller. Identifying a cause of the quality of the electronic communication based on the input.
United Services Automobile Association (usaa)

Confidentiality-smart voice delivery of text-based incoming messages

Methods, computer program products, and systems are presented. The methods include, for instance: a voice delivery application, running on a mobile device of a user, receives a text message from a user; by use of sensor inputs of the mobile device, the mobile device stores data regarding environment of the mobile device including external audio equipment, speed of the user, and bystanders within a hearing range of the environment; various data describing a sender of the text message and the bystanders are analyzed for respective relationships with the user and with each other to determine a confidentiality group dictating whether or not the text message may be heard by the bystander; the text message may be scanned for content screening, then according to configuration of the voice delivery application, the text message is securely delivered to the user by voice..
International Business Machines Corporation

Network based call authentication

A device may receive, from a network device, a resolution query associated with a call. The resolution query may include a device identifier of the network device.
Verizon Patent And Licensing Inc.

Adjusting displays of outputs on sets of displays

In some examples, a system identifies a set of services to provide a set of outputs to be displayed on a first set of displays at a first location to an identified user, where the services are provided by computers located remotely over a network from the first location, and establishes a value for a parameter that controls a custom display of a given output of the set of outputs on a respective set of displays to the identified user based, at least in part, on a stored mapping that persistently relates the set of services, the set of outputs, a second set of displays, and the identified user. The system further adjusts the display of the given output of the set of outputs on the first set of displays, the adjusting being based, at least in part, on the value of the parameter..
Hewlett-packard Development Company, L.p.

Automatic provisioning of iot devices

The disclosed technology is generally directed to iot communications. For example, such technology is usable in provisioning iot devices in an automatic manner with no manual steps.
Microsoft Technology Licensing, Llc

Information processing using a server group

An acquisition request, received at a server, for acquiring activity information of an activity account includes location information of a terminal, an activity identifier, and a target quantity of the activity information. The server is in a server group.
Alibaba Group Holding Limited

Mobile device identification

Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: generating a first mobile device fingerprint of a mobile device and associating the first mobile device fingerprint to an identifier, and generating a second mobile device fingerprint of the mobile device and associating the second mobile device fingerprint to a mac address of a mobile device.
International Business Machines Corporation

Prefetching with a dynamic cloud packager

Provided is an intelligent prefetcher for prefetching media content segments following a non-sequential naming convention. The prefetching is initiated in response to a server receiving a user request for a particular segment that is not cached.
Verizon Digital Media Services Inc.

Method, device and system for pushing information

Embodiments of the present application relate to a method for pushing information, a system for pushing information, and a computer program product for pushing information. A method for pushing information is provided.
Alibaba Group Holding Limited

Tiered notification framework

A computer-implemented technique is described herein for presenting notifications on a user interface presentation of a recipient computing device. The technique is considered tiered because it distinguishes between first-type (people-centric) notifications and second-type notifications, and because it processes and presents first-type notifications in a privileged manner compared to the second-type notifications.
Microsoft Technology Licensing, Llc

Web-browsing recommendations based on aggregated path data

A method for generating website recommendations based on user web browsing. The method includes a computer processor tracking a sequence of two or more websites traversed by a user, wherein the sequence is based, at least in part, on a web-browsing session of the user.
International Business Machines Corporation

Service providing system, service providing device, and data constructing method

According to one embodiment, a service providing system accumulates, as first context information linked to identification information of a first user, at least a part of first data detected by a first sensor worn on a body of the first user or provided in a held object of the first user. The service providing system provides a first service based on a first aggregate of the accumulated first context information to the first user..
Toshiba Digital Solutions Corporation

System and node selection based on mid-session and end-session event information

In one embodiment, a method comprises obtaining, by a first network element comprising processing logic, notification of a plurality of events associated with a plurality of communication sessions, wherein the events include at least one of a mid-session event or an end-session event, wherein the plurality of events are communicated to a routing agent using a first communication protocol by a plurality of second network elements; receiving, by the first network element, a request via a second communication protocol for a first communication session to be established for a client computing device; selecting, by the first network element, one or more network elements from the second network elements for the communication session based on the at least one of a mid-session or an end-session event; and communicating, by the first network element, identification information of the one or more network elements selected for use in the first communication session.. .
Cisco Technology, Inc.

Establishing secure sessions for stateful cloud services

Aspects of the present disclosure relate to establishing a secure session between a client device and a stateful backend server or host. The system described herein uses an identity token and an authorization token to generate a globally unique identifier that is associated with the client device.
Microsoft Technology Licensing, Llc

Device and system for cloud based mobile application virtualization

A system and method for mobile application virtualization. The system includes a server based architecture for mobile application virtualization.
Sierraware, Llc

Write intent messaging in a dispersed storage network

A method includes generating, by a computing device, a write intent message regarding a data object that is to be written into storage units as sets of encoded data slices. The method further includes initiating, by the computing device, a write operation for storing the sets of encoded data slices.
International Business Machines Corporation

Adaptive scanning rates

A distributed storage network (dsn) stores encoded data slices in dispersed storage (ds) memories using a dsn namespace divided into a plurality of dsn address ranges. Multiple scanning modules, each including a processor and associated memory, identify dsn address ranges for detection of storage errors within the dsn namespace, and initiate scanning for storage errors within the identified dsn address ranges.
International Business Machines Corporation

Extended peer-to-peer channel list

A method of facilitating peer-to-peer connection involves transmitting, by a first peer device, an identification of the first peer device and information regarding its capabilities. The information regarding its capabilities including a list of transmission channels that the first peer device is capable of supporting, an indication of which transmission channels the first peer device is capable of supporting as a group owner, and/or an indication of which transmission channels the first peer device is capable of supporting as a client.
Displaylink (uk) Limited

Virtual router with dynamic flow offload capability

Systems and methods for dynamically offloading network traffic flows in one or more virtual networks are disclosed. An example method begins with identifying a virtual router through which to route network traffic of a specific network flow, wherein the specific network flow has a source endpoint existing on a source host machine and a destination endpoint existing on a destination host machine.
Google Inc.

Method for managing user information of application, device, and system

The present invention discloses a method for managing user information of an application. The method is applied to a user management device of a cloud platform, where the cloud platform is configured to bear an application registered by a user with the cloud platform.
Huawei Technologies Co., Ltd.

Operating mehtod, apparatus and computer readable storage medium

The present disclosure relates to computer and internet technology, and more particularly to an operating method, apparatus, and computer readable storage medium. The method comprises: obtaining an information processing result in accordance with user interest information; identifying a second terminal device associated with the user interest information; and transmitting the information processing result to the second terminal device via a communication connection established with the second terminal device, wherein the second terminal device performs a corresponding operation in accordance with the information processing result..
Beijing Xiaomi Mobile Software Co., Ltd.

Adaptive bit rate streaming with multi-interface reception

In one embodiment, a method includes receiving content in a first format at a first interface at an adaptive bit rate client, playing the content received at the first interface at the adaptive bit rate client, monitoring network conditions at the first interface, receiving the content in a second format at a second interface at the adaptive bit rate client, and upon identifying a change in the network conditions at the first interface, switching from playing the content received on the first interface to playing the content received at the second interface at the adaptive bit rate client. An apparatus and logic are also disclosed herein..
Cisco Technology, Inc.

Household device-user graph for delivering content

An online system generates a household device-user graph, which links one or more household devices in a household with one or more users, each of whom having a user profile in the online system. The household device-user graph can be used for effective content delivery to users of the online system.
Facebook, Inc.

Agile network protocol for secure video communications with assured system availability

A system and method for video conferencing over a secure communication link is disclosed. In various implementations, the system is configured connect to a communication network, store a plurality of network addresses of devices of registered users, each device of a registered user having an application program for conducting video conferencing between, the client device and the target device, and establish a secure communication link between the client device and the target device.
Virnetx, Inc.

Method for processing telephony sessions of a network

A method for processing telephony sessions of a network including at least one application server and a call router, the method including the steps of assigning a primary uniform resource identifier (uri) and at least a secondary uri to an application; mapping a telephony session to the primary uri; communicating with the application server designated by the primary uri using an application layer protocol; receiving telephony instructions from the application server and processing the telephony instructions with the call router; detecting an application event; and upon detecting the application event, communicating with the application server designated by the secondary uri.. .
Twilio, Inc.

Systems and methods for network security memory reduction via distributed rulesets

The present disclosure describes systems and methods for reducing rule set sizes via statistical redistribution throughout a plurality of network security appliances. A rule set may be generated for each security appliance that includes (i) a first set of rules based on known attacks, identified as rules for mandatory inclusion in the rule set; and (ii) a subset of the second set of rules, identified as rules for potential inclusion in the rule set, selected randomly according to a distribution percentage, score, or weight for each potentially included rule.
Fortress Cyber Security, Llc

Anti-spoofing protection in an automotive environment

To automatically identify an attempt at presenting falsified vehicle identifiers to portable devices, (i) a vehicle identifier reported by a vehicle with which the portable device is establishing a short-range communication link, and (ii) an indication of a current location of the portable device, are received from a portable device at a first time. An indication of a recent location at which the vehicle identifier was reported at a second time is obtained.
Google Llc

Inter-domain distributed denial of service threat signaling

In one embodiment, a primary server receives, from a client device, a first request to mitigate an external attack on the client device. The primary server sends, to a plurality of secondary servers, a second request to mitigate the external attack, wherein each one of the plurality of secondary servers has associated mitigation resources, and receives from at least one of the plurality of secondary servers an indication that it has mitigation resources capable of mitigating the external attack.
Cisco Technology, Inc.

Distributed denial of service attack protection for internet of things devices

Presented herein are techniques for remediating a distributed denial of service attack. A methodology includes, at a network device, such as a constrained resource internet of things (iot) device, receiving from an authorization server cryptographic material sufficient to validate and decrypt tokens carried in packets, detecting a denial of service attack that employs packets containing invalid tokens, and in response to detecting the denial of service attack, signaling a remediation server for assistance to remediate the denial of service attack, and sending to the remediation server the cryptographic material over a secure communication channel such that the remediation server enables validation and decryption of tokens carried in packets, subsequent to detection of the denial of service attack, that are destined for the network device..
Cisco Technology, Inc.

Mitigating network attacks

Systems and methods are described that enable the mitigation of network attacks directed to specific sets of content on a content delivery system. A set of content targeted in the attack may be identified based at least in part on a combination of network addresses to which attacked-related packets are transmitted.
Amazon Technologies, Inc.

Universal link to extract and classify log data

A universal link to extract and classify log data is disclosed. In various embodiments, a set of candidate data values that match a top level pattern that is common to two or more types of data value of interest is identified.
Anomali Incorporated

Distributed network security using a logical multi-dimensional label-based policy model

A managed server (ms) within an administrative domain is quarantined. The administrative domain includes multiple mss that use management instructions to configure management modules so that the configured management modules implement an administrative domain-wide management policy that comprises a set of one or more rules.
Illumio, Inc.

System and generating data sets for learning to identify user actions

Embodiments for generating appropriate data sets for learning to identify user actions. A user uses one or more applications over a suitable period of time.
Verint Systems Ltd.

Securing ordered resource access

Ordered access to resources is controlled by restricting access to additional resources that are accessible when a client device provides an authentication provided when accessing an initial resource. When the client device accesses the initial resources, a set of access parameters are identified describing the request and the client device providing the request, and included with an expiration time in generating a token.
Perimeterx, Inc.

Device management for isolation networks

In one embodiment, a server instructs one or more networking devices in a local area network (lan) to form a virtual network overlay in the lan that redirects traffic associated with a particular node in the lan to the server. The server identifies a configuration for the particular node based on a node profile for the particular node.
Cisco Technology, Inc.

System and embedding first party widgets in third-party applications

Methods and systems for providing a third party application with access to files stored on a server are disclosed. A method may include receiving, from a browser at a client device, a request for a file stored on the server, wherein the request is received via a web page provided by the third party application and rendered by the browser, the web page comprising an embedded user interface (ui) component associated with the server to access the file stored on the server, wherein the request includes a document identifier associated with the file, an application identifier of the third-party application, and an origin identifier, wherein the origin identifier is associated with the web page provided by the third party application and rendered by the browser.
Google Inc.

Anomaly detection using tripoint arbitration

Systems, methods, and other embodiments associated with anomaly detection using tripoint arbitration are described. In one embodiment, a method includes identifying a set of clusters that correspond to a nominal sample of data points in a sample space.
Oracle International Corporation

Cross security layer secure communication

A security layer in an industrial control and automation system includes a user database, a web server, a secure token server (sts), and an application server. The user database is configured to store identities of users with credentials to access controls of the security layer.
Honeywell International Inc.

System and facilitating the identification of a computer on a network

A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application.
International Business Machines Corporation

Rfid authentication architecture and methods for rfid authentication

A method for mutual authentication in an rfid system comprising an rfid reader and an rfid tag, the method comprising requesting an identification from the tag, receiving the identification, using the received identification to select a password associated with the identification, generating a password key based on the selected password, encrypting the selected password using the password key, and transmitting the encrypted password to the tag.. .
Neology, Inc.

Method of mutual authentication between agent and data manager in u-health environment

Disclosed is a method of mutual authentication between an agent and a data manager in a u-health environment, in which the agent performs identification recognition using an identification (id) of the agent, i.e., a system-id, a secret key, encryption, and a one-time use random number generator, instead of using biometric scan data of an existing ieee 11073 agent, and hence bidirectional authentication, rather than unidirectional authentication, is allowed.. .
Industry-academic Cooperation Foundation Halla University

Automatic association of authentication credentials with biometrics

A computing device may receive authentication information. Within a time-out period, a fingerprint may also be received.
Apple Inc.

A authenticating a user when logging in at an online service

Provided is a method for authenticating a user when logging in at an online service, where the online service is provided by a server arrangement and the method is based on a communication between the online service and a primary device and between the online service and a secondary device. The method comprising the following steps: a user identification specified by the user at the secondary device and not including any credential is received by the online service; an authentication request is transmitted by the online service to the primary device where the primary device is associated with the user identification; an authentication response comprising at least one credential is transmitted by the primary device to the online service, where the at least one credential originates from a storage in the primary device and is only transmitted through the authentication response upon a successful local authentication of the user at the primary device..
Siemens Aktiengesellschaft

Authentication-free configuration for service controllers

Embodiments generally relate to out-of-band management of a computing system. The present technology discloses enable a primary service controller to provide a centralized configuration of multiple secondary service controllers so that they can share a same configuration.
Quanta Computer Inc.

Private simultaneous authentication of equals

A passphrase is assigned to an end user device for use in authenticating the end user device for a network using sae. An identification of the end user device is determined during an authentication process.
Aerohive Networks, Inc.

Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score

A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with accesses made using an access token; and links among the nodes representing connections between the data elements identified in details of the accesses. In response to receiving details of an access made using the access token, the controller updates the graph according to the details and determines a plurality of measurements of the graph.
Idm Global, Inc.

Secure electronic communication

Techniques are disclosed for secure electronic communication. Examples of metadata include identification of a relationship of a sender and receiver, timing of a communication between the sender and receiver, and frequency of communication between the sender and receiver.
Microsoft Technology Licensing, Llc

Content delivery network (cdn) content server request handling mechanism with metadata framework support

To serve content through a content delivery network (cdn), the cdn must have some information about the identity, characteristics and state of its target objects. Such additional information is provided in the form of object metadata, which according to the invention can be located in the request string itself, in the response headers from the origin server, in a metadata configuration file distributed to cdn servers, or in a per-customer metadata configuration file.
Akamai Technologies, Inc.

Systems and methods for relaying messages in a communications system

The various embodiments described herein include methods, devices, and systems for relaying messages in a communications system. In one aspect, a method is performed at a server having one or more processors and memory storing instructions for execution by the one or more processors.
Google Llc

Managing for-sale group postings

The present disclosure is directed toward systems and method for managing social networking system for-sale groups. For example, systems and method described herein identify sale listings within social networking system for-sale groups and aggregates the identified sale listings into a personal town square for a particular social networking system user.
Facebook, Inc.

Social network communities

Disclosed are methods, apparatus, systems, and computer-readable storage media for providing access to communities of users in an online social network. In some implementations, a server is configured to identify a user identity (id), received from a computing device, as one of a plurality of first user identities (ids) of first users belonging to a first community maintained on behalf of a first organization by a social networking system.
Salesforce.com, Inc.

Generating a conversation in a social network based on mixed media object context

A system and method for generating a conversation in a social network based on visual search results. A mixed media reality (mmr) engine indexes source materials as mmr objects, receives images from a user device and identifies matching mmr objects.
Ricoh Company, Ltd.

System and generating a user status and authenticating social interactions in a computer network

Providing user status in a computer network includes storing associations of interaction indications to different interaction events, storing values for the interaction indications, and maintaining accounts for users performing the different interaction events. Interaction indications are received via the computer network from terminals associated with the accounts.
Iou Concepts Inc.

Voice and text group chat display management techniques for wireless mobile terminals

A single content region in a chat history display is used to display entries representative of a plurality of messages corresponding to all chat histories for all of chat threads currently engaged in by a given mobile terminal. Additionally, a buddy list display supports management of chat buddies, a detail view display allows otherwise truncated messages to be displayed, and a text message editor display supports the composition of text messages.
Blackberry Limited

Controller, control method and program

A controller, comprises: a first unit configured to identify a virtual machine(s) capable of providing a function(s) of a network node; a second unit configured to identify information regarding a position of the identified virtual machine(s) in a physical network; and a third unit configured to set based on the information regarding the position a data path implementing the function(s) of the network node on the physical network.. .
Nec Corporation

Methods and systems for determining and using characteristics of network carriers in connection with access requests

A server system receives, from a first user device through a first network carrier, a request to access content. One or more characteristics of the first network carrier are determined from the request, including at least one of an identity of the first network carrier and a network type of the first network carrier.
Facebook, Inc.

Communication device and requesting for destination information

A communication device includes a memory and a processor coupled to the memory. The processor is configured to register first flow identification information of a first packet in the memory.
Fujitsu Limited

Systems and methods for customizing layer-2 protocol

A method includes: receiving, by a controller of a layer-2 network abstraction comprising a plurality of nodes interconnected by links, information defining at least a performance of each link; identifying, by the controller, at least one underperforming link of the network based on the received information; and for each identified under-performing link of the network: computing, by the controller, at least one updated layer-2 protocol parameter for at least one traffic flow of the under-performing link based on the information; and sending, by the controller, the at least one updated layer-2 protocol parameter to at least one node of the under-performing link. .
Huawei Technologies Co., Ltd.

Forwarding information base architecture for a hybrid ip and content centric network router

One embodiment provides a system that facilitates forwarding a mix of ip and ccn packets. During operation, the system determines a name which is a hierarchically structured variable length identifier comprising contiguous name components ordered from a most general level to a most specific level.
Cisco Technology, Inc.

Label distribution

A label distribution method and device are disclosed. In an embodiment the method includes: a first routing device sends a first bgp update message including a first vpn instance identifier and a first rt to a second routing device; the first routing device receives a second bgp update message including a second vpn instance identifier and a second rt; the first routing device allocates a first vpn instance label to a second vpn instance after the second routing device determines that the first rt is equal to the second rt; and the first routing device sends a third bgp update message including the first vpn instance label to the second routing device.
Huawei Technologies Co., Ltd.

Router and methods of switching with a plurality of link nodes and a single connection map

A router with leaf and spine nodes. Each leaf node is connectable to a spine node, so that a signal from a source leaf node can reach a destination leaf node through a spine node.
Snell Advanced Media Limited

Connection minimization for distributed system

A method computer implemented method of minimizing connections in a distributed system includes traversing paths in a directed graph representation of the distributed system having a fixed set of paths between nodes representing resources of the distributed system and edges representing connections between the resources by performing a random walk procedure to provide a reduced number of paths in the directed graph representation, and identifying excessive connections between the resources by simulating a client accessing the resources and identifying as excessive, connections that are not used by any of the reduced number of paths, wherein the excessive connections are removable from the distributed system without preventing client access to resources in the distributed system.. .

Federated mobile device management

In one example of federated mobile device management, a first management server federates with a second management server based on an exchange of one or more identity authentication certificates between them. After the first and second management servers have federated or affiliated, they can exchange mobile device management data, including compliance policies, rules, resources, etc., with each other.
Airwatch Llc

Host pair detection

The present disclosure relates to identifying and storing relationships between hosts that are used to present a web page to a user. In certain embodiments, a system for detecting host pairs is provided.
Riskiq, Inc.

Component detection and management using relationships

Correlation of component information provided by diverse detection and data collection methods is used to discover additional components and identify and record relationships between these and still other components. Each detection and data collection method can be individually useful to discover components, and to provide at least some information about one or more discovered components to identify at least one relationship between the discovered components.
Sciencelogic, Inc.

Enhanced and concurrent asymmetric topology reconciliation in a computer cluster

A method includes a processor determining a number of nodes other than the particular node from among the plurality of nodes that the particular node can communicate with at a particular point in time; determining that a number of the nodes within the plurality of nodes that the particular node can communicate with at a particular point in time is less than a value of a variable; storing in a candidate array the determined number of nodes within the plurality of nodes that the particular node can communicate with at a particular point in time which is less than the value of a variable, wherein the candidate array identifies those nodes within the plurality of nodes that can be taken to a down state; and determining at least one of the nodes stored in the candidate array to be taken to a down state.. .
International Business Machines Corporation

Template-based declarative and composable configuration of network functions

The present disclosure is directed towards systems and methods of configuring a computing environment. A device identifies a template including a declarative language with a first declaration and a second declaration.
Citrix Systems, Inc.

Systems and methods for intuitive home networking

A method for router configuration includes at a remote router management platform, registering a first router, associated with a first router identifier, to a user account; at the first router, establishing an internet connection; at a first user electronic device, transmitting a first router configuration to the remote router management platform; and at the first router, receiving the first router configuration from the remote router management platform via the internet connection.. .
Eero Inc.

Methods and configuring remote access of process control data

A method of providing process data to a remote computing device includes receiving configuration data describing a configuration of at least part of the process control system. The configuration data includes information associated with a plurality of process control entities, and the information regarding each entity includes at least one tag associated with a level in a hierarchy of the system.
Fisher-rosemount Systems, Inc.

Automated troubleshooting of a wireless network using a wireless network control system

A system and method for identifying weaknesses in a wireless network, wherein a wireless network control system exercises a wireless network by transmitting a large volume of data between nodes in order to identify network weaknesses and communication bottlenecks, wherein the wireless network control system is automated so that it may perform identification of network problems without user intervention, and wherein the wireless network control system may make suggestions as to how the network weaknesses and communication bottlenecks may be repaired.. .
Prodatakey, Inc.

Resource block alignment in mixed numerology wireless communications

Techniques are described that provide for resource block (rb) alignment in mixed numerology wireless communications, in which a number of rbs for a particular numerology may occupy less than an entire system bandwidth. A fractional bandwidth may be identified as a difference between the bandwidth of the integer number of rbs and the system bandwidth and may be used to transmit information using one or more fractional rbs that may have a same or different numerology as the integer number of rbs.
Qualcomm Incorporated

Ethernet tag mapping in virtual private wire service using ethernet virtual private network

Presented herein is an exemplified system and method that facilitate a point-to-point (p2p) service operation, via evpn vpws service tunnels, between customer edge nodes and provider edge nodes in a network infrastructure (e.g., a mpls infrastructure). In particular, the exemplified system and method employ an evpn bgp construct that facilitates multiplexing across large number of different physical interfaces, among multiple device manufacturers and vendors, while reducing signaling among the nodes, and being fully supportive of evpn capabilities.
Cisco Technology, Inc.

Iot provisioning service

The disclosed technology is generally directed to device provisioning in an iot environment. For example, such technology is usable in provisioning iot devices to an iot hub.
Microsoft Technology Licensing, Llc

Information processing method and information processing system

An information processing method includes coupling, by a terminal device of a plurality of terminal devices, to a device of a plurality of devices through wireless communication; transmitting a completion notification indicating that the coupling to the device is successful to an information processing device; referring, by the information processing device, to management information in which a first identifier, a second identifier, and a connection status of connection with the plurality of terminal devices are associated with each other for each of the plurality of devices to identify the second identifier that is included in the completion notification and associated with the first identifier that is used to identify the device, by using the information processing device, transmitting the identified second identifier to the terminal device; and displaying, by the terminal device, the identified second identifier.. .
Fujitsu Limited

Method for validating messages

There is provided a method for secure communications. The method includes a computing device receiving a notification comprising a message, a counter value, a signature signed by a signer and based on the message and the counter value, and an indication of the signer.
Certicom Corp.

Method and system for secure data storage and retrieval

One embodiment described herein provides a system and method for secure data storage. During operation, a client device selects a quantum data key from a plurality of quantum data keys shared between the client device and a storage server, encrypts to-be-stored data using the selected quantum data key, and transmits a data-storage request to the storage server.
Alibaba Group Holding Limited

Key agreement for wireless communication

Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device.
Certicom Corp.

Method and user equipment for transmitting uplink signal according to spectrum emission mask

A method and user equipment for transmitting an uplink signal according to a spectrum emission mask (sem) are discussed. The method performed by the user equipment includes if a radion frequency (rf) unit of the user equipment is configured to use inter-band carrier aggregation (ca), transmitting uplink signals on the carriers, wherein if a first sem of a first carrier is overlapped in some frequency region with a second sem of a second carrier, one sem allowing a higher power specral density (psd) is selected to be applied..
Lg Electronics Inc.

Nib comp transmission in wireless communication system

The present invention relates to a wireless communication system, and more particularly, to a method and device for performing or supporting nib coordinated multi-point (comp) transmission in a wireless communication system. The method for performing nib comp transmission in the wireless communication system according to an embodiment of the present invention may include: transmitting a first-type signal including one or more sets of first comp hypotheses from a first network node to a second network node; and receiving at the first network node a second-type signal including one or more sets of second comp hypotheses from the second network node.
Lg Electronics Inc.

Information transmission

An information transmission method and an information transmission device are provided, so as to determine redundancy versions corresponding to a plurality of consecutive subframes as an identical redundancy version, thereby to enable identical information to be transmitted within the plurality of consecutive subframes after a rate matching and enable an opposite end to perform coherent combination on the information transmitted within the plurality of consecutive subframes. The information transmission method includes steps of: determining, by a local end serving as a transmitting end, information to be repeatedly transmitted within a repetition time period containing a plurality of subframes; and determining, by the local end, a redundancy version corresponding to each subframe in the repetition time period, performing a rate matching on a bit stream acquired by encoding the information based on the redundancy version corresponding to the subframe, and transmitting the bit stream processed through the rate matching to an opposite end, where a plurality of consecutive subframes among the subframes in the repetition time period corresponds to an identical redundancy version..
China Academy Of Telecommunications Techology

Systems and methods for a log-likelihood ratio based dynamic pre-processing selection scheme in a low-density parity-check decoder

Embodiments described herein provide a system for dynamically selecting a pre-processing scheme for an ldpc decoder. The system includes a receiver configured to detect transmission of a first data packet and receive a first set of data bits corresponding to a first portion of the first data packet.
Marvell World Trade Ltd.

Enhanced overlaid code division multiple access (cdma)

A base station can obtain channel quality conditions for mobile devices in a scheduling interval and identify a channel quality, a target transmission scheme, and a transmission power level for each of the mobile devices. The base station can assign a unique orthogonal cdma code and can force the mobile devices to transmit k repeated bursts of uplink data such that each of the mobile devices has a rotated phase shift based on the unique orthogonal cdma code assigned to each of the mobile devices with each of the mobile devices multiplexed on a same physical channel using an overlaid cdma operation.
Intel Corporation

Analyzing movement of wireless beacons associated with retail displays

Systems and methods for using wireless beacons in point of purchase (“pop”) displays to facilitate the delivery of consumer oriented content to mobile devices is disclosed. Wireless beacons may be used to broadcast wireless signals from pop displays, where the wireless signals include data packets with unique identifiers for the wireless beacons.
Shelfbucks, Inc.

Rerouting bus data signals from faulty signal carriers to existing healthy signal carriers

A first set of signal carriers of a plurality of signal carriers may be determined to be faulty. The first set of signal carriers may be for transmitting a first set of respective lane signals of a plurality of lane signals.
International Business Machines Corporation

Communication method, base station, and user equipment

Embodiments of the present application disclose a communication method, including: performing, by a base station, beam scanning and alignment together with first terminal in a first subframe, to determine a beam that is used for sending data in the first subframe; and sending, by the base station, beam information of the beam used for sending data, where the beam information includes at least identification information of the beam and a synchronization signal, the synchronization signal is used by second terminal to synchronize with the base station, and the identification information of the beam is used by the first terminal and the second terminal to identify the beam sent by the base station. According to the present application, a time for scanning and alignment can be reduced, so as to facilitate quick access of a user that is to perform access..
Huawei Technologies Co., Ltd.

Reference signal tracking in a wireless communication system

A wireless device (14) is configured to receive, from network equipment (12), a tracking process base signal (18) using a receiver configuration (16) with tunable beamforming, and transmit a report (20) to the network equipment (12) indicating reception of the tracking process base signal (18). The wireless device (14) is further configured to, responsive to transmitting the report (20), configure the wireless device (14) with a tracking process (26) for the wireless device (14) to track a reference signal (24) by tuning the receiver configuration (16) with which the wireless device (14) received the tracking process base signal (18).
Telefonaktiebolaget Lm Ericsson (publ)

Transmitting apparatus and signal processing method thereof

A transmitting apparatus and a receiving apparatus are provided. The transmitting apparatus includes an encoder configured to generate a low density parity check (ldpc) codeword by performing ldpc encoding, an interleaver configured to interleave the ldpc codeword, and a modulator configured to modulate the interleaved ldpc codeword according to a modulation method to generate a modulation symbol.
Samsung Electronics Co., Ltd.

Bit interleaver for low-density parity check codeword having length of 64800 and code rate of 2/15 and 16-symbol mapping, and bit interleaving method using same

A bit interleaver, a bit-interleaved coded modulation (bicm) device and a bit interleaving method are disclosed herein. The bit interleaver includes a first memory, a processor, and a second memory.
Electronics And Telecommunications Research Institute

Adjusted min-sum decoder

Certain aspects of the present disclosure generally relate to techniques for efficient, high-performance decoding of low-density parity check (ldpc) codes, for example, by using an adjusted minimum-sum (adjms) algorithm, which involves approximating an update function and determining magnitudes of outgoing log likelihood ratios (llrs). Similar techniques may also be used for decoding turbo codes.
Qualcomm Incorporated

Adaptive matching network

A system that incorporates teachings of the present disclosure can include, for example, an apparatus having a matching network adapted to reduce a magnitude of a signal reflection at a port of the matching network. The matching network can have one or more controllable variable reactive elements.
Blackberry Limited

Power converter

In a multilevel converter, three circuit breakers are respectively connected between three arms and three reactors. One circuit breaker is a dc circuit breaker configured to interrupt direct current when a short circuit accident occurs between two dc power transmission lines.
Mitsubishi Electric Corporation

Circuit with low dc bias storage capacitors for high density power conversion

A circuit for converting dc to ac power or ac to dc power comprises a storage capacitor, boost and buck inductors and switching elements. The switches are controlled to steer current to and from the storage capacitor to cancel dc input ripple or to provide near unity power factor ac input.

Multi-mode wirelessly rechargeable battery system

A device including a processor configured to identify a power transferring unit, to determine a range configuration relative to the power transferring unit, and to determine a power status of the device is provided. The device includes a first antenna configured to receive an oscillating power signal from the power transferring device at a first selected frequency based on the range configuration relative to the power transferring device, and on the power status of the device.
Powersphyr Inc.

Multi-mode energy receiver system

A device is provided that includes a processor configured to identify a power transferring device and to determine a range configuration relative to the power transferring device, and to determine a power status of the device. The device also includes a first antenna configured to receive an oscillating power signal from the power transferring device at a first selected frequency based on the range configuration relative to the power transferring device, and on the power status of the device, and a first rectifier circuit configured to convert the oscillating power signal from the first antenna at the first selected frequency into a direct-current signal to charge a device load.
Powersphyr Inc.

Intelligent multi-mode wireless power transmitter system

A device including a processor configured to identify a power receiving device and to determine a range configuration relative to the power receiving device is provided. The device also includes a first antenna configured to emit a propagating radiation at a selected frequency and in a selected direction, and a first power transmitting circuit configured to provide a signal at the selected frequency to the first antenna when the processor identifies the power receiving device within a far field configuration from the device.
Powersphyr Inc.

Dc-link bus balancer

According to one aspect, embodiments of the invention provide a ups comprising a plurality of dc busses configured to receive dc power from a converter, the plurality of dc busses including a positive dc bus configured to maintain a positive dc voltage level, a mid-point dc bus, and a negative dc bus configured to maintain a negative dc voltage level, a 3-level inverter coupled to the plurality of dc busses and configured to convert the dc power from the plurality of dc buses into output ac power, and a controller configured to monitor the positive and negative dc voltage levels, identify an imbalance between the positive and negative dc voltage levels, and selectively control, based on the imbalance, the 3-level inverter to operate in a 2-level mode of operation and a 3-level mode of operation to transfer energy between the positive and negative dc busses.. .
Schneider Electric It Corporation

Charging method, charging apparatus, and terminal

A charging method, a charging apparatus, and a terminal are disclosed. The method includes: identifying, when it is detected that a charging apparatus is inserted into a charging port of a terminal by using a charging cable, a first voltage value of the charging port; setting a second charging current; identifying a second voltage value of the charging port at the second charging current; calculating a cable impedance of the charging cable according to the first voltage value, the second charging current, and the second voltage value; and adjusting a suitable charging current of the charging apparatus according to the cable impedance of the charging cable.
Huawei Technologies Co., Ltd.

Drain nipple

The present invention is a low point pipe fitting for draining accumulated condensation from electrical conduit systems that are installed in industrial, commercial and residential facilities. The fitting includes a centrally disposed engaging tool members with opposing threaded fittings with a drain incorporated in the underside of the engaging tool members..

Method for mounting electric switching systems and assembly support device for simplifying the assembly of such switching systems

A method for assembling electric switching systems includes wiring and/or connecting electric components together at specific connection points may be used in conjunction with an assembly support device for simplifying and/or checking the assembly of such electric switching systems. A respective component which is provided for connecting in the switching system is identified by an identifying device.
Liebherr-components Biberach Gmbh

Compliant shield for very high speed, high density electrical interconnection

An interconnection system with a compliant shield between a connector and a substrate such as a pcb. The compliant shield may provide current flow paths between shields internal to the connector and ground structures of the pcb.
Amphenol Corporation

Porous electrode substrate and manufacturing method therefor

There has been a demand for providing a porous electrode substrate having reduced bulk density, having good handling properties and gas permeability, which has conventionally been difficult to produce. A porous electrode substrate having a structure wherein carbon fibers (a) are joined by carbides, the porous electrode substrate having a bulk density of 1.0-2.0×10−1 g/cm3 or less when a pressure of 1.5×10−1 mpa is applied, and having a bending strength of at least 10 mpa..
Mitsubishi Chemical Corporation

Flow batteries having an electrode with differing hydrophilicity on opposing faces and methods for production and use thereof

Electrochemical cells, such as those present within flow batteries, can include at least one electrode with one face being more hydrophilic than is the other. Such electrodes can lessen the incidence of parasitic reactions by directing convective electrolyte circulation toward a separator in the electrochemical cell.
Lockheed Martin Advanced Energy Storage, Llc

Particulate active material, power storage device positive electrode, power storage device, and production particulate active material

A particulate active material for a power storage device positive electrode having a higher energy density is provided, which includes particles of an electrically conductive polymer and a conductive agent, wherein the electrically conductive polymer particles each have a surface coated with the conductive agent.. .
Nitto Denko Corporation

Electroluminescent element and light-emitting device

An electroluminescent element which can easily control the balance of color in white emission (white balance) is provided according to the present invention. The electroluminescent element comprises a first light-emitting layer containing one kind or two or more kinds of light-emitting materials, and a second light-emitting layer containing two kinds of light-emitting materials (a host material and a phosphorescent material) in which the phosphorescent material is doped at a concentration of from 10 to 40 wt %, preferably, from 12.5 to 20 wt %.
Semiconductor Energy Laboratory Co., Ltd.

Semiconductor device

High field-effect mobility is provided for a transistor including an oxide semiconductor. Further, a highly reliable semiconductor device including the transistor is provided.
Semiconductor Energy Laboratory Co., Ltd.

Forming strained channel with germanium condensation

A method for forming a semiconductor device includes forming a strained fin on a substrate, a sacrificial gate on a channel region of the fin, a first spacer adjacent to a sidewall of the fin, and a second spacer adjacent to the first spacer. A source/drain region is grown on an exposed portion of the fin.
International Business Machines Corporation

Polysilicon thin film and manufacturing method thereof, tft and manufacturing method thereof, and disply panel

A manufacturing method for a polysilicon thin film is provided. The manufacturing method for a polysilicon thin film includes forming a polysilicon layer, treating a surface of the polysilicon layer so that the surface of the polysilicon layer is electronegative, and supplying polar gas into a process chamber so that polar molecules of the polar gas are adsorbed on the surface of the polysilicon layer which is electronegative so as to form the polysilicon thin film, a surface of which has a hole density higher than an electron density..
Boe Technology Group Co., Ltd.

Lattice-mismatched semiconductor structures with reduced dislocation defect densities and related methods for device fabrication

A method of forming a semiconductor structure includes forming an opening in a dielectric layer, forming a recess in an exposed part of a substrate, and forming a lattice-mismatched crystalline semiconductor material in the recess and opening.. .
Taiwan Semiconductor Manufacturing Company, Ltd.

Method for manufacturing silicon carbide semiconductor device and silicon carbide semiconductor device

A method for manufacturing a silicon carbide semiconductor device includes the steps of preparing a silicon carbide substrate having a first main surface and a second main surface located on a side opposite to the first main surface, forming an epitaxial layer on the first main surface, the epitaxial layer having a first conductivity type and having a third main surface located on a side opposite to a side on which the silicon carbide substrate is located, forming a trench, which includes side walls intersecting with the third main surface and a bottom portion connected to the side walls, in the epitaxial layer, widening an opening of the trench, and forming an embedded region, which has a second conductivity type different from the first conductivity type, in the trench. The epitaxial layer adjacent to the embedded region and the embedded region constitute a superjunction structure..
Sumitomo Electric Industries, Ltd.

Cmos image sensor

A method for manufacturing a semiconductor device includes providing a substrate structure including a substrate having a front side and a back side and a pixel region having a plurality of pixels in the front side, each pixel including a sensor element, forming a metal reflective layer in the front side of the substrate and on the pixel region, thinning the back side of the substrate, doping the thinned back side of the substrate with a dopant, and laser annealing the doped back side of the substrate. The sensor element is configured to receive incident light to the thinned back side of the semiconductor substrate.
Semiconductor Manufacturing International (beijing) Corporation

Asymmetric dense floating gate nonvolatile memory with decoupled capacitor

A nonvolatile memory (“nvm”) bitcell with one or more active regions capacitively coupled to the floating gate but that are separated from both the source and the drain. The inclusion of capacitors separated from the source and drain allows for improved control over the voltage of the floating gate.
Synopsys, Inc.

Convex shaped thin-film transistor device having elongated channel over insulating layer

The present invention provides a semiconductor device that has a shorter distance between the bit lines and easily achieves higher storage capacity and density. The semiconductor device includes: first bit lines formed on a substrate; an insulating layer that is provided between the first bit lines and in a groove in the substrate, and has a higher upper face than the first bit lines; channel layers that are provided on both side faces of the insulating layer, and are coupled to the respective first bit lines; and charge storage layers that are provided on the opposite side faces of the channel layers from the side faces on which the insulating layers are formed..
Monterey Research, Llc

Embedded vialess bridges

Embedded vialess bridges are provided. In an implementation, discrete pieces containing numerous conduction lines or wires in a 3-dimensional bridge piece are embedded where needed in a main substrate to provide dense arrays of signal, power, and electrical ground wires below the surface of the main substrate.
Invensas Corporation

Semiconductor device and manufacturing the same

A semiconductor device includes a semiconductor substrate, a semiconductor element formed in or on the semiconductor substrate, a metal layer connected to the semiconductor element, and a passivation film that protects the semiconductor element. The passivation film is formed by alternately stacking a first insulation film that generates compressive stress and has low density and a second insulation film that generates compressive stress and has high density.
Murata Manufacturing Co., Ltd.

Method for manufacturing a semiconductor product wafer

Improved methods for manufacturing semiconductor product wafer with the additional use of non-product masks are described. According to certain aspects of the invention, an evaluation wafer is first manufactured by utilizing at least one non-product mask to process one or more layer(s) on the evaluation wafer, and subsequently utilizing at least one unaltered product mask to process an evaluation-region-of-interest on the evaluation wafer.
Pdf Solutions, Inc.

Solar cell emitter characterization using non-contact dopant concentration and minority carrier lifetime measurement

A method and apparatus for estimating an effect of variations of wafer properties on operating parameters of photovoltaic cells during manufacturing is provided. Measurements of emitter sheet resistance, minority carrier lifetime, and wafer resistivity of a wafer are obtained during manufacture of the wafer into a photovoltaic cell.
Aurora Solar Technologies (canada) Inc.

Information management device and information management method

A management device that, when a component is mounted on a substrate, acquires pickup source information that includes pickup position information of the mounted component and mounting destination information that includes mounting position information of the mounted component and memorizes mounting result information that links both the above information on an hdd. By referencing the mounting result information memorized on the hdd and obtaining the pickup source information from the mounting destination information of the mounted component, it is possible to identify the pickup position at the wafer from which the mounted component was picked up..
Fuji Machine Mfg. Co., Ltd.

Image intensifier bloom mitigation

Image intensifiers may include a photocathode that emits photoelectrons in proportion to the rate photons impact the photocathode. The photoelectrons are multiplied using a microchannel plate that includes a plurality of microchannels.
L-3 Communications Corporation-insight Technology Division

Magnetic powder and production method thereof, magnetic core and production method thereof, and coil component

A magnetic powder contains at least the first alloy powder and the second alloy powder in which those composition are different. The second alloy powder has a smaller median diameter than the first alloy powder and contains cr of 0.3-14 at %.
Murata Manufacturing Co., Ltd.

Radionuclide generation system and producing radionuclides

A method of producing radionuclides from irradiation targets in a nuclear reactor uses at least one instrumentation tube system of a commercial nuclear reactor. Irradiation targets and dummy targets are inserted into an instrumentation finger and the irradiation targets are activated by exposing them to neutron flux in the nuclear reactor core to form a radionuclide.
Areva Gmbh

System for searching data structures stored in a database

A computer-implemented method includes transmitting information indicative of an outcome questionnaire; receiving, from the first client device, answers to the series of questions; generating, based on the answers, an outcome score that is indicative of the severity of the functional limitation; determining a modifier that is indicative of a range of impairment, limitation or restriction of the portion of the user's anatomy; receiving a request to generate an insurance report, with the request comprising a selected type of functional limitation and a visit type; identifying a code that is indicative of the functional limitation that is being treated by the service provider and that is indicative of a point in time in a course of treatment of the user; generating, based on the identified code and the modifier, the insurance report; and submitting the insurance report to an insurance provider.. .

Systems and methods for medical diagnosis and biomarker identification using physiological sensors and machine learning

Predictive healthcare systems utilize the signal produced by physiological and, in some embodiments, environmental sensors to infer, computationally, a physiological parameter of the patient. The physiological sensors may include a vibro-acoustic sensor in contact with a patient over at least the frequency band 0.001 hz to 40 khz and a bio-electric sensor.

Method for creating a personalized memory compilation for collaborative therapeutic reminiscence

The present invention may provide a method and apparatus for generating a personalized memory compilation, soliciting memories from members of a first group, collecting content from one or more data for the memories into a content collection, identifying preferences of the members of the first group, analyzing portions of the content collection to identify collaborative memories presenting the collaborative memories to a user for indication of social support, developing latent memories from collaboration between group members, reconsolidating memories from the collaborative memories and the developed latent memories, and compiling a collaborative output from the content. The method may include steps of increasing or decreasing social support or altering perceived social support..
Applaud, Llc

Dosage confirmation apparatus

An apparatus for determining the volume of a liquid in a container. A digital camera is provided to view the container.
Digital Hospital, Inc.

Multi-application personal health record microprocessor card

A personal health record card for storing instantly accessible medical information pertaining to the individual associated with the personal health record card is provided. The memory device for storing an individual's personal health information, said memory device comprising: a memory that stores computer readable data, said memory storing: a primary information section comprising information that identifies the individual associated with the memory device and basic information related to the identity of the individual, the primary information accessible by a memory device reader without any authentication; a secondary information section comprising a first level of the individual's sensitive and confidential health information, said secondary information section being accessible only by the memory device reader after authentication; and optionally, a tertiary information section comprising a second level of the individual's sensitive and confidential health information, said tertiary information section being accessible only by the memory device reader after a second level of authentication..
Scs Card Technology Inc.

Recording medium, reproducing apparatus, and reproducing method

In a recording medium on which is recorded a multiplexed stream including a plurality of first packets (v_main) constituting a first i-picture in a first video stream and a plurality of second packets (v_sub) constituting a second i-picture in a second video stream, information for identifying the first i-picture and information for identifying the second i-picture are recorded on the medium. A recording medium can thereby be obtained that enables the rapid detection, from a small amount of information, of a particular picture included in a stream such as a ts in which multiple content streams are multiplexed..
Mitsubishi Electric Corporation

Toothed slider high density head gimbal assembly slider interconnect

A slider for use in a disk drive, the slider including a slider body having a leading surface and an opposite trailing surface, wherein the trailing surface includes portions with extensions or depressions. The extensions or depressions include a slider bond pad..
Seagate Technology Llc

Audio signal transient detection

Provided are, among other things, systems, methods and techniques for quantizing an audio signal. According to one representative embodiment, (a) an audio signal comprised of a first set of channels is obtained; (b) blocks within the channels are segmented into quantization units; (c) the first set of channels is processed so as to generate a second set of channels that includes (i) portions of the first set of channels and (ii) joint channels, with each of such joint channels being based on two channels within the first set of channels; (d) a set of quantization step sizes is initialized among the quantization units; (e) a quantization unit that contributes a largest amount of audible quantization noise is identified; (f) quantization bit(s) are allocated to that quantization unit until its audible quantization noise is reduced; and (g) steps (e) and (f) are repeated until a specified criterion has been satisfied..
Digital Rise Technology Co., Ltd.

Voice categorisation

A computer-implemented method of vocally categorising a user includes receiving, by a sound data input, a vocalisation by the user and determining, by a processor coupled to the data input, a plurality of individual confidence scores by comparing the received vocalisation to vocalisations of a plurality of respective individuals stored in a memory to which the processor is communicatively coupled. Each of the individual confidence scores represents a probability that the user is a respective one of the plurality of individuals, and each of the stored vocalisations is stored in association with a corresponding category selected from a plurality of categories.
Mastercard International Incorporated

Arbitration-based voice recognition

A first voice input is detected and a first measure of confidence associated with the first voice input is determined. A message is received comprising a second measure of confidence associated with detection of the first voice input by a network device.
Sonos, Inc.

Identifying contacts using speech recognition

A system receives candidate strings from a speech recognition engine. Where the speech recognition indicates success, the candidate string may be reported or otherwise used.
Ford Global Technologies, Llc

Method and discovering trending terms in speech requests

Systems and processes are disclosed for discovering trending terms in automatic speech recognition. Candidate terms (e.g., words, phrases, etc.) not yet found in a speech recognizer vocabulary or having low language model probability can be identified based on trending usage in a variety of electronic data sources (e.g., social network feeds, news sources, search queries, etc.).
Apple Inc.

Low-dimensional real-time concatenative speech synthesizer

A method of providing real-time speech synthesis based on user input includes presenting a graphical user interface having a low-dimensional representation of a multidimensional phoneme space, a first dimension representing degree of vocal tract constriction and voicing, a second dimension representing location in a vocal tract. One example employs a disk-shaped layout.
Trustees Of Boston University

Solderless electronic system for electrical string instrument

A system for the upgrade of an electric stringed instrument for enhancing the musical or artistic performance of a user is provided. The system includes a varying number of potentiometers to be used to control the volume and tone of the instrument in combination with other electrical components such as switches and connecting output jack to be part of the system.

System and wireless control of signs

A system includes a master controller disposed on a transit vehicle, a peripheral device disposed on the transit vehicle, a first wireless subsystem communicably coupled to the master controller, and a second wireless subsystem communicably coupled to the peripheral device. The master controller is operable to send a signal to the peripheral device via the first wireless subsystem, the signal comprising a command related to operation of the peripheral device.
Luminator Holding Lp

Student progress system

Aspects of the disclosure relate to generating and monitoring one or more student programs. For example, one or more processors may load education data corresponding to one or more students.
Huntington Mark, Llc

Systems and methods for selecting optimal variables using modified teaching learning based search optimization technique

Systems and methods include initializing a trainees population (tp), calculating an objective function (of) of the tp to identify a trainer. A teaching pool is created using variables of each trainee and the identified trainer, and unique variables are added to obtain an updated teaching pool (utp).
Tata Consultancy Services Limited

Method and parking system for supported parking of placement vehicles

A method supports parking of placement vehicles in a parking system of a parking lot having at least one parking system apparatus. A parking region of the parking lot is scanned by a parking region sensor of the parking system and, based on the sensor information, a free and/or an occupied parking space and/or a free and/or an occupied parking area is identified by the parking system apparatus.
Siemens Aktiengesellschaft

Personal safety monitoring

A method of monitoring and a monitoring device for detecting notable behaviors of other persons, by monitoring for and capturing unique identification information for persons, such as biometric (e.g., facial recognition) data or identifiers broadcast from mobile devices. Records of detected unique identification information are stored in memory with location, day and/or time of day, so that newly detected identification information can be compared to that previously stored data and location, day and/or time.

Determination of filling levels at the checkout terminal

A checkout terminal, and method of using, having a goods receiving area for receiving goods, a goods recording area for recording the data of the goods, and a goods dispensing area for dispensing the goods. The checkout terminal further has a control unit configured for controlling the operation of the checkout terminal.

Verifiable transfer of data over a network

A method of conducting a verifiable transfer of data over a network comprising generating a batch of data sets (18) at a secure database (14), each of the data sets comprising an identifier (22) and an indexed array of digital symbols, and transferring an encrypted version (30) from the secure database to a public database (28). The method, which may be performed in an environment like an on-line lottery, further comprises selecting one of the data sets of the batch and removing the selected data set from the batch and transferring the digital symbol associated with a user-selected index of the indexed array of digital symbols of the selected data set from the secure database to the user-operated device.
Alm. Dansk Vare- Og Industrilotteri

Mobile device applications for casinos

A wagering game system configured to perform operations to transmit to a mobile device, via a wireless communication device of the gaming system, an offer for presentation via the mobile device in response to detecting that the mobile device is located at a casino. The offer is associated with a wagering game machine within the casino.
Bally Gaming, Inc.

Bezel assembly for use with an automated transaction device

A bezel assembly for data reception is provided for use in a transactional device that comprises a door attached to open and close. The bezel assembly comprises: a casing secured to the door, an interior insertion/dispensing slot formed in the casing, a hollow tongue or protrusion forward-extending from the casing to define a bottom surface of the interior insertion/dispensing slot, and a wireless communication module arranged in the hollow tongue or protrusion for communication with a built-in nfc chip in an identification card when put in the interior insertion/dispensing slot to identify a user of the identification card..
Jcm American Corporation

Utilization of work order data in an automated tool control system

An inventory control system is provided for monitoring the removal and replacement of objects stored in the system. The system includes a storage container including a plurality of storage locations for storing objects; a sensing device configured to detect the presence or absence of objects in the storage locations; a display device; and a data processor.
Snap-on Incorporated

Telematics-based vehicle value reports

A system and method of providing a telematics-based vehicle value report. The method includes: receiving a vehicle identity at a central facility; wirelessly transmitting a request for vehicle sensor data to a vehicle identified by the received vehicle identity via a wireless carrier system; wirelessly receiving the vehicle sensor data from the identified vehicle via the wireless carrier system; accessing, at a central facility, standard vehicle data values for vehicles within a vehicle group that includes the identified vehicle; constructing a vehicle value report which includes information that is based on a comparison of the received vehicle sensor data with the standard vehicle data values; and electronically transmitting the vehicle value report to a requesting entity.
General Motors Llc

Context-aware tagging for augmented reality environments

A method for tag-based search includes capturing an image, extracting a tag from the image, identifying a location associated with the captured image, and querying stored content for information that matches the location and the tag. Local storage is checked for the information first, and remote storage may be checked subsequently.
International Business Machines Corporation

Optimization of an automatically meshable shapes

A computer-implemented method of optimizing an automatically meshable shape is provided. The method includes the steps of: providing a continuous boundary of the automatically meshable shape, the continuous boundary being defined by a spline formed by two or more spline segments, wherein each segment has a terminal point at each end of the segment; parameterising shape properties of the segments such that selected ones of the shape properties can be varied under operation of an optimization algorithm; linking each segment to its immediately adjacent segments such that the terminal points of the segment remain coincident with the terminal points of its immediately adjacent segments under operation of the optimization algorithm; and using the optimization algorithm to vary selected ones of the shape properties of the segments, whereby the spline defines an adjusted boundary that remains continuous so that the shape remains automatically meshable..
Rolls-royce Plc

Data processing apparatus, three-dimensional object molding system, and non-transitory computer readable medium

A data processing apparatus includes a receiving unit that receives first data that defines a shape of and a color of a surface of a three-dimensional object on each specific surface region of the three-dimensional object, and a generating unit that generates color voxel data from the first data. The generating unit assigns plural color components to plural surface voxels in accordance with color information on the color of the surface in the first data, starting with surface voxels, in a priority order of the color components from one having a lower lightness value to another having a higher lightness value, and does not assign an achromatic color component to a surface voxel if a density of the color of the surface in the first data is less than 100 percent..
Fuji Xerox Co., Ltd.

Hidden culling in tile-based computer generated images

A method and system is provided for culling hidden objects in a tile-based graphics system before they are indicated in a display list for a tile. A rendering space is divided into a plurality of regions which may for example be a plurality of tiles or a plurality of areas into which one or more tiles are divided.
Imagination Technologies Limited

Data processing apparatus, three-dimensional object creating system, and non-transitory computer readable medium

A data processing apparatus includes an accepting unit that accepts first data defining, for each specific surface region, a shape of a three-dimensional object and a color of a surface of the three-dimensional object; and a generating unit that generates color voxel data from the accepted first data, the generating unit generating the color voxel data so that color information indicative of presence of a color is given to inner voxels within a larger depth from a surface voxel in a region of the first data where a density of the color of the surface is higher than in a region of the first data where the density of the color of the surface is lower.. .
Fuji Xerox Co., Ltd.

Surface material pattern finish simulation device and surface material pattern finish simulation method

A device for generating a simulation image including circuitry which obtains information including normal vector map and light source information about a source of light to be applied to a surface of a material, calculates incident light information about incident light to each of pixels in an image to be generated as simulation of a finish of a pattern including a picture and an uneven shape on the surface, calculates a radiance of reflected light from the surface with respect to each of the pixels in the image, based on calculation information including the incident light information, the normal vector map, diffuse reflectance information about the picture, gloss information indicating gloss of the surface, and observation condition information about the material, and controls display of the image based on the radiance of each of the pixels.. .
Toppan Printing Co., Ltd.

System and identifying graphics workloads for dynamic allocation of resources among gpu shaders

A gpu filters graphics workloads to identify candidates for profiling. In response to receiving a graphics workload for the first time, the gpu determines if the graphics workload would require the gpu shaders to use fewer resources than would be spent profiling and determining a resource allocation for subsequent receipts of the same or a similar graphics workload.
Advanced Micro Devices, Inc.

Radiographing apparatus, radiographing system, radiographing method, and storage medium

A radiographing apparatus for identifying a contour of a predetermined target structure of a subject in an image, includes an area setting unit configured to set a contour search area where the contour is to be searched based on anatomical features of the structure of the subject, a contour candidate setting unit configured to set a contour candidate of the target structure, and a contour adjustment unit configured to adjust the contour candidate to approximate the contour candidate included in the contour search area to the contour of the target structure.. .
Canon Kabushiki Kaisha

Dynamic color determination for user interface components of a video player

A user interface adaptation module identifies a dominant color of a frame of a video and, based on the dominant color, generates colors for components of a user interface in which the video is displayed. The colors of the user interface components are set based upon the generated colors and upon context information such as a playing state of the video.
Google Llc

Systems and methods for in-field stereocamera calibration

Systems and methods for in-field camera calibration in a stereovision system may include using a plurality of cameras to capture an image pair, the image pair comprising images of a scene; identifying infinite points on the images of the image pair using a calibration circuit; the calibration circuit determining a disparity amount between corresponding infinite points for each camera; and the calibration circuit determining an inverse operation to reduce the determined disparity amount between the corresponding infinite points. Systems and methods may also include a calibration circuit identifying corresponding points, in which the corresponding points include a point on a first image of an image pair corresponding to a point on a second image of the image pair; determining a translational disparity amount between the corresponding points for each camera; and determining an inverse operation to reduce the determined translational disparity amount between the corresponding infinite points..
Dsi Assignments, Llc

Automatic detection and identification of brain sulci in mri

Disclosed is a method for determining a position of a brain sulcus in the brain of a patient, the method comprising executing, on at least one processor of at least one computer, steps of: acquiring, at the at least one processor, patient image data describing a digital medical image of at least part of the brain; acquiring, at the at least one processor, atlas data describing an image-based model of the at least part of the brain; determining, by the at least one processor and based on the patient image data and the atlas data, mapping data describing a transformation between the patient image data and the atlas data; and determining, by the at least one processor and based on the patient image data and the atlas data and the mapping data, sulcus position data describing the position of the brain sulcus in the digital medical image.. .
Brainlab Ag

Method and device for displaying virtual object

Provided is a method and device for displaying a virtual object that detects a main marker and a sub marker included in a reference device, identify the sub marker based on the main marker, and display a virtual object on a display device based on a relative position between the display device and the reference device calculated based on the main marker and the sub marker.. .
Samsung Electronics Co., Ltd.

Method and annotating point cloud data

The present application discloses a method and apparatus for annotating point cloud data. A specific implementation of the method includes: collecting data in a given scenario by using a laser radar and a non-laser radar sensor to respectively obtain point cloud data and sensor data; segmenting and tracking the point cloud data to obtain point cloud segmentation and tracking results; recognizing and tracking feature objects in the sensor data to obtain feature object recognition and tracking results; correcting the point cloud segmentation and tracking results by using the feature object recognition and tracking results, to obtain confidence levels of the point cloud recognition and tracking results; and determining a point cloud segmentation and tracking result whose confidence level is greater than a confidence level threshold as a point cloud annotation result.
Beijing Baidu Netcom Science And Technology Co., Ltd.

Method for implementing control of display of highlighted area on display

This invention discloses a method to control highlighting of certain part of image on a display, wherein the image processing unit forwards the physical coordinates acquired by the host computer's coordinate acquisition unit to the coordinate transmission unit, and draws a regular shape centered on the acquired physical coordinates, and then displays the area within the regular shape at the normal brightness, and the rest outside the area at the corresponding proportion of low brightness. According to the method of the present invention, the attention of the doctor is focused on the specific or targeted area, the interferences caused by the surrounding images and the brightness are shielded, and the images in the specific pattern area is easier to identify.
Nanjing Jusha Display Technology Co., Ltd.

Inspection apparatus, inspection system, inspection method, and recording medium

An inspection apparatus, system, and method, each of which: acquires a master image serving as an inspection reference, the master image being generated based on image data to be printed as a printed image; acquires a read image read from the printed image; extracts a neighboring region neighboring an edge region of the master image; determines whether a change amount of density of pixels in the neighboring region falls within a predetermined range; based on a determination that the change amount of density of pixels in the neighboring region falls within the predetermined range, calculates a statistic of density of pixels in a corresponding region of the read image, which corresponds to the neighboring region of the master image; and determines existence or non-existence of a defect in the corresponding region of the read image based on the statistic of the corresponding region.. .

Selective scaling for user device display outputs

Dynamic display output scaling techniques for computing systems and user devices are presented herein. In one example, a method of scaling display output for a user device includes, based at least in part on a display device being communicatively coupled to the user device, identifying one or more display properties from the display device.
Microsoft Technology Licensing, Llc

Gpu resource allocation method and system

The present invention provides a gpu resource allocation method. A to-be-distributed kernel program in a kernel status register table is identified by using a global logic controller (201).
Huawei Technologies Co., Ltd.

System and dynamically allocating resources among gpu shaders

A gpu stores resource allocations for a plurality of shaders to process processing a graphics workload, and applies those stored resource allocations when the same or a similar graphics workload is received subsequently by the gpu. In response to receiving a new graphics workload with a given unique identifier for the first time, the gpu employs a series of performance monitors to measure performance characteristics for processing the workload.
Advanced Micro Devices, Inc.

Systems and methods for registering personal electronic devices (peds) with an aircraft in-flight entertainment (ife) system

Systems and methods are disclosed for registering personal electronic devices (peds) with an aircraft in-flight entertainment (ife) system. Some methods include generating a different token image for each ife passenger seat display, each generated token image comprising unique information for registering the peds with the ife system.
Livetv, Llc

System and classification and authentication of identification documents using a machine learning based convolutional neural network

The present disclosure describes systems and methods to classify and authenticate id documents based on the information contained on the face of the id document. This present system can automatically classify, authenticate, and extracting data from documents using artificial intelligence (ai) based machine learning for image recognition.
Confirm, Inc.

Method and system for information management for an incident response

A method and system for information management for an incident response. The method comprises the following steps: a first communication allocating a responder to a specific assignment relating to the incident is received at a computing device from a command device.
Motorola Solutions, Inc

System, managing pharmacy inventories

A system, apparatus and method manages a product inventory of two or more vendors. A demand for each product at each vendor is determined based on a product utilization data stored in one or more databases.
Supplylogix, Llc

System and distributing imperative services and products

An imperative service system includes at least one server computer that is adapted to communicate with resident electronic devices and property owner systems over internet. The imperative service system receives an imperative service licensing request with input data entered via an imperative service licensing web page, and generates an individualized property web address for a property or a set of properties.

Transactions and linked assets on a blockchain

A blockchain configuration may log asset data as well as transaction data. One example method of operation may include logging a transaction on a blockchain, linking assets to the transaction, recording a current asset state on the blockchain of the assets responsive to linking the assets to the transaction, determining parties to the blockchain transaction have requirement criteria associated with the current asset state, and monitoring the current asset state to identify whether a lapse in the requirement criteria has occurred..
International Business Machines Corporation

Object value range optimization based on inter-object relationships

A range reduction system reduces the range and size of possible values for a target object within an exchange computing system by identifying all possible routes from known object values to the target object. Each route may include a pair of high and low values, and each route may expand the target object range.
Chicago Mercantile Exchange Inc.

Financial status display

Systems and methods are provided for displaying account information. The systems and methods may include a status display device connected to a network in a home or office environment.
Capital One Services, Llc

Augmented reality device and product purchase facilitation

An augmented reality device and method for product purchase facilitation using an augmented reality device are provided. The device includes a display module configured to provide augmented reality visual content, the augmented reality visual content including a virtual image of a product, a biometric authentication module configured to receive biometric data relating to a user and authenticate the user based on the received biometric data, and a transceiver module configured to receive, from a user device, digital payment credentials for facilitating purchase of the product, and transmit the digital payment credentials to a payment processing module for product purchase upon successful authentication of the user..
Mastercard Asia/pacific Pte. Ltd.

Systems, devices and methods for monitoring objects in a cart

A technique for monitoring objects in a cart is disclosed. A cart is configured to receive an object and includes a plurality of sensors configured to detect a location of the cart and a characteristic of an object in the cart.
Wal-mart Stores, Inc.

Methods and native page generation

Methods, apparatus, computer applications, and systems are provided for enabling identification of content to be compiled into a shopping application at a user device. In one embodiment, a general layout for a number of content modules to be displayed and identifying information for content to be inserted are provided from a network server to a user device, the user device then calls the appropriate content and utilizes the layout to generate a page for display to the user natively.
Under Armour, Inc.

Identifying physical tools to manipulate physical components

An approach is provided that captures a digital image of an object, such as a piece of home improvement hardware, that has any number of facets. From the captured digital image, the approach determines an actual size the object's facets, and further identifies any number of hardware tools that can be used to manipulate the hardware object based in part on the actual size of the object's facets..
International Business Machines Corporation

Intelligent online personal assistant with multi-turn dialog based on visual search

Systems, methods, and computer program products for identifying a relevant candidate product in an electronic marketplace. Embodiments perform a visual similarity comparison between candidate product image visual content and input query image visual content, process formal and informal natural language user inputs, and coordinate aggregated past user interactions with the marketplace stored in a knowledge graph.
Ebay Inc.

Product schematics collection and projection

A method of projecting a likeness of an item onto a surface is disclosed. A determination that a user is interested in an item is made.
Ebay Inc.

Providing better customer service by analyzing customer communications

The present disclosure provides a system and method for analyzing customer communications to provide better customer service including generating customer related data from communications of a customer by at least one sensing device located in a venue, transmitting the generated customer related data to an analysis engine, determining based on an analysis of the customer related data a customer experience, identifying at least one suggestion to provide better customer service including the identification of a representative of the venue that the analysis engine has determined can assist the customer, and receiving the at least one suggestion including an indication that the representative should assist the customer from the analysis engine by a computing device associated with the representative of the venue.. .
International Business Machines Corporation

Visual discovery tool for automotive manufacturers with network encryption, data conditioning, and prediction engine

A visual discovery tool for automotive manufacturing with network encryption, data conditioning, and prediction can include an extraction device configured to receive data records from application-specific file source databases. The tool can further include a vehicle alert database that receives the vehicle records from the plurality of extraction databases.
Autoalert, Llc

Computer system for calculating translation costs

The present disclosure relates to a computer system, computer program product and computer implemented method for automatically calculating translation costs based upon translation memory analysis. This involves receiving an original document and a source-target language pair, comparing the original document with previously translated text or the translation memory database corresponding to the source-target language pair and computing a modified word count reflecting the degree of overlap between the original document and the previously translated text based on the comparison.
Rws Translations Ltd

System for producing signs and linking to online sales listin

The present invention is a method of mass production of signs that begins with random generation of three linked unique identification codes. A generic sign template with preselected areas for inserting the three linked unique identification codes is generated.
Sign2web Inc.

Ad bidding based on a buyer-defined function

An ad processor evaluates bid functions that are based on concepts that might be generated from interpretations of natural language expressions. Ad buyers provide the functions with corresponding ads to ad processors.
Soundhound, Inc.

System and providing people-based audience planning

Systems and methods for targeted advertising to specific consumers are disclosed. A system may include a memory storing instructions and at least one processor configured to execute the instruction to: receive, over a network, client-provided data from a client device; identify at least one consumer by comparing the client-provided data against consumer data recorded in an electronic consumer database; obtain at least one unique consumer identifier for the identified at least one consumer, the at least one unique consumer identifier not including personal identifiable information; generate a target audience pool based on the at least one unique consumer identifier; and deliver, over a network, the target audience pool to the client device to facilitate targeted advertising to specific consumers..
Merkle, Inc.

Offer selection using sequential selection operations

A combination of two or more offers may be selected from a plurality of offers to be served to potential respondents, in a method performed using one or more processors in a computing system. The method of selecting may comprises receiving a request for a selection of a combination of two or more offers from the sets of offers; in response to the request: performing a series of selection operations each resulting in the selection of one offer to be included in the combination, each selection operation being carried out according to a respective model including one or more variables.
Nice Ltd.

Assessing state information for retail displays

Systems and methods for using wireless beacons in point of purchase (“pop”) displays to facilitate the delivery of consumer oriented content to mobile devices is disclosed. Wireless beacons may be used to broadcast wireless signals from pop displays, where the wireless signals include data packets with unique identifiers for the wireless beacons.
Shelfbucks, Inc.

Geofencing with wireless beacon based consumer product marketing

Systems and methods for using wireless beacons in point of purchase (“pop”) displays to facilitate the delivery of consumer oriented content to mobile devices is disclosed. Wireless beacons may be used to broadcast wireless signals from pop displays, where the wireless signals include data packets with unique identifiers for the wireless beacons.
Shelfbucks, Inc.

Media content provision

Technologies are generally described for a media content provision scheme. In some examples, a method to provide audience-centric content may include identifying a targeted user from among one or more users proximate to an electronic device based, at least in part, on information regarding previous media selections by each of the one or more users; and providing the one or more users with media content directed to the targeted user..
Empire Technology Development Llc

Systems and methods for checking a user into a location using a packet sequence including location information

Systems and methods are disclosed which may allow a user having a mobile device to check in to a location using a packet sequence that includes information for identifying the location transmitted by one or more bluetooth® low energy (ble) beacons at or near the location. The user may be able to store packet sequences for various locations that may allow the user to automatically check into these locations using the store packet sequences..
Paypal, Inc.

Method for identifying bundled software and apparatus therefor

A method for identifying bundled software and an apparatus therefor. The method comprises: detecting a user interface for software installation; acquiring text information on the user interface; determining whether bundled software exists; and, based upon the determination, extracting the name and amount of bundled software from the text information and prompting the name and the amount of the bundled software.
Iyuntian Co., Ltd.

Method and system for grouping of customers for targeted advertising

A system and method are provided for grouping customers from a pool of customers of a financial institution to subsequently receive advertisements. The method includes: retrieving, by a data collection module, identifier data of each customer in the pool of customers; retrieving, by the data collection module, financial information of each customer in the pool of customers based on the identifier data; determining, by an affordability condition determination module and for each customer, an affordability condition based on the financial information; determining, by a price parameter determination module, a price parameter for each advertisement; comparing, by an advertisement comparison module and for each advertisement, the price parameter against the affordability condition of each customer; and allocating, by a customer allocation module and for each advertisement, customers into a group of customers to subsequently receive the advertisement, if the price parameter satisfies the affordability conditions of the customers..
Mastercard International Incorporated

Systems and methods for a platform to manage and execute marketing campaigns

A system receives a marketing campaign from an advertiser. The marketing campaign identifies tasks to be performed by users on social networks.
Qwasi, Inc.

Detecting differing categorical features when comparing segments

Techniques are disclosed for identifying, assessing, and presenting differences between segments of customers. The techniques identify differences in categorical features of the customers in two segments.
Adobe Systems Incorporated

Survey based on user behavior pattern

Identifying availability of a user and prompting the user about a survey that is due to be completed. The identification of availability is based on defined behavior patterns of the user.
International Business Machines Corporation

Systems and methods for sentiment insight in electronic media postings

A method for obtaining sentiment in electronic media postings includes a media stream parser unit monitoring electronic media postings present on an electronic communication network, displaying a selected electronic media posting on a display device of a client computing device, receiving an indication from a pointing device connected to the client computing device of an entity identifier within content of the selected electronic media posting, analyzing the content of the electronic media posting to identify a sentiment expression in the content, a sentiment analysis unit applying ranking rules to determine a sentiment ranking for the sentiment expression, and providing the sentiment ranking to the display device upon receiving the indication. A system to implement the method and a non-transitory computer-readable medium are also disclosed..
Sap Se

Open registry for provenance and tracking of goods in the supply chain

An identity system for the internet of things (iot) that enables users and machines to identify, authenticate and interact with items/goods without relying on a third-party-controlled authentication service. The system includes tags having alphanumeric values and coupled to items/goods and an open registry database and ledger where digital records associated with the items/goods is able to be stored.
Chronicled, Inc

Graphical user interface (gui) within crm solution enabling user-defined rules for connected devices

A computer-implemented method includes the step of providing a graphical user interface (gui) that is accessible by users within a customer relationship management (crm) solution. The gui enables the users to define rules with each rule including one or more conditions and one or more associated actions to be taken upon the meeting of the one or more conditions.
Mapanything, Inc.

Increasing efficiency and effectiveness of support engineers in resolving problem tickets

Determining next actions for resolution of a plurality of problem tickets is provided. A set of quantitative metrics corresponding to the plurality of problem tickets is identified.
International Business Machines Corporation

Secure encryption using genomic information

The invention provides an improved genomics-based method and apparatus for identification, authentication, and verification. Genomic information from an individual's genome, is used as an encryption key in methods, systems and apparatus for transmitting data in an encrypted fashion.
Systems Imagination, Inc.

A method to validate a dynamic security code in a payment transaction

This invention related to a method to validate a dynamic security code generated for a payment transaction, said method comprising the steps of: providing for a given payment transaction a dynamic security code associated to an identifier of said transaction; verifying using a verification memory if the provided dynamic security code has already been validated when associated to the same associated identifier; if not, verifying the validity of the provided dynamic security code; if the provided dynamic security code is valid, memorizing in the verification memory the provided dynamic security code, the associated identifier of the payment transaction.. .
Gemalto Sa

System for logging and reporting driver activity and operation data of a vehicle

An automated at-the-pump method manages vehicle fuel purchases at a fuel station. The method includes transmitting driver identification data to a mobile device assigned to a vehicle driver.
Innovative Global Systems, Llc

Systems and methods for authenticating a user using private network credentials

A cardholder authentication computing device for authenticating user computing devices during online payment transactions are provided. The cardholder authentication computing device leverages pre-authentication of a user by a private network to facilitate authentication of a user in the context of an online payment transaction between the user and a merchant.
Mastercard International Incorporated

Method and system for a virtual payment card funded by multiple sources

A method for processing transaction data includes: receiving a generation request to generate a common account number, the request including identification information of a plurality of funding accounts and a plurality of authorizations to charge the funding accounts for a respective portion of a future payment transaction; generating the common account number; transmitting the common account number to the communication device; receiving a payment authorization request including an amount and the common account number; allocating portions of the amount to the respective funding accounts; respectively transmitting authorization requests to pay the respective portions to one or more servers of financial institutions providing the plurality of funding accounts; receiving payment authorizations in response to the plurality of authorization requests; respectively debiting the plurality of funding accounts for the allocated portions of the amount; and transmitting an authorization signal in response to the payment authorization request in accordance with the received authorizations.. .
Mastercard International Incorporated

Method and system for supplying a token in a host card emulation system comprising first and second devices

The invention relates to a method and system for supplying a token in a host card emulation system comprising first and second devices and a secure payment platform, the method comprises the steps of transfer by the second device to the first device an identifier of the second device, reception by the second device of a first token and an identifier of the second device, the first token being a symmetrical derivation of a second token of the first device with the identifier of the second device, transfer by the second device of a message comprising a cryptogram signed with the first token, the identifier of the first device and predetermined information indicating that the first token has been transferred by a third party.. .
Idemia Identity & Security France

Systems and methods for contactless and secure data transfer

In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system.
Capital One Services, Llc

Location-based device and authentication system

Systems and methods for device and payment management include detecting, through a first network, that a user device that is associated with a user is located at a trusted location. A first anticipated activity that is associated with the user is determined.
Paypal, Inc.

Voice triggered transactions

A voice checkout system and method for electronic commerce uses a voice command to not only initiate/trigger a transaction but also to carry it out with stored information, notifying the pos station/online shopping cart that the transaction has been completed. A customer's microphone provides a recording of a verbal purchase command candidate which is submitted by a portal to a third party processor to verify that the customer is registered and the payment is processed (by the third party processor).

Systems and methods for generating aggregated merchant analytics for a geographic sector using tip data

A merchant analytics computing device for generating aggregated merchant analytics for a geographic sector using tip data is provided. The merchant analytics computing device is programmed to define a plurality of geographic sectors and receive transaction data occurring within a period of time.
Mastercard International Incorporated





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.


1.8012

file didn't exist11779

489195 - 0 - 286