Follow us on Twitter
twitter icon@FreshPatents


Den patents

      

This page is updated frequently with new Den-related patent applications.




 Component mounter patent thumbnailComponent mounter
A component mounter for holding a component and for mounting the component on a surface of a board includes a head, a horizontal moving device, a vertical moving device, a mounting control device, and an imaging device. The imaging device is configured to image an imaging target by receiving incident light from the imaging target on an imaging element via an optical system.
Fuji Machine Mfg. Co., Ltd.


 Immersion cooling patent thumbnailImmersion cooling
A method of apparatus for immersion cooling electronic equipment including immersing the electronic equipment in a pressure-sealed tank containing a heat transfer fluid and including a vapor space fluidicly coupled to a condenser; operating the electronic equipment to generate heat and evaporate some of the heat transfer fluid, causing heat transfer fluid vapor to enter the condenser; condensing the heat transfer fluid vapor in the condenser to produce a condensate; returning the condensate to the tank; and increasing power consumption to increase heat generated by the electronic equipment and develop an increased pressure of the heat transfer fluid vapor to bring the apparatus into an equilibrium condition.. .
Bitfury Group Limited


 Circuit module such as a high-density lead frame array power module, and  making same patent thumbnailCircuit module such as a high-density lead frame array power module, and making same
A circuit module includes a plurality of electronic components and a single-layer conductive package substrate. The single-layer conductive package substrate is adapted to physically support and electrically interconnect the electronic components.
Intersil Americas Llc


 Methods and systems of proactive monitoring and metering of lighting devices patent thumbnailMethods and systems of proactive monitoring and metering of lighting devices
Various embodiments of methods and systems of proactive monitoring and metering of lighting devices are described herein. A light monitoring and metering system may include a specification database that stores the technical specification of the lighting device, a usage database that records the usage data of the lighting device, a data acquisition subsystem that obtains the identity of the lighting device in use, and a data processing subsystem that meters the usage or calculates the lumen output of the lighting device or the remaining lifetime of the driver of the light device..
Lightel Technologies, Inc.


 Systems and methods providing improved success rate for rrc connection reestablishments patent thumbnailSystems and methods providing improved success rate for rrc connection reestablishments
Systems and methods that provide improved success rates for connection reestablishments in a cellular communications system are disclosed. Embodiments of a radio access node in a cellular communications system enabling connection reestablishment for a wireless device to a target cell controlled by the radio access node are disclosed.
Telefonaktiebolaget L M Ericsson (publ)


 Optimization of power consumption in dual sim mobiles in connected mode in a wireless network patent thumbnailOptimization of power consumption in dual sim mobiles in connected mode in a wireless network
A method of optimizing connection mode procedures for a dual subscriber identity module (sim) mobile communication device is provided. The method includes receiving, by a base station, a paging message for a first sim in an idle mode from a core network; determining, by the base station, if a radio resource control (rrc) connection linked with the first sim is available or not; triggering, by the base station, a second paging type message for the first sim with a normal cause through the rrc connection linked with the first sim if the rrc connection of the first sim is available; determining, by the base station, if a rrc connection linked with a second sim is available or not if the rrc connection of the first sim is not available; triggering, by the base station, a second paging type message for the first sim with a mapped new cause through the rrc connection linked with the second sim if the second sim is available; and triggering, by the base station, a first paging type message with a temporary identity and a cause received in the paging message from the core network through a paging channel if the rrc connection linked with the second sim is not available..
Samsung Electronics Co., Ltd.


 Determining device in-range proximity patent thumbnailDetermining device in-range proximity
Devices and methods are provided for determining the proximity of client nodes within a wireless-enabled communication environment. A first client node comprises a database containing identification data associated with a plurality of wireless network access nodes and fingerprint data associated with the client node and a plurality of second client nodes.
Blackberry Limited


 Connection establishment patent thumbnailConnection establishment
A connection establishment method includes receiving a service connection request sent by a first client, wherein the service connection request comprises a service identifier and a client identifier of a second client requested for connection, acquiring connection reference information, and when it is determined that the connection reference information satisfies a service restriction condition corresponding to the service identifier, establishing a connection between the first client and the second client corresponding to the client identifier.. .
Alibaba Group Holding Limited


 System and  device identification and authentication patent thumbnailSystem and device identification and authentication
A method for providing relay services to a remote device (rd) includes receiving a relay service request from the rd, the relay service request including at least an identifier of the rd, and the rd is not in active radio communications with an entity of the communications system, restricting relay services on communications from the rd, sending a first authentication request including at least a portion of the relay service request to a network node, receiving a second authentication response confirming the identity of the rd, and unrestricting the relay services on communications from the rd.. .
Futurewei Technologies, Inc.


 Numerology dependent signal transmission patent thumbnailNumerology dependent signal transmission
Methods, systems, and devices for wireless communication are described. The methods, systems, and devices provide for identifying tone spacing for transmission or reception of signals.
Qualcomm Incorporated


Methods and arrangements for device discovery

The present disclosure relates to methods and devices for transmission of discovery signal signals and detection of discovery signal signals for device-to-device communication. According to some aspects, the disclosure relates to a method executed in a wireless terminal for transmitting a control signal for enabling device-to-device, d2d, discovery, wherein the control signal carries an identity.
Telefonaktiebolaget Lm Ericsson (publ)

V2v-based resource allocation method and apparatus

Embodiments of the present invention relate to a v2v-based resource allocation method and apparatus. The method includes: receiving a resource request message sent by first user equipment; identifying, according to the resource request message, a level type corresponding to the first user equipment; if the level type is a high priority type, and a quantity of blocks of idle v2v resources in a first resource pool is less than a first preset threshold, or a quantity of required resource blocks that is calculated and a modulation and coding scheme is greater than a quantity of blocks of idle v2v resources in a first resource pool, allocating a v2v resource to the first user equipment.
Huawei Technologies Co., Ltd.

Location guided vehicular channel management

A method, an apparatus, and a computer-readable medium for wireless communication are provided. In one aspect, an apparatus is configured to determine device information associated with the apparatus.
Qualcomm Incorporated

Method for selecting control channel, and apparatus

Embodiments of the present invention disclose a method for selecting a control channel, and are applied to a communication system, to enable ue to select a control channel suitable for itself in a multi-control channel communications system. The method includes: listening, by ue, to a first control channel, and measuring a value of a performance parameter of a signal received by using the first control channel, and the first control channel is one of the at least two control channels; and when determining, according to the value of the performance parameter, that the first control channel meets a residence condition, determining the first control channel as a target control channel, where the target control channel is used to receive downlink control information sent by a base station..
Huawei Technologies Co., Ltd.

Determining device location in an ip-based wireless telecommunications network

A system and method determines a geographic position of a mobile device in communication with an ip-based wireless telecommunications network. A wireless connection between the mobile device and the ip-based wireless telecommunications network is established when the mobile device registers with a network controller (nc) through an access point (ap).
T-mobile Usa, Inc.

Enhanced mechanism of uplink time alignment maintenance for inter-enb carrier aggregation

Apparatus and method are provided to configure two-tier identifiers for serving cells of a ue configured with inter-enb carrier aggregation (ca). In one novel aspect, cell group identifiers are configured.
Mediatek Singapore Pte. Ltd.

Trigger frame in wireless local area network

The present disclosure provides various aspects related to techniques for generating trigger frames, at an ap, that reduce the overhead associated with triggering an uplink transmission from the sta. In some examples, the sta may also calculate its transmit power by decoding a spatial reuse subfield of the trigger frame from the ap and identifying downlink pathloss measurements of the trigger frame.
Qualcomm Incorporated

Power saving mechanism for mobile terminal

A mobile terminal for participating in a mobile network and adapted to perform a power consumption sensitive cell reselection includes a detector configured to detect presence of a first possible connection to the mobile network via a first technology, and a second possible connection to the mobile network via a second technology. A selector is configured to identify which of the first possible connection and the second possible connection causes less energy consumption in the mobile terminal in a low-power mode of operation.
Gemalto M2m Gmbh

Systems, methods, and computer program products for managing access to femtocell coverage

Systems, methods, and computer program products are disclosed for managing access to a femtocell coverage area. An exemplary method includes storing in a memory component a first identifier corresponding to a subscribed service of a communication device and a second identifier corresponding to a user of the communication device, and granting access to the femtocell coverage area using the second identifier..
At&t Intellectual Property I, L.p.

Communication terminal, content delivery system, content delivery method, and communication terminal control program

A content delivery method enabling a communication terminal to acquire a content held by a passing communication terminal with a lightened communication load between the communication terminals is provided as follows in the present invention. The content delivery method according to the present invention includes storing a content and a content holder list listing a content holder that holds the content, in a mutually associated manner, receiving an external signal, detecting a neighboring communication terminal, and outputting a terminal identifier of the neighboring communication terminal included in the external signal.
Nec Corporation

Method and performing handover of user equipment in wireless communication system supporting dual connectivity

Disclosed is a method by a first base station, including transmitting, to a third base station, a first message for requesting to handover a user equipment from the first base station to the third base station, the first message including an identifier of a second base station, receiving, from the third base station, a second message corresponding to the first message, and transmitting, to the second base station, a third message for releasing the second base station.. .
Samsung Electronics Co., Ltd.

Method and connecting a mobile device to a pay-for-usage communication network

A method and apparatus for connecting/attaching a mobile device to a network. Service information, such as pricing and plan information, associated with one or more networks is provided to a mobile device.
Huawei Technologies Co., Ltd.

Methods and devices for performing circuit-switched fallback

A communication circuit arrangement may include a control circuit configured to receive an initial call notification attempt in idle mode from a first network for an incoming call that originates from a second network, establish an active connection with the first network, trigger a subsequent call notification attempt from the incoming call from the first network by disregarding the initial call notification attempt, and presenting a user with caller identity information for the incoming call provided in the subsequent call notification attempt.. .
Intel Ip Corporation

User terminal and base station

A user terminal according to a first feature is used in a mobile communication system. The use terminal includes: a receiver configured to receive a measurement instruction to instruct measurement in an unlicensed band, from a base station; a controller configured to, in response to reception of the measurement instruction, search for a radio signal transmitted in a frequency channel included in the unlicensed band, and measure reception power of the radio signal detected by the search, even when a cell identifier of a measurement target cell is not designated in the measurement instruction; and a transmitter configured to transmit a measurement report including an identifier of a transmission source of the detected radio signal and a measurement result of the reception power, to the base station..
Kyocera Corporation

Computer implemented method and computer programs for determining network quality indicators

The method comprising: performing a communication call between a first user (b) having a mobile device (h) with a communication application (d) installed therein which is connected to a voip communication service (f) through a communication network with a second user (a) via said communication service (f); and computing, based on information extracted from the communication call, by means of executing an algorithm running in a processor, a quality indicator descriptive of technical conditions of said communication network used for performing the communication call, wherein said information is extracted from the communication call by the communication application (d) or by the communication service (f) and includes an identifier of the communication network used, or location information of the mobile device (h) during the communication call, and quality parameters related to the communication call.. .
Telefonica Digital Espana, S.l.u.

Identifying volte to different technology types

A computer device may include a memory configured to store instructions and a processor configured to execute the instructions to detect a session initiation protocol (sip) call and identify an available technology type to carry the sip call from an originating device. The processor may be further configured to execute the instructions to generate an originating available technology type header that includes information identifying the identified available technology type to carry the sip call from the originating device and forward the sip call toward a destination with the generated originating available technology type header..
Verizon Patent And Licensing Inc.

Managing licensed and unlicensed communications using cellular protocols

A system and method of identifying licensed and unlicensed communications over a cellular protocol includes: wirelessly transmitting a communication session request from a wireless device to a wireless carrier system using the lte cellular protocol; receiving a response at the wireless device from the wireless carrier system indicating that the wireless carrier system is providing a communication session using a licensed communications frequency band or an unlicensed communications frequency band; and establishing communications from the wireless device via the wireless carrier system based on whether the wireless carrier system is providing cellular communications via the licensed communications frequency band or the unlicensed communications frequency band.. .
General Motors Llc

Handheld video visitation

An inmate mobile device for communicating with an outsider mobile device is provided. An identity data item, of the device, includes an inmate identifier of an inmate user of the inmate mobile device, a verified data and a restrictions repository.
Intelmate Llc

Establishing secure communication at an emergency care scene

Among other things, we describe a system that includes a first medical device for treating a patient at an emergency care scene, the first medical device including a processor and a memory configured to detect a request for a connection between the first medical device and a second medical device for treating the patient at the emergency care scene, the request for connection including an identifier of the second medical device, responsive to receiving the request for connection, enabling a wireless communication channel to be established between the first medical device and the second medical device based on the identifier of the second medical device and an identifier of the first medical device; and enabling transmission and/or exchange of patient data between the first medical device and the second medical device via the wireless communication channel. Such communications with more than two devices may also be possible..
Zoll Medical Corporation

Method and system of user authentication and end to end encryption using device synchronization

In one aspect, a computerized method for implementing user authentication using, device synchronization to match that includes the step of accessing a web page. The web page includes an agent.

Identifying devices with transpositional modulation

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting, by a first device, a transmission signal that includes a carrier signal modulated with a tm signal. Receiving a response signal from a second device in response to the transmission signal.
Tm Ip Holdings, Llc

Euicc card storing short numbers by subscriber profile to notify a subscription management server

The disclosure relates to the notification of an sm-sr subscription management server by an euicc card or an ese element. The card includes, in local memory, at least one short number (or “short code”), and more generally an address identifier, unique to a mobile-phone operator, wherein the number is associated with an operator subscriber profile within the secure card.
Oberthur Technologies

Visual ivr using call redirect

A method enables a portable communication device to redirect a call initiated from the portable communication device and to execute a visual interactive voice response application for interfacing with a user. The method includes screening calls initiated from the portable communication device by a communication application resident on the portable communication device, and redirecting a call initiated from the portable communication device when the screening determines that the call matches predetermined criteria.
At&t Intellectual Property I, L.p.

Base station, user terminal and apparatus

A base station comprises a processor and a memory coupled to the processor. The processor configured to execute processes of: transmitting to a user terminal, information including an identifier corresponding to at least one mbms (multimedia broadcast multicast service) service that is provided in a neighbor cell of a cell managed by the base station, wherein the at least one mbms service is provided by using scptm (single cell point to multipoint) transmission; receiving from the user terminal, interest notification including a first identifier corresponding to a first mbms service which the user terminal is interested to receive, wherein the first mbms service is determined by the user terminal based on the information; and transmitting, when the user terminal is handed over from the base station to another base station, the interest notification to the another base station..
Kyocera Corporation

Streaming unicast services to multiple user equipment

A content adapter receives a request from a first user equipment to receive a unicast service via a base station and determines that the base station is providing the unicast service to a second user equipment using a service identifier. The content adapter transmits a signal instructing the base station to allocate the service identifier to the first user equipment for receiving the unicast service concurrently with the second user equipment.
Alcatel-lucent Usa Inc.

Distributed access point for ip based communications

An apparatus for internet-protocol based communications in a wireless network includes a network interface, a controller, and memory. The interface receives a series of multicast data packets.
Ruckus Wireless, Inc.

Positioning performance

An apparatus obtains test data, which comprises radio samples with associated indications of reference locations. The apparatus estimates for each of a plurality of representations of a radio environment positions based on the radio samples of the test data and on the respective representation.
Here Global B.v.

Predicting companion data types associated with a traveler at a geographic region including lodging

Various embodiments relate generally to electrical and electronic hardware, computer software, wired and wireless network communications, and wearable computing devices for identifying activities and/or destinations of relative importance. More specifically, a system, a device and a method are provided to predict a type of companion with whom a traveler collaborates to, among other things, predict activities (e.g., preferential activities) available at a geographic region association with lodging.
Homeaway.com, Inc.

Context based enablement of beacon devices

A computer-implemented method includes identifying a context associated with a mobile device, wherein the mobile device is capable of listening for a beacon signal. The computer-implemented method further includes determining whether the mobile device is qualified to listen for the beacon signal based on the context associated with the mobile device.
International Business Machines Corporation

Determining location via wireless signal attributes

Determining a location of a user device comprises a wireless system supported by wireless access points receiving signals from a user device. The wireless system estimates a location of the user device based on a coarse calculation based on an angle of arrival of the received signal and determines if the user device is in an area under a access point.
Cisco Technology, Inc.

Secure and private cloud based broadcast identification

A tracking device can securely communicate with a secondary device by generating a hash value based on the identity of the tracking device. If the secondary device cannot resolve the hash value, the hash value can be provided to a tracking server, such as a cloud server, for resolving the hash value.
Tile, Inc.

Method for obtaining location of ue, and apparatus

The present application is applied to the communications field and provides a method for obtaining a location of ue, and an apparatus. The method includes: sending, by a base station, at least one beam, where each beam includes first beam identity information, the first beam identity information is used to uniquely identify the beam, and the beam is received by ue that is in coverage of the beam; receiving, by the base station, second beam identity information sent by the ue, and the second beam identity information is used to indicate a beam on which the ue resides; and communicating, by the base station, with the ue according to the beam which the ue resides second beam identity information sent by the ue.
Huawei Technologies Co., Ltd.

Low bandwidth machine type communication in a long term evolution network

The present invention provides a method and system for enabling machine type communication in a long term evolution (lte) network environment. In one embodiment, a physical (phy) layer of a lte protocol stack maps data bits in resource elements of a logical channel to resource elements of a physical channel.
Samsung Electronics Co., Ltd.

Methods and systems for providing audiovisual media items

The various embodiments described herein include methods and systems for providing audiovisual media items. In one aspect, a method performed at a client device includes: (1) receiving one or more natural language inputs from a user; (2) identifying audio files by extracting one or more commands from the natural language inputs; (3) receiving one or more second natural language inputs from the user; (4) identifying visual media files by extracting one or more commands from the second natural language inputs; (5) obtaining a request to generate the media item, the media item corresponding to the visual media files and the audio files; and (6) in response to obtaining the request, sending, to a server system, a creation request to create the media item, the creation request including information identifying the audio files and the visual media files..
Facebook, Inc.

Television program switching method and apparatus

A television program switching method and apparatus, relate to the field of communications network technologies and applicable to television program switching, thereby resolving a problem of cumbersome user operations of viewing television program information. The method includes a program selection instruction entered by a user is received when an electronic program guide (epg) screen is displayed on a mobile terminal, where the program selection instruction includes a program identifier, and the epg screen includes at least two program identifiers and first program information corresponding to each program identifier, the epg is searched for program frequency information corresponding to the program identifier according to the program identifier, and the program frequency information is sent to a to-be-controlled television..
Huawei Technologies Co., Ltd.

Systems and methods for ranking and providing related media content based on signals

Systems, methods, and non-transitory computer-readable media can detect a trigger to generate a set of media content items associated with at least one of a particular media content item or a user viewing the particular media content item. A plurality of content generators can be utilized to generate a plurality of subsets of media content items.
Facebook, Inc.

Methods and systems for generating and providing program guides and content

Systems and methods for identifying, assembling, and publishing content are described. A content item, such as a video, having a first time length, is identified by a system to be included in a program scheduled for a first time period.
Pluto Inc.

Controlled environment media and communication system

The controlled environment media and communication system delivers communications services to residents of controlled facilities using a common network architecture. Some of the communications capabilities of the controlled environment media and communication system include media distribution, video visitation, intra-facility messaging, and other such communications services..
Global Tel*link Corp.

Filtering wind noises in video content

Implementations disclose filtering wind noises in video content. A method includes receiving video content comprising an audio component and a video component, detecting, by a processing device, occurrence of a wind noise artifact in a segment of the audio component, identifying duration of the wind noise artifact and intensity of the wind noise artifact, selecting, by the processing device, a wind noise replacement operation based on the identified duration and intensity of the wind noise artifact, and applying, by the processing device, the selected wind noise replacement operation to the segment of the audio component to remove the wind noise artifact from the segment..
Google Inc.

Compressing and decompressing image data using compacted region transforms

There is a method of compressing image data comprising a set of image values each representing a position in image-value space so as to define an occupied region thereof. The method comprises selectively applying a series of compression transforms to subsets of the image data items to generate a transformed set of image data items occupying a compacted region of value space.
Imagination Technologies Limited

Image coding method, image decoding method, image coding apparatus, and image decoding apparatus

An image coding method includes selecting two or more transform components from among a plurality of transform components that include a translation component and non-translation components, the two or more transform components serving as reference information that represents a reference destination of a current block; coding selection information that identifies the two or more transform components that have been selected from among the plurality of transform components; and coding the reference information of the current block by using reference information of a coded block different from the current block.. .
Sun Patent Trust

Arrangements and methods thereof for processing video

A method performed by a video encoder for encoding a current picture belonging to a temporal level identified by a temporal_id. The method includes determining a reference picture set (rps) for the current picture indicating reference pictures that are kept in a decoded picture buffer (dpb) when decoding the current picture, and when the current picture is a temporal switching point.
Telefonaktiebolaget L M Ericsson (publ)

Method and system for optimized delta encoding

Methods and systems are provided for image processing. A plurality of correlation parameters representing degrees of correlation between two or more images of a plurality of images may be produced.
Swisscom Ag

Implementation design for hybrid transform coding scheme

A method and system may identify a video data block using a video codec and apply a transform kernel of a butterfly asymmetric discrete sine transform (adst) to the video data block in a pipeline.. .
Google Inc.

Method of calibration for a video gaming system

A method of calibration a video game system can include removing an optical filter that filters out visible light from a field of view of a camera to allow the camera to view visible light. The method can also include displaying a calibration image on a display screen located within the field of view of the camera, processing the video output feed from the camera with a computer processor to identify the calibration image, and calculating with the processor coordinates that represent corners of the display screen in the field of view of the camera once the calibration image is identified..
Performance Designed Products Llc

Resolving three dimensional spatial information using time-shared structured lighting that embeds digital communication

Systems, methods, and computer readable media to resolve three dimensional spatial information of cameras used to construct 3d images. Various embodiments perform communication synchronization between a first image capture system and one or more other image capture systems and generate a first flash pulse that projects a light pattern into an environment.
Apple Inc.

Method for scanning object having depths and system thereof

A method for scanning an object having depths is provided, using a plurality of rod lenses to limit the blurring range of a contour image of an object having depths to enable an image capture unit to capture an identifiable contour image, wherein either of the diameter of each rod lens and the spacing between the rod lenses is smaller than the average width of the target. A scanning system for scanning an object having depths is also disclosed herein..
Microtek International Inc.

Adjusting an image according to ambient light conditions

An image of an object under a first illuminant is captured. The color of the ambient light at a device on which the image is to be displayed is identified.
Nvidia Corporation

Controlled environment media and communication system

The controlled environment media and communication system delivers communications services to residents of controlled facilities using a common network architecture. Some of the communications capabilities of the controlled environment media and communication system include media distribution, video visitation, intra-facility messaging, and other such communications services..
Global Tel*link Corporation

Controlled environment media and communication system

The controlled environment media and communication system delivers communications services to residents of controlled facilities using a common network architecture. Some of the communications capabilities of the controlled environment media and communication system include media distribution, video visitation, intra-facility messaging, and other such communications services..
Global Tel*link Corporation

Controlled environment media and communication system

The controlled environment media and communication system delivers communications services to residents of controlled facilities using a common network architecture. Some of the communications capabilities of the controlled environment media and communication system include media distribution, video visitation, intra-facility messaging, and other such communications services..
Global Tel*link Corp.

Conditional-reset, multi-bit read-out image sensor

An image sensor architecture with multi-bit sampling is implemented within an image sensor system. A pixel signal produced in response to light incident upon a photosensitive element is converted to a multiple-bit digital value representative of the pixel signal.
Rambus Inc.

Signal processing device, imaging element, and electronic apparatus

The present technology relates to a signal processing device, an imaging element, and an electronic apparatus configured so that a cost increase can be suppressed. A signal processing device of the present technology includes: a comparison unit configured to compare a signal level of an analog signal with a signal level of a reference signal; a selection unit configured to select, from a plurality of reference signals, the reference signal to be supplied to the comparison unit; and a switching unit capable of switching a signal line connected to an input terminal of the comparison unit such that a signal line via which the reference signal selected by the selection unit is transmitted is connected to the input terminal of the comparison unit, wherein the comparison unit includes a floating node as the input terminal, the selection unit includes a signal line in which a parasitic capacitance is caused between the signal line and the floating node as the input terminal of the comparison unit, and the signal line of the selection unit is configured to transmit an identical level of signal in multiple comparison processes performed by the comparison unit.
Sony Corporation

Correcting disturbance in a pixel signal introduced by signal filtering in a digital camera

A camera is configured with a disturbance correction engine that identifies and corrects disturbance introduced in image data when a filter is applied to the image data. The disturbance may take the form of overshoot noise, crosstalk noise, and/or low pass band energy.
Gopro, Inc.

Dual camera module and controlling the same

A dual camera module that includes a voice coil motor actuator and a method for controlling the same are disclosed. The dual camera module comprises a first camera including a first lens module; a second camera including a second lens module, arranged to adjoin the first camera; and a controller for controlling the first camera and the second camera, wherein the controller identifies whether the first camera includes a first sensing module for sensing movement of the first lens module if a camera execution command is received, identifies whether the second camera includes a second sensing module for sensing movement of the second lens module if the first camera includes the first sensing module, identifies whether the first sensing module of the first camera and the second sensing module of the second camera have the same type as each other if the second camera includes the second sensing module, and controls the first camera and the second camera at different time zones if the first sensing module and the second sensing module have the same types as each other..
Lg Electronics Inc.

Computer-readable instructions executable by a processor to operate a shading object, intelligent umbrella and an intelligent shading charging system

An article comprises a non-transitory computer readable medium having stored thereon computer implementable instructions executable by a processor in a computing device to receive measurements from one or more environmental sensors of an intelligent shading device, analyze and compare received sensor measurements to preset user-defined weather-based thresholds, and generate and communicate alert messages to identify that user-defined weather-based thresholds have been met or exceeded.. .
Shadecraft, Llc

Mobile terminal

An iris of a mobile terminal includes a cover having a through hole therein and forming an internal space, a first blade disposed in the internal space and having a first through hole communicating with the through hole, a second blade disposed to overlap the first blade in at least a portion thereof within the internal space, communicating with the through hole, and having a second through hole formed to adjust a region in which light is incident through interference with the first through hole, and a link member connected to one end portion of each of the first and second blades and varying an aperture of the iris by moving at least one of the first and second blades.. .
Lg Electronics Inc.

Smart frame for camera system

A camera smart frame is configured to enclose and communicatively couple to a camera. The camera smart frame includes one or more sets of input mechanisms, such as buttons.
Gopro, Inc.

Method and apparatus to determine added graphics layers in a video image signal

An original image layer is mixed with one or more graphics layers to form a composite video signal, such as in a vision mixer. Also, the same graphics layers are mixed identically into another, known background image layer to give a second composite video signal.
Supponor Oy

Information processing apparatus, information processing method, and non-transitory computer readable medium

An information processing apparatus includes an obtaining unit and a display controller. The obtaining unit obtains identification information for identifying a target device to be used.
Fuji Xerox Co., Ltd.

Information processing apparatus and nontransitory computer readable medium

An information processing apparatus includes a controller. If images related to devices that have been identified are superimposed on one another, the controller causes information about one or plural cooperative functions that use functions of the devices to be displayed..
Fuji Xerox Co., Ltd.

Information processing apparatus and non-transitory computer readable medium

An information processing apparatus includes a controller. The controller changes, in accordance with an order in which images related to devices that have been identified are linked to each other, an order of priority in which one or plural cooperative functions that use functions of the devices are displayed..
Fuji Xerox Co., Ltd.

Image forming displaying template in image forming apparatus

According to an image forming apparatus of one embodiment, a business-type-based word database classifies and stores words for each business type. A business-type-based template database stores business-type-based templates in which plural icons to respectively invoke plural functions previously set for each business type are grouped.
Toshiba Tec Kabushiki Kaisha

Printing apparatus to which optional unit is connected, program update printing apparatus, and storage medium

A technique that guarantees update of a program of a finisher unit while preventing a malfunction thereof from being caused by erroneous attachment thereof to a printing apparatus. Hardware identification information is acquired from the finisher unit.
Canon Kabushiki Kaisha

System and monitoring progress of automated chat conversations

In a system for managing chat automation, the system includes: a processor; and a memory coupled to the processor, wherein the memory stores instructions that, when executed by the processor, cause the processor to: receive a signal indicating a communication is being initiated by an end user operating an end user device; receive information from the end user device regarding the communication; select a conversation path based on the information regarding the communication; invoke an automated chat resource for engaging in a chat communication session with the end user device, wherein the automated chat resource is configured to follow the conversation path during the chat communication session; monitor confidence levels of automated chat responses during the chat communication session; and redirect the chat communication session to a second conversation path in response to at least one of the confidence levels falling below a threshold level.. .
Genesys Telecommunications Laboratories, Inc.

System and chat automation

In a system for managing chat automation, the system includes: a processor; and a memory coupled to the processor, wherein the memory stores instructions that, when executed by the processor, cause the processor to: receive a signal indicating a communication is being initiated by an end user operating an end user device; receive information from the end user device regarding the communication; select a conversation path based on the information regarding the communication; invoke an automated chat resource for engaging in a chat communication session with the end user device, wherein the automated chat resource is configured to follow the conversation path during the chat communication session; monitor confidence levels of automated chat responses during the chat communication session; and redirect the chat communication session to a second conversation path in response to at least one of the confidence levels falling below a threshold level.. .
Genesys Telecommunications Laboratories, Inc.

Interactive call context identification

An indication of a call from a first device to a second device is received. The indication includes making the call by a first user using the first device to a second user using the second device.
International Business Machines Corporation

Detecting notable events and annotating multimedia data based on the notable events

A user device, such as a smart phone, may capture sensor data or interface with a wearable device, such as a smart watch, or another user device to capture sensor data related to the capture of multimedia content. The sensor data may relate to a user, other people, and/or an associated environment.
Verizon Patent And Licensing Inc.

Information processing method, terminal, and computer-readable storage medium

An association logic that associates a non-text message type with specified information is established. The association logic includes at least identification of the non-text message type, allowing a message type in line with the association logic to be identified by the identification.
Tencent Technology (shenzhen) Company Limited

Communication terminal, and incoming call assistance program, method, and device

A communication terminal, capable of making a voice call to a call destination designated in accordance with a call instruction, includes a memory and a processor that reads and executes instructions stored by the memory. The processor, when the call instruction is detected, performs voice call processing on the call destination and performs data transmission processing that transmits identifying information to an address associated with the call destination..
Fujitsu Limited

A operating a communication system, and communication system

The invention relates to a method for operating a communication system, comprising the steps: providing a chip card, in particular a sim card, in a communication device of a motor vehicle, said chip card including a user identification for dialing into at least one mobile communication network; storing a device identification of a mobile phone in the communication device of the motor vehicle; establishing a mobile communication link between the mobile phone and the communication device of the motor vehicle using the user identification stored on the chip card if a predetermined activation action has been detected on the mobile phone and it has been determined that the device identification of the mobile phone is stored in the communication device of the motor vehicle. The invention furthermore relates to a communication system..
Audi Ag

System and supporting shared multicast local identifiers (mild) ranges in a high performance computing environment

System and method for supporting shared multicast local identifiers (mlids) a high performance computing environment. In accordance with an embodiment, a shared mlid range can be configured such that each subnet within a fabric can utilize an mlid within a shared mlid range without the need to utilize a tcam, or other memory, lookup of a mgid to mlid mapping..
Oracle International Corporation

Hardware-based packet editor

Hardware-based packet editor receives a packet editing script which includes script entries indicating modifications to a data packet and a data block with data for the modified data packet. For a script entry in the packet editing script, the packet editor copies data in the data block at a block location and with a block length identified in the script entry into a packet buffer.
A10 Networks, Inc.

Sharing in an augmented and/or virtual reality environment

In a system and method for sharing items in an augmented and/or virtual reality environment, selected virtual items may be virtually propelled using, for example, a tossing or throwing motion, to a target recipient, so that the selected item may be shared with the target recipient without direct physical and/or virtual contact with the target recipient. Movement of a user's hand may be detected and tracked, so that the intended target recipient for the shared item may be identified based on a projected trajectory of a throwing motion of the user's hand.
Google Inc.

Smart device-assisted diagnosis of operating statuses of consumer devices

The operational status of devices (such as routers, gateways, etc.) may be determined automatically, without the need for a user to look up status lights or sounds in a manual. A particular device may be automatically identified (e.g., by image recognition techniques), and the operational status may also be automatically identified.
Verizon Patent And Licensing Inc.

Extraction of dominant content for link list

In one example, a user device may implement a browser that identifies and presents dominant content in a bookmarked website or a frequently visited website. The user device may store a page history profile describing interactions with a featured hub of content.
Microsoft Technology Licensing, Llc

Methods and systems for controlled wireless distribution of data for use at a location without reliable wireless connectivity

A method and apparatus for wirelessly transmitting data to be utilized at an incident area. A server computer defines a prioritized list of data items to be transmitted to a plurality of portable electronic devices for use at the incident area.
Motorola Solutions, Inc.

Method for transfer of information related to targeted content messages through a proxy server

Information transfer methods for exchange of information with a wireless access terminal (w-at) includes receiving a first message from the w-at, the first message including first information provided by the w-at and an address of the w-at capable of identifying the w-at, converting the first message to an anonymized message by replacing the w-at address with a transaction identifier (id), transmitting the anonymized message to a remote server, receiving a first response from the remote server, the first response having response information and the anonymized address information, converting the first response to a second response by replacing the transaction id with the w-at address, and transmitting the second response to the w-at.. .
Qualcomm Incorporated

Media player distribution and collaborative editing

In one approach, a server computer receives a playlist from a first client computer, wherein the playlist identifies a plurality of media assets and includes synchronization information that specifies how to present the plurality of media assets as a synchronized media presentation. The server computer receives a request from the first client computer to share the playlist with a second client computer.
Qwire Inc.

Method and reducing network resource transmission size using delta compression

A near end network optimizer receives, from a client device, a request for a network resource. Responsive to determining that a version of the network resource is stored in the near end network optimizer, a request for the network resource is transmitted to a far end network optimizer along with a version identifier that identifies that version.
Cloudflare, Inc.

Recommending objects to a user of a social networking system based on implicit interactions between the user and the recommended objects

The social networking system monitors implicit interactions between a user and objects of the social networking system with which the user has not established a connection. Based on the implicit interactions between the user and an object, the social networking system identifies a soft connection between the user and the object.
Facebook, Inc.

Evaluating authenticity of geographic data associated with media requests

A system and method for analyzing media requests and evaluating the authenticity of geographic data associated with the media requests. A mobile device may use media requests to retrieve media items that are displayed to a user.
Dstillery, Inc.

Proactive content push for enhancing real-time service delivery via cloud

Embodiments disclose systems, methods, and computer program products to perform an operation for proactively sending content to mobile devices. The operation generally includes receiving, from an application executing on a mobile device, a request to access content, and identifying, from a plurality of content items, at least a first content item responsive to the request.
International Business Machines Corporation

Multi-tier hierarchy for geographical data

Configurations for providing a multi-tier hierarchy to manage geographical data are disclosed. The subject technology identifies a first geographic location and determines where, in a geographic hierarchy, the first location belongs, including associating one or more labels with the first location.
Google Inc.

Automated testing of perceptible web page elements

Methods and systems are provided for testing graphical elements within a graphical user interface associated with a computer file, such as a web page. One exemplary method involves a computing device coupled to a communications network identifying a visible subset of graphical elements within a graphical user interface associated with a computer file available over the network and identifying a testable subset of the visible subset.
Salesforce.com, Inc.

Systems and methods for automatically generating top level index files

Systems and methods for automatically generating top level index files for use in adaptive bitrate streaming in accordance with embodiments of the invention are dislosed. One embodiment of the method of the invention includes receiving a request from a playback device at a playback server, where the request identifies a piece of content, retrieving a list of assets associated with the identified piece of content using the playback server, filtering the list of assets using at least one predetermined criterion using the playback server, generating a top level index file describing each asset in the filtered list of assets using the playback server, and sending the top level index file to the playback device using the playback server..
Sonic Ip, Inc.

Method for providing conference service and apparatus thereof

Methods for providing conference service and apparatus thereof are provided, one of methods comprises, receiving identification information of a first user and identification information of a first terminal of the first user from the first terminal of the first terminal, receiving identification information of the first user and identification information of a second terminal of the first user from the second terminal of the first terminal, transmitting first contents to the first terminal of the first user and receiving at least one first reaction information about the first contents from the second terminal of the first user.. .
Samsung Sds Co., Ltd.

Method and system for rapid accreditation/re-accreditation of agile it environments, for example service oriented architecture (soa)

A system and method for managing and analyzing security requirements in reusable models. At least one functional model, at least one security implementation model, at least one requirement model, and meta models of the models are read by a reader.

Creation of fictitious identities to obfuscate hacking of internal networks

Introduced here are security techniques for networks. More specifically, fictitious identities (also referred to as “bogus identities”) can be willfully created and injected into the network in order to obfuscate those who are not authorized to access the network.
Javelin Networks, Inc.

Systems and methods for identifying internet attacks

The present disclosure relates to a system (1) and a method that employs such system (1) to detect and counteract internet attacks of man-in-the-browser and/or man-in-the-middle type. The system (1) comprises a traffic inspector (2) in signal communication with a client computer (3) having a web browser (4) residing therein for internet browsing and with a web server (5) having a web application (6) residing therein.
Clearfy S.r.l.

Mitigating neighbor discovery-based denial of service attacks

In one embodiment, a device in a network determines whether a destination address of a packet received by the device is within a neighbor discovery (nd) cache of the device. The device determines whether the destination address is not in a set of addresses used to generate an address lookup array or possibly in the set of addresses used to generate the address lookup array, in response to determining that the destination address of the packet is not within the nd cache.
Cisco Technology, Inc.

Systems and methods for detecting and/or handling targeted attacks in the email channel

Techniques for detecting and/or handling target attacks in an enterprise's email channel are provided. The techniques include receiving aspects of an incoming email message addressed to a first email account holder, selecting a recipient interaction profile and/or a sender profile from a plurality of predetermined profiles stored in a memory based upon the received properties, determining a message trust rating associated with the incoming email message based upon the incoming email message and the selected recipient interaction profile and/or the sender profile; and generating an alert identifying the incoming email message as including a security risk based upon the determined message trust rating.
Graphus, Inc.

Selection of countermeasures against cyber attacks

A method of selecting, for at least one service of an information system and depending service(s), at least one countermeasure to be implemented against at least one cyber attack, the method includes: identifying elements of the service exposed to the cyber attack(s), calculating a risk mitigation level of each countermeasure with respect to the cyber attack(s), ranking the countermeasure(s) on the basis of a parameter which is at least a function of the risk mitigation level, simulating the impact of the countermeasure(s) on the service and the depending service(s), the countermeasure to be implemented being selected at least as a function of result of the simulation.. .
Institut Mines-telecom/telecom Sudparis

Collaborative infrastructure supporting cyber-security analytics in industrial networks

A system comprising a computer-readable storage medium storing at least one program, and a method for reducing cyber-security related false positive alerts is presented. In example embodiments the method may include identifying an indication of a cyber-security threat based on an operational anomaly in a network system.
General Electric Company

Detecting and reacting to malicious activity in decrypted application data

Described herein are systems and methods for detecting potentially malicious activity in a network session. Embodiments may involve identifying a requested network session between a first computer device and a second computer device, wherein the requested network session includes at least one security access message having an encrypted portion, obtaining a decryption key suitable for decrypting the encrypted portion of the security access message, decrypting the encrypted portion of the security access message with the decryption key, identifying a session key within the decrypted portion of the security access message, decrypting an application message that has been transmitted between the first computer device and the second computer device in the requested network session using the session key, and determining whether the decrypted application message includes an indicia of potentially malicious activity..
Cyber-ark Software Ltd.

Devices, methods and systems for secure data transfers

Methods, systems and devices for securely transferring digital data from a first repository to a second repository are disclosed. Per at least one embodiment, a second repository is identified with a human recognizable identifier and an internal identifier associated with such second repository is determined.
Deluxe Media Inc.

Targeted authentication queries based on detected user actions

There are provided systems and methods for targeted authentication queries based on detected user actions. A user may perform various actions during a day, including online, electronic, or digital actions, such as social networking, messaging, and media consumption, as well as real-life actions, such as exercise, travel, and purchases.
Paypal, Inc.

Portable verifiable credentials and methods thereof

The migration of identity documents, such as driving licenses, from physical documents to electronic documents creates new problems for those seeking to verify the identity of an individual based upon the electronic document they provide. However, the inventors have established a means of binding electronic documents and electronic representations of physical documents to individuals at issuance of the document(s).

Indirect user authentication

As disclosed herein a computer system, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The computer system further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system..
International Business Machines Corporation

Indirect user authentication

As disclosed herein, a computer program product, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The computer program product further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system..
International Business Machines Corporation

Uniformly accessing federated user registry topologies

An approach for standardizing access to user registries, the approach involving providing a first schema extension to an identity management system and a bridge component to an identity management application wherein the bridge component comprises a second schema extension to the identity management application, receiving a request in a first data format associated with the identity management system, converting the request into a second data format associated with the identity management application and executing the request in the identity management application, receiving a response to the request in the second data format, converting the response into the first data format and returning the response to an end user via the identity management system.. .
International Business Machines Corporation

Situational awareness system security features

Security features a situational awareness system using location tracking information including requiring a security identifier, such as a password or a bio identifier, as a condition to providing situational awareness information. The system may also restrict situational awareness information to data pertaining to members that have creating a permission setting or responded to an “opt-in” prompt authorizing data from their profile to be included in the situational awareness information.
1q Llc

Supervised online identity

Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a “child” client computer device. The gateway server may include an identity manager to receive a request for access to the online service from the client computing device, retrieve access information to the online service, and facilitate access to the online service for the client computing device using the access information.
Intel Corporation

Securing biometric data through template distribution

Embodiments include method, systems and computer program products for safeguarding biometric data. Aspects include receiving a first biometric data unit and generating a template based upon the first biometric data unit.
International Business Machines Corporation

Method for providing an access code on a portable device and portable device

The disclosure relates to a method for providing an access code on a portable device, which comprises a user interface and is set up for a wireless data communication, in which reference data for an authentication are stored in a central data processing system, wherein the reference data comprise personal data containing biometric reference data for a user of the portable device and a device identifier for the portable device, in response to a detected event, an authentication process is executed, in which the user is authenticated, wherein to authenticate the user, in the central data processing system and/or in the portable device, the reference data and authentication data are evaluated, which comprise personal authentication data for the user, including biometric authentication data, and an authentication device identifier for the portable device, and in response to a successful authentication, an access code is provided in the portable.. .
Bundesdruckerei Gmbh

Computer security based on mouse device speed setting authentication

A method of performing operations by a processor of a computer terminal, includes determining an operation system (os) speed scaling gain used by the os to transform mouse movement data, which is received from a mouse device via a device interface circuit, into mouse speed data that controls positioning of a mouse pointer relative to pixel locations on a display device. A computer terminal identifier is generated based on the os speed scaling gain.
Ca, Inc.

Technologies for authentication and single-sign-on using device security assertions

Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client.
Intel Corporation

Method and identity federation gateway

Techniques for an id federation gateway include determining whether a user associated with a request for a particular network resource is to be identified by the provider of the particular service or by a different party. The service also comprises causing the different party to provide identification data that indicates an identity for the user, if the user is to be identified by the different party.
Nokia Technologies Oy

Method and device for information system access authentication

A method is provided to improve authentication of a user to login with a client device to a computer system. A mobile device stores a list of uniform resource locators (urls), user names and passwords.
Singou Technology Ltd.

Resource access control for virtual machines

To provide enhanced operation of virtualized computing systems, various systems, apparatuses, methods, and software are provided herein. In a first example, a method of operating a computing system to control access to data resources by virtual machines is provided.
Conjur, Inc.

Facilitating network login

A system and method for transmitting user credentials to another device. According to some embodiments, a method is described of receiving into a first portable electronic device a set of credentials from a user, the set of credentials to include a wlan ssid and a network key, the set of credentials to allow the first device to connect to the wlan.
Advanced Messaging Technologies, Inc.

Management of dynamic credentials

In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.. .
Shape Security, Inc.

System and method to enable pki- and pmi- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added

A central server configured with an attribute authority (“aa”) acting as a trusted third party mediating service provider and using x.509-compatible pki and pmi, vpn technology, device-side thin client applications, security hardware (hsm, network), cloud hosting, authentication, active directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys.
T-central, Inc.

Systems for providing device-specific access to an e-mail server

Systems and methods herein can provide device-specific access to an e-mail server, including an ews-based e-mail server. In an example, a management server controlled by a system administrator provides device identification information to a user device and to a tunnel server.
Airwatch, Llc

Efficient packet capture for cyber threat analysis

Methods, systems, and computer-readable media for efficiently detecting threat incidents for cyber threat analysis are described herein. In various embodiments, a computing device, which may be located at a boundary between a protected network associated with the enterprise and an unprotected network, may combine one or more threat indicators received from one or more threat intelligence providers; may generate one or more packet capture and packet filtering rules based on the combined threat indicators; and, may capture or filter, on a packet-by-packet basis, at least one packet based on the generated rules.
Centripetal Networks, Inc.

System for implementing a small computer systems interface protocol over a content centric network

One embodiment provides a system that facilitates schematized access control in a content centric network. During operation, the system generates, by a content producing device, a secret key for a user based on a schema, wherein the schema is a regular expression which corresponds to one or more names and allows a user access to content associated with the names, wherein a name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level.
Cisco Technology, Inc.

Endpoint identifiers registration

An egress tunnel router (etr) may establish a neighbor connection with a map server (ms). After the etr establishes the neighbor connection with the ms, or after the etr detects a status update of the ms from inaccessible to accessible, the etr may register all endpoint identifiers eids configured on the etr with the ms.
Hangzhou H3c Technologies Co., Ltd.

Enabling identification of online identities between different messaging services

A method and system for populating identities in a message service involves registering a user of a first messaging service with a second messaging service. User identities for users other than the registered user may be identified.
Facebook, Inc.

Method and system for adding an identifier

A computer-implemented method of automatically adding an identifier related to a content item to a communication in a multi-user communication network such as a social network. The method comprising obtaining a robust fingerprint of the content item, retrieving the identifier from a database using the robust fingerprint, and adding the identifier formatted in a format suitable for the multi-user communication network to the communication.
Teletrax B.v.

Method and system of private messaging in a family networking computing platform

In one aspect, a method of a managing an online social network includes the step of providing an online social network. The online social network includes a set of nodes, wherein each node represents a user and a set of relationships between each node.

Method for streamlining communications between groups of users

A method for method for streamlining communications between groups of users uses multiple user accounts and a remote server. Each user account is associated to a user pc device.

Electronic mail data management generating a dataset for such systems

A method of updating electronic mails (emails) data dataset that comprises providing a dataset which comprises a plurality of previously identified original message content blocks as a plurality of discrete units, each the original message content block having a header content and a sender content and being extracted from emails exchanged in a multi-email correspondence, receiving at least one additional email, analyzing the at least one additional email to identify a plurality of original message content blocks, tagging each of the plurality of original message content blocks as a discrete unit, and updating the dataset with the plurality of original message content blocks.. .
Mailwise Email Solutions Ltd.

System and automatically classifying e-mail

Provided is a task tracking method including identifying a mail that includes at least one piece of mail information among sender information, receiver information, a mail title, and mail content through a message communication tool; recognizing the mail that includes the at least one piece of mail information as a task and tracking the task; and automatically classifying the task based on a preset condition, and displaying the classified task through the message communication tool.. .
Nhn Entertainment Corporation

Systems and methods for virtual interaction

In one aspect, at least one processor may receive a first user input and identify one or more first keywords from the first user input to determine one or more previously recorded outputs corresponding to the first keywords. The previously recorded outputs may correspond to a virtual character, such as a celebrity.

Optimized stream management

A system and method for optimized stream management are provided. The method includes retrieving priority data; determining, in real-time, a current priority tree based on the retrieved priority data, wherein the priority tree includes at least one node representing a stream; identifying, based on the retrieved priority data, at least one relative weight of the at least one node; determining an effective weight based on each identified relative weight; and filling a buffer based on the current priority tree and the at least one effective weight..
Radware, Ltd.

Quality of service for high network traffic events

A method for providing quality of service includes identifying a high network traffic event at a node, providing a user score to each user account of a plurality of user accounts, wherein the plurality of user accounts corresponds to a plurality of user devices connected to the node, and responsive to identifying the high network traffic event, providing instructions to a subset of user devices of the plurality of user devices, wherein the instructions instruct the subset of devices to enter a low traffic mode, and wherein each device of the subset of devices corresponds to a user account with a user score below a threshold. A computer program product and computer system corresponding to the above method are also disclosed herein..
International Business Machines Corporation

System and routing packets in a stateless content centric network

A gateway router can receive an interest that includes a location-independent name for a data collection. If the interest does not include an anchor identifier, the gateway router can perform a lookup operation in a name-prefix forwarding-information base (np-fib) to select an anchor identifier for a target anchor node, and to select an interface for forwarding the interest toward the anchor.
Cisco Technology, Inc.

Shared service access for multi-tenancy in a data center fabric

Aspects of the embodiments include receiving a packet at a network element of a packet-switched network; identifying a presence of a shared service destination address in a header of the packet; identifying a shared service destination address for the packet based, at least in part, on a destination internet protocol (ip) address stored in a forward information base; and forwarding the packet to the shared service destination address.. .
Cisco Technology, Inc.

Forwarding packets with encapsulated service chain headers

In one embodiment, a device in a network receives a packet that includes a forwarding label for a service in a service chain. The packet encapsulates a service chain header for the service chain.
Cisco Technology, Inc.

System and customizing the identification of application or content type

Expertise, for performing classification of a type of network traffic, can be encapsulated in a module. A set of modules, as currently available to a traffic controller, can be referred to as a collection.
A10 Networks, Inc.

In-flow packet prioritization and data-dependent flexible qos policy

A method, operational at a device, includes receiving at least one packet belonging to a first set of packets of a packet flow marked with an identification value, determining that the at least one packet is marked with the identification value, determining to change a quality of service (qos) treatment of packets belonging to the first set of packets marked with the identification value that are yet to be received, and sending a request to change the qos treatment of packets belonging to the first set of packets marked with the identification value that are yet to be received to trigger a different qos treatment of packets within the packet flow, responsive to determining to change the qos treatment. Other aspects, embodiments, and features are also claimed and described..
Qualcomm Incorporated

Automated determination of tree attributes and assignment of receiver identifiers by distributed election in multicast architectures relying on packets identifying intended receivers

Exemplary methods include a first network device participating in an election process to determine a designated bit forwarding router (d-bfr). The methods include in response to determining the first network device is elected to be the d-bfr, performing d-bfr operations comprising assigning one or more bitmask positions (bmps) to one or more bit forwarding egress routers (bfers) and advertising the assigned one or more bmps.
Telefonaktiebolaget L M Ericsson (publ)

Notifying original state listeners of events in a domain model

Notifying original state listeners within a domain model. Identifying listener registration information pertaining to a listener.
International Business Machines Corporation

Session aware adaptive packet filtering

A method performed by a network device includes: receiving a first packet by the network device, wherein the first packet is tapped from a network; identifying a session to which the first packet belongs when the first packet has one or more values that at least partially match one or more terms, wherein the act of identifying the session is performed by the network device; receiving a second packet by the network device; determining whether the second packet belongs to the session; and performing a packet processing action by the network device based on the identified session; wherein the session is identified based on a first criterion, and the act of determining whether the second packet belongs to the session is performed based on a second criterion that is different from the first criterion.. .
Gigamon Inc.

Method and system for interference detection and mitigation

In a method for adjusting the modulation of information onto subcarriers transmitted on a network, a first modulation profile of a network node on the network is set a first density. A plurality of messages in support of a link maintenance operation (lmo) on the network are monitored.
Entropic Communications, Llc

Available bandwidth estimation system, available bandwidth estimation method, reception apparatus, and reception apparatus program storage medium

Failure to identify an accurate rising position of a queueing delay alone has led to the inability to ensure estimation precision. An available bandwidth estimation method comprises: transmitting a packet train constituted by packet pairs arranged at equal intervals, each of the packet pairs comprising two packets of the same size arranged at a zero transmission interval, with the packet size of the packet train increasing at a constant rate; receiving the packet train; calculating an observation delay of the packets included in the received packet train; calculating a serialization delay on the basis of the reception interval between the two packets constituting each packet pair included in the received packet train; removing the calculated serialization delay from the calculated observation delay, thereby calculating a queueing delay; and estimating an available bandwidth on the basis of the calculated queueing delay..
Nec Corporation

Monitoring network traffic to determine similar content

In an embodiment, a method monitors a plurality of data streams passing through a router in the connectivity service provider environment, and for each of the data streams, periodically samples packets at the router. The method further generates a stream signature based at least on the payload of the sampled packets.
Level 3 Communications, Llc

Diagnostic testing in networks

Methods and apparatus are disclosed for obtaining diagnostic test results in respect of network elements in a network, the test results being obtained from a population of probes associated with network elements. The method comprises receiving a first-stage set of probe reports comprising, in respect of probes in an initial subset, a test result and metadata, each test result indicating a state of the network element associated with the probe; identifying a specific subset of probes in the initial subset wherein the test results from the probes in the specific subset satisfy a predefined condition; determining a subsequent subset based on the metadata of the probes in the specific subset; and triggering the probes in the subsequent subset to provide a second-stage set of probe reports comprising test results indicating states of network elements associated with probes in the subsequent subset..
British Telecommunications Public Limited Company

Path continuity determination in an aggregate flow environment

Mechanisms for path continuity determination in an aggregate flow environment. An ingress node and a downstream node for which a path continuity check is desired are determined.
Telefonaktiebolaget Lm Ericsson (publ)

Quality of service for high network traffic events

A computer program product with instructions for providing quality of service includes identifying a high network traffic event at a node, providing a user score to each user account of a plurality of user accounts, wherein the plurality of user accounts corresponds to a plurality of user devices connected to the node, and responsive to identifying the high network traffic event, providing instructions to a subset of user devices of the plurality of user devices, wherein the instructions instruct the subset of devices to enter a low traffic mode, and wherein each device of the subset of devices corresponds to a user account with a user score below a threshold.. .
International Business Machines Corporation

Methods, systems, and media for media transmission and management

Methods, systems, and media for media transmission and management are provided. In some implementations, a method for media content management is provided, the method comprising: receiving a portion of a media data stream from a first computing device prior to the first computing device processing the portion of the media data stream; processing the portion of the media data stream to identify an object of interest within the media data stream; determining an entity associated with the object of interest; associating a content item with the object of interest based on the determined entity; generating a first representation of the portion of the media data stream, wherein the first representation is associated with the content item; receiving a second representation of the media data stream from a second computing device; determining whether the second representation matches the first representation; and transmitting the content item associated with the first representation to the second computing device for placement within the media data stream in response to determining that the second representation matches the first representation..
Google Inc.

Tone map selecting device and method

A tone map selecting device includes: a bit-number-per-symbol providing circuit, providing a plurality of bit numbers per symbol, each of which associated with a tone map; a calculating circuit, performing a predetermined calculation on the bit numbers per symbol to generate a calculation result; and a selecting circuit, identifying one of the bit numbers per symbol that satisfies a predetermined relationship with the calculation result, and selecting the tone map associated with the bit number per symbol satisfying the predetermined relationship as a default tone map.. .
Mstar Semiconductor, Inc.

Phase measuring device and apparatuses using the phase measuring device

The inventive phase measuring device includes a first a/d converter 2 that digitizes a first periodical input signal x at each predetermined sampling timing and outputs the resultant signal as a digital signal xd, a first zero-crossing identification means operable to detect a sign of xd, a counting processing unit 4 that counts a difference in the number of times of zero-crossing detection by the first zero-crossing identification means and calculates the difference at each sampling timing, and a fraction processing unit 5 that computes a fraction of the number of times of zero-crossing detection on the basis of xd at sampling timings immediately before and immediately after determination of zero-crossing by the first zero-crossing identification means. An averaging processing unit 6 performs averaging by adding up and totalizing the outputs from the counting processing unit 4 and the fraction processing unit 5, thereby computing a phase.
National Institute Of Advanced Industrial Science And Technology

Preamble detection and time-of-arrival estimation for a single-tone frequency hopping random access preamble

A receiver baseband processor and method for performing preamble detection and time-of-arrival, toa, estimation for a single-tone frequency hopping random access preamble. The processor fft processes a received signal and identifies logical tones.
Telefonaktiebolaget Lm Ericsson (publ)

Methods and systems for service interworking between servers using different user identification systems

According to at least some example embodiments, service interworking methods and systems are provided to identify registered users using different user identification systems performed by a first server having at least one processor and configured to identify registered users using a first user identification system, the method comprising: generating a first reference identifier of a first user in association with a first identifier identifying the first user in the first user identification system; managing the first reference identifier in association with the first identifier; receiving a second identifier identifying the first user in a second user identification system from the first user; and transmitting the first reference identifier and the second identifier to a second server configured to identify registered users using the second user identification system.. .
Line Bizplus Pte., Ltd.

Method and providing user adaptive service

A method for determining an operation to be performed for an object identified by a device, and an apparatus therefor are disclosed. In one embodiment, the method includes generating representative identification information of the terminal, transmitting, to a server, user information including the representative identification information of the terminal, and advertising the representative identification information of the terminal.
Samsung Electronics Co., Ltd.

Smart vacation

A method for security and/or automation systems is described. In some embodiments, the method may include detecting departure data relating to at least one of an occupant and a premises, identifying a likelihood of an absence in relation to the premises based at least in part on the departure data, and sending a confirmation request based at least in part on the identifying for the occupant associated with the premises to confirm the absence.
Vivint, Inc.

Method of enhanced application specific congestion control for data communication mechanism

At commands are used for controlling mobile termination (mt) functions and gsm/umts network services from a terminal equipment (te) through terminal adaptor (ta). Application specific access control is an application/service specific access control mechanism for the operator to allow/prevent new access attempts from particular, operator-identified applications/services in the ue in idle mode.
Mediatek Inc.

Encrypted text verification system, method, and recording medium

In a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key, registration data is generated based on the encrypted data and a verification key, and the registration data is stored as a registration template in a storage unit together with an identifier for uniquely identifying the registration data. In an encrypted text verification phase, a data verifying request is generated in which input data to be verified has been encrypted by using a random number, the registration template stored in the storage unit and the data verifying request are verified to produce a determined result, a verified result including a part or all of the registration template corresponding to the determined result is produced, and data is restored based on the verified result to produce a restored result..
Nec Corporation

Recovery agents and recovery plans over networks

Examples include sending and receiving recovery agents and recovery plans over networks. Some examples include receiving a recovery request over a network from a requestor, sending a response to the requestor over the network, sending an executable copy of a recovery agent with a validation measure to the requestor, establishing an encrypted connection with the requestor, receiving a second request from the requester over the encrypted connection, determining a recovery plan that includes a command executable by the recovery agent, and sending the recovery plan to the requester over the encrypted connection.
Hewlett Packard Enterprise Development Lp

Pairing procedure

To automate establishment of an ad hoc connection between a user apparatus and a device, username-password pairs and identifying information-code pairs are maintained in a database server, and the user apparatus sends an inquiry comprising identifying information of the device and a username and a password of a user of the user apparatus, and receives in a response a code for establishing the ad hoc connection.. .
Abb Technology Oy

Transmission method, reception method, transmission apparatus, and reception apparatus

The present invention relates to transmission and reception of digital broadcast in a digital broadcast network supporting a configuration of multiple physical layer pipes (plps). In particular, signalling parameters relating to a complete plp are transmitted within layer 1 signalling related to the plp.
Sun Patent Trust

Method and detecting optical network unit, and passive optical network system

A method for detecting an optical network unit (onu) in a passive optical network (pon), an onu, a pon and an optical line terminal (olt) are disclosed. In an embodiment the method include detecting an onu identity code in an open uplink empty window or an empty timeslot, wherein the onu identity code is a specific code stream sequence of the onu that identifies a single onu of the plurality of onus included in the pon system during the open uplink empty window or the empty timeslot and determining that the single onu corresponding to the onu identity code is a rogue onu according to the onu identity code..
Huawei Technologies Co., Ltd.

Method and improving connectivity between optical devices using software defined networking

Method and apparatus of a network configuration configured to permit a dense wavelength division multiplexing (“dwdm”) element to connect to a storage server, an internet protocol (“ip”) router, and dwdm network are disclosed. The configuration includes the dwdm network, storage area network (“san”) server, ip router, and optical transport network (“otn”) switch.
Tellabs Operations, Inc.

Data transmission method, device, and system

The present invention relates to the communications field, and discloses a data transmission method, a device, and a system, so as to resolve a problem in the prior art that user equipment cannot correctly parse data or measure a channel due to incapability of identifying different operators. A specific solution is: obtaining a scrambling code sequence, where the scrambling code sequence is generated according to a specific sequence of an operator to which a first device belongs; scrambling data according to the scrambling code sequence to obtain the scrambled data; and sending the scrambled data.
Huawei Technologies Co., Ltd.

Transmitting residence time information in a network

A method of operation of a multiprotocol label switching network involves, in an active node of the network, receiving a first data packet from a source node and forwarding the first data packet to a destination node. At the same time, the active node measures a residence time of the first data packet in the active node.
Telefonaktiebolaget L M Ericsson (publ)

System and selecting input feeds to a media player

A system and method are provided for enabling a plurality of media feeds, such as internet radio stations, to be played through a standard media player, such as a radio receiving device, using the tuning or input selection controls of the media player to control the selection of which media feed to play. Identification signatures are added to channels and transmitted to the media player by transmitter.
Swisscom Ag

Substituting streaming station for over-the-air broadcast

An automotive radio receiver includes an over-the-air radio tuner and a network interface. When a broadcast received at the radio receiver, it includes embedded information that can be used to identify the radio station providing the broadcast.
Iheartmedia Management Services, Inc.

Skew compensation in an optical coherent transponder

Systems and methods for reducing total skew in optical signals transmitted by optical coherent transponders without measuring the total skew are disclosed. The method may compensate for the in-phase/quadrature (i/q) skew of optical signals in complex modulation formats.
Fujitsu Network Communications, Inc.

Method and beam selection for a multibeam, multi-satellite communications system

An apparatus for satellite selection within a multi-satellite communication system, comprising an antenna, receiver, and transmitter, and a processing module configured to calculate a normalized distance metric for the plurality of user spot beams of a first and second satellite, select the user spot beam with the lowest normalized distance metric, and determine which of the at least first or second satellite is transmitting the selected user spot beam. Further, a method for increasing the aggregate capacity of a satellite communications network, comprising identifying high traffic regions within a coverage area of a first satellite, determining which user spot beams of the first satellite are available to each of the identified regions, determining a normalized distance metric for each user spot beam identified, and plotting a second beam pattern of a second satellite to produce at least one user spot beam with a lower normalized distance metric..
Hughes Network Systems, Llc

Inter-satellite communication device, associated satellite and associated constellation of satellites

An inter-satellite communication device for satellites orbiting within a constellation of satellites comprises at least one optical terminal dedicated to intra-orbital plane communication links and at least one optical terminal dedicated to inter-orbital plane communication links, each optical terminal dedicated to intra-orbital plane communications configured to transmit and receive optical signals with an optical terminal of an identical satellite orbiting in the same orbital plane, each optical terminal dedicated to inter-orbital plane communications configured to transmit and receive optical signals with an optical terminal of an identical satellite in an orbital plane adjacent over the entirety of its orbit in its orbital plane and each optical terminal dedicated to inter-orbital plane communications having a field of regard such that the half-angle at the vertex of the latter is larger than the maximum value of the azimuthal angle over a revolution around the earth.. .
Thales

Scheduled communication with resource providers and a home area network

Systems and methods are disclosed for providing scheduled communication between a primary network, such as a time synchronized channel hopping (“tsch”) network, and a secondary network, such as a carrier sense multiple access (“csma”) network. During a first selected slot-offset in a tsch hopping pattern, a gateway node communicates with a primary network node.
Landis+gyr Innovations, Inc.

Systems and methods for signal detection and digital bandwidth reduction in digital phased arrays

Methods and systems are provided including a system for signal detection and digital bandwidth reduction in a phased array comprising a digital phased array receiving system, digital beamforming network, and central system-level processing system. In at least one embodiment, a system for signal detection and digital bandwidth reduction in a phased array is provided that includes a digital phased array receiving and transmitting system, a plurality of digital processing nodes, transceivers, and a core processing node, and a plurality of digital beamforming nodes.
The United States Of America As Represented By The Secretary Of The Navy

Flexible radio assignment

A flexible radio assignment algorithm that reduces co-channel interference in wi-fi networks is disclosed. The flexible radio assignment algorithm calculates a density value for each of the aps controlled by a network controller.
Cisco Technology, Inc.

Transmitting apparatus and interleaving method thereof

A transmitting apparatus is provided. The transmitting apparatus includes: an encoder configured to generate a low-density parity check (ldpc) codeword by ldpc encoding based on a parity check matrix; an interleaver configured to interleave the ldpc codeword; and a modulator configured to map the interleaved ldpc codeword onto a modulation symbol, wherein the modulator is further configured to map a bit included in a predetermined bit group from among a plurality of bit groups constituting the ldpc codeword onto a predetermined bit of the modulation symbol..
Samsung Electronics Co., Ltd.

Low density parity check encoder having length of 64800 and code rate of 2/15, and low density parity check encoding method using the same

A low density parity check (ldpc) encoder, an ldpc decoder, and an ldpc encoding method are disclosed. The ldpc encoder includes first memory, second memory, and a processor.
Electronics And Telecommunications Research Institute

Transmitting apparatus and interleaving method thereof

A transmitting apparatus is provided. The transmitting apparatus includes: an encoder configured to perform a low-density parity check (ldpc) encoding on input bits using a parity check matrix to generate an ldpc codeword comprising information word bits and parity bits; an interleaver configured to interleave the ldpc codeword; and a modulator configured to map the interleaved ldpc codeword onto a modulation symbol, wherein the modulator is further configured to map a bit included in a predetermined bit group from among a plurality of bit groups constituting the ldpc codeword onto a predetermined bit of the modulation symbol..
Samsung Electronics Co., Ltd.

Method to remove the effects of lo drift from vector network analyzer measurements

Certain exemplary embodiments can provide a method, which can comprise automatically removing effects of local oscillator phase drift occurring in between two measurements of reciprocal networks as made with a vector network analyzer. The method can further comprise determining that the vector network analyzer substantially simultaneously samples all incident and reflected waves from the reciprocal networks..
Eight Ten Labs Llc

Fail-safe disconnect junction box and solar power system

The invention discloses a fail-safe disconnect junction box for a solar photovoltaic module and a power station system, wherein the junction box comprises a box body, the box body is provided with a printed circuit board, the printed circuit board is printed with n bus bar connecting ends and two cable connecting ends, each bus bar connecting end is connected with a solar battery pack strand via bus bars, two adjacent bus bar connecting ends are further connected via a diode; wherein an electronic switch is connected between the first bus bar connecting end and the first cable connecting end in series, the electronic switch is controlled to turn on or off via a received control signal; the nth bus bar connecting end is connected with the second cable connecting end; and two cable connecting ends are connected to the outside via a cable respectively. The power station system controls the junction box via the control signal.
Shine Charm Limited

Management of motor regeneration

A method and apparatus for controlling regeneration for a motor. An instantaneous voltage provided by a power supply to the motor is identified using a voltage signal received from a voltage sensor.
The Boeing Company

Method and radial electromagnetic power arrays

Multiple arrays of linear motors and generators are combined in a radial configuration to provide high mechanical efficiency to deliver power in a single plane of motion to a common crankshaft. Magnet core assemblies for the motors and generators use powerful rare earth magnets positioned within an outer flux containment shell comprising a highly-magnetically-permeable ferrous-alloy to provide high power density.
Juiced Planet, Llc

High-power density winding structure, method and motor having axial magnetic field

The present invention discloses a winding structure and method having a high power density, and motor applying the above. The winding of the present invention has a multilayer 2d structure, has a distributed structure with an electrical angle of 180 degrees and is manufactured in the form of a pcb, wherein each layer arranged only one phase winding.
Fortior Technology (shenzhen) Co., Ltd.

Wireless power distribution management in an open environment

Disclosed aspects relate to wireless power distribution management in an open environment. A key-pair identifier is established in a master server.
International Business Machines Corporation

Smart battery charging to improve the lifespan of batteries

A method for managing a rechargeable battery. The method includes a computer processor identifying a rechargeable battery within a first device.
International Business Machines Corporation

Smart battery charging to improve the lifespan of batteries

A method for managing a rechargeable battery. The method includes a computer processor identifying a rechargeable battery within a first device.
International Business Machines Corporation

Light module comprising a laser element

The invention relates to a light module including a semiconductor laser element emitting a laser beam in a first cone of light, a photoluminescent element, and an optical means for transforming the light coming from the photoluminescent element into an exit light beam. The optical means has a guiding portion arranged to guide at least a portion of the light emitted in the first cone of light into a second cone of light and a device for detection of incident light.
Valeo Vision

Array type wavelength converting laser device

A device includes: at least one laser element with light emitting points to output fundamental waves in a one-dimensional array; a wavelength converting element to carry out wavelength conversion of the incident fundamental waves, and to output wavelength converted light rays; and an output mirror to reflect the fundamental waves, and to transmit the wavelength converted light rays resulting from the wavelength conversion by the wavelength converting element. The wavelength converting element is disposed between the laser element and the output mirror, and the distance between the position of a waist of the fundamental waves output from the laser element and the output mirror is set in accordance with a talbot condition under which the adjacent light emitting points cause phase synchronization with each other..
Mitsubishi Electric Corporation

Multi-portion connector for use with differently-sized cards

An apparatus and method are provided for use with a first card of a first size [e.g. Subscriber identify module (sim) card, etc.] and a second card of a second size (e.g.
Futurewei Technologies, Inc.

Multi-band wlan antenna device

A multi-band wlan antenna device, comprising a layer of conductive material forming a planar ground plane, having a first side edge in which a first cutout is formed, having an indented cutout edge and first and second connecting edges. A first antenna structure is formed in the cutout, comprising a first member projecting from the first connecting edge and extending parallel to the indented cutout edge.
Incoax Networks Europe Ab

System and identifying batteries

Various embodiments of a system and method for identifying a battery are generally described. In some embodiments, the battery identification system comprises a battery with a portion of exposed can and electrodes configured to measure an electrical property of the battery.
Tricopian, Llc

Proactive anode flooding remediation

A method for performing one or more proactive remedial actions to prevent anode flow-field flooding in an anode side of a fuel cell stack at low stack current density. The method includes identifying one or more trigger conditions that could cause the anode flow-field to flood with water, and performing the one or more proactive remedial actions in response to the identified trigger conditions that removes water from the anode side flow-field prior to the anode flooding occurring..
Gm Global Technology Operations Llc

High-molecular compound, intermediate composition, negative electrode, electrical storage device, slurry for negative electrode, producing high-molecular compound, and producing negative electrode

A polymer compound for use as a binder for a negative electrode of an electrical storage device is formed by condensing polyacrylic acid and a multifunctional amine represented by the following formula (1), in which y represents a straight chain alkyl group having 1 to 4 carbon atoms, a phenylene group, or an oxygen atom, and r1 and r2 each independently represent one or more hydrogen atoms, methyl groups, ethyl groups, trifluoromethyl groups, or methoxy groups.. .
Kabushiki Kaisha Toyota Jidoshokki

Nickel-containing composite hydroxide and production process therefor, positive-electrode active material for a nonaqueous-electrolyte secondary battery and production process therefor, and nonaqueous-electrolyte secondary battery

Provided is a nickel-containing composite hydroxide that is a precursor of a positive-electrode active material with which a nonaqueous-electrolyte secondary battery having a low irreversible capacity and a high energy density can be configured. An aqueous alkaline aqueous solution and a complexing agent are added to an mixed aqueous solution including at least nickel and cobalt to regulate the ph (measured at a reference liquid temperature of 25° c.) of this mixed aqueous solution to 11.0 to 13.0, the ammonium concentration to 4 to 15 g/l, and the reaction temperature to 20° c.
Sumitomo Metal Mining Co., Ltd.

Lithium-containing garnet crystal and all-solid-state lithium ion secondary battery

There are provided a lithium-containing garnet crystal high in density and ionic conductivity, and an all-solid-state lithium ion secondary battery using the lithium-containing garnet crystal. The lithium-containing garnet crystal has a chemical composition represented by li7-xla3zr2-xtaxo12 (0.2≦x≦1), and has a relative density of 99% or higher, belongs to a cubic system, and has a garnet-related structure.
National Institute Of Advanced Industrial Science And Technology

Plasma battery electrode coating on current collector pretreated with conducive material

Particles of active electrode material for a lithium-ion cell are suspended in an atmospheric plasma-activated gas stream and deposited on a surface of a metal current collector foil having a surface film of an oxide of the metal. The metal oxide film-containing surface of the current collector is pre-coated with a thin layer of an electrically conductive organic polymer composition that serves as a bonding surface for the plasma-applied particles of electrode material.
Gm Global Technology Operations Llc

Lithium metal coating on battery separators

A lithium ion battery may comprise a positive electrode, a negative electrode and a separator coated with a thin film of lithium metal, the thickness of the lithium being less than or equal to a thickness sufficient to compensate for the irreversible loss of lithium during the first cycle of the battery. Furthermore, there may be a ceramic layer on the separator between the separator and the lithium metal thin film.
Applied Materials, Inc.

Light-emitting element, display panel, display device, electronic device and producing light-emitting element

A light-emitting element includes at least a first trench portion having an indented shape within a single light-emitting region. In the first trench portion, a first electrode, an el layer, and a second electrode are layered in this order and in contact with each other.
Sharp Kabushiki Kaisha

Dual layer photovoltaic device

A hybrid photovoltaic device (1) comprising a thin film solar cell (2) disposed in a first layer (21) comprising an array of vertically aligned nanowires (25), said nanowires having a junction with a first band gap corresponding to a first spectral range. The nanowires (25) form absorbing regions, and non-absorbing regions are formed between the nanowires.
Sol Voltaics Ab

Semiconductor device and manufacturing the same

A transistor including an oxide semiconductor, which has good on-state characteristics, and a high-performance semiconductor device including a transistor capable of high-speed response and high-speed operation. In the transistor including an oxide semiconductor, oxygen-defect-inducing factors are introduced (added) into an oxide semiconductor layer, whereby the resistance of a source and drain regions are selectively reduced.
Semiconductor Energy Laboratory Co., Ltd.

Group iii-n transistor on nanoscale template structures

A iii-n semiconductor channel is formed on a iii-n transition layer formed on a (111) or (110) surface of a silicon template structure, such as a fin sidewall. In embodiments, the silicon fin has a width comparable to the iii-n epitaxial film thicknesses for a more compliant seeding layer, permitting lower defect density and/or reduced epitaxial film thickness.
Intel Corporation

High density capacitor structure and method

High density capacitor structures based on an array of semiconductor nanorods are provided. The high density capacitor structure can be a plurality of capacitors in which each of the semiconductor nanorods serves as a bottom electrode for one of the plurality of capacitors, or a large-area metal-insulator-metal (mim) capacitor in which the semiconductor nanorods serve as a support structure for a bottom electrode of the mim capacitor subsequently formed..
Globalfoundries Inc.

Display apparatus

A display apparatus includes a substrate including a display area displaying an image and a peripheral area outside the display area, a main wiring and an auxiliary wiring disposed in an identical layer in the peripheral area, the main wiring being disposed closer to the display area than the auxiliary wiring, a dam configured to cover at least a part of the main wiring, the auxiliary wiring being spaced apart from the dam, and a connecting wiring configured to connect the main wiring to the auxiliary wiring, and a thin-film encapsulation layer configured to seal the display area and the peripheral area.. .
Samsung Display Co., Ltd.

Semiconductor apparatus, solid-state image pickup device, image pickup apparatus, and electronic apparatus

The present technology relates to a semiconductor apparatus, a solid-state image pickup device, an image pickup apparatus, and an electronic apparatus capable of improving impedance characteristics while preventing an occurrence of a flare and an interference due to a bonding jig, and achieving downsizing an apparatus. By aligning the heights of a cover glass and a semiconductor device, a distance between the cover glass and the semiconductor device is set to be minimum, and thus it is possible to suppress an occurrence of a flare due to incident light reflected on a side surface of the semiconductor device, and improve the impedance characteristics of the semiconductor device and the semiconductor image pickup device.
Sony Corporation

Semiconductor device and manufacturing the same, semiconductor module, and electronic device

The present technology relates to a semiconductor device and a method of manufacturing the same, a semiconductor module, and an electronic device capable of more certainly improving an optical characteristic and chromatic aberration. A semiconductor package provided with a pedestal having a cylindrical shape including a curved surface curved so as to be concave to a light incident side, and a linear image sensor on which a plurality of pixels each including a photoelectric conversion element is arranged in a one-dimensional direction, the linear image sensor fixed on the curved surface on which a light-receiving area formed of a plurality of pixels is curved so as to be concave to the light incident side is provided.
Sony Corporation

3d semiconductor memory device and manufacturing method thereof

Provided herein is a semiconductor device including: a channel layer; a data storage layer surrounding the channel layer and extending along the channel layer; interlayer insulating layers surrounding the data storage layer and stacked along the channel layer, wherein the interlayer insulating layers are spaced apart from each other, wherein a conductive area is disposed between the interlayer insulating layers; a conductive pattern disposed in the conductive area and surrounding the data storage layer; buffer patterns disposed between the interlayer insulating layers and the data storage layer and surrounding the data storage layer, wherein each of the buffer patterns includes a densified area, wherein the buffer patterns are separated from each other by the conductive area; and a blocking insulating pattern disposed between the conductive pattern and the data storage layer and surrounding the data storage layer.. .
Sk Hynix Inc.

Semiconductor integrated circuit and logic circuit

Disclosed herein is a driver circuit including first and second n-channel transistors connected together in series between first and second nodes. The first n-channel transistor is comprised of n fin transistor(s) having an identical gate length and an identical gate width where n is equal to or greater than one, and has its gate connected to a first input node.
Socionext Inc.

Laser scribe structures for a wafer

Structures that include an identification marking and fabrication methods for such structures. A chip is formed within a usable area of a wafer, and a marking region is formed on the wafer.
Globalfoundries Inc.

Methods of encapsulation

Methods and apparatuses suitable for depositing low hydrogen content, hermetic, thin encapsulation layers at temperatures less than about 300° c. Are provided herein.
Lam Research Corporation

Method of manufacturing semiconductor device and resist glass

In a method of manufacturing a semiconductor device having an oxide film removing step where an oxide film formed on a surface of a semiconductor substrate is partially removed, the oxide film removing step includes: a first step where a resist glass layer is selectively formed on an upper surface of the oxide film without using an exposure step; a second step where the resist glass layer is densified by baking the resist glass layer; and a third step where the oxide film is partially removed using the resist glass layer as a mask, wherein the resist glass layer is made of resist glass which contains at least sio2, b2o3, al2o3, and at least two oxides of alkaline earth metals selected from a group consisting of cao, mgo and bao, and substantially contains none of pb, as, sb, li, na, k, and zn.. .
Shindengen Electric Manufacturing Co., Ltd.

Method to deposit conformal and low wet etch rate encapsulation layer using pecvd

Methods of depositing conformal, dense silicon-containing films having low hydrogen content are provided herein. Methods involve pulsing a plasma while exposing a substrate to a silicon-containing precursor and reactant to facilitate a primarily radical-based pulsed plasma enhanced chemical vapor deposition process for depositing a conformal silicon-containing film.
Lam Research Corporation

Wafer processing apparatus

Disclosed herein is a laser processing apparatus including a condenser having a function of spherical aberration. Since the condenser has a function of spherical aberration, the focal point of a laser beam to be focused by the condenser and applied to a wafer can be continuously changed in position along the thickness of the wafer.
Disco Corporation

Fe-based soft magnetic alloy ribbon and magnetic core comprising same

Conventional fe-based soft magnetic alloy ribbons each containing co and ni have a problem that magnetic anisotropy that is neatly arranged in one direction cannot be induced easily even by a magnetic field annealing treatment and, therefore, a wound magnetic cores, a problem that a residual magnetic flux density br is high, a problem that the hysteresis of the b—h curve becomes large (coercivity hc becomes large), a problem that the change in incremental permeability relative to superimposed magnetic field becomes large, and others. In order to solve the problems, provided is an fe-based soft magnetic alloy ribbon including a cu-concentrated region present directly below a surface of the ribbon, and a co-concentrated region present directly below the cu-concentrated region.
Hitachi Metals, Ltd.

Radiopharmaceutical production system, radiopharmaceutical production device, and production radiopharmaceuticals

The present invention comprises: an electron beam accelerator (2); a container (4) housing a raw material (3) for radioactive nuclide production, said raw material including molybdenum 100; a heating device (5) that heats the raw material (3) for radioactive nuclide production; an adsorbent (81) that adsorbs technetium compounds including technetium 99m generated by the heated raw material (3) for radioactive nuclide production; an eluent supply device (10) that supplies an eluent (l1) that causes elution of the technetium compound adsorbed to the adsorbent (81); and a drug recovery unit (13) that recovers the eluent (l2).. .
Hitachi, Ltd.

Water-cooled water-moderated nuclear reactor core melt cooling and confinement system

The invention relates to safety systems for nuclear power plants (npp), and can be used during severe accidents leading to reactor vessel and npp containment failure. The melt cooling and confinement system includes a cone-shaped guide plate installed under the reactor vessel bottom, cantilever girder installed under the guide plate and supporting the same, core catcher installed under the cantilever girder and equipped with cooled cladding in form of a multi-layer vessel for protection of the external heat-exchange wall from dynamic, thermal and chemical impacts, and filler material for melt dilution inside the multi-layer vessel.
Joint Stock Company "atomenergoproekt"

Controller to detect malfunctioning address of memory device

A controller includes an internal memory to store an address and a memory control unit operatively coupled with the internal memory. The memory control unit includes logic to identify a malfunctioning address of primary data storage elements within an external memory device, the external memory device being another semiconductor device separate from the controller, store the malfunctioning address in the internal memory, and transmit, to the external memory device, a command to initiate a repair of the malfunctioning address using redundant data storage elements and an indication of an address associated with the malfunctioning address..
Rambus Inc.

Leveraging chip variability

Embodiments are described that leverage variability of a chip. Different areas of a chip vary in terms of reliability under a same operating condition.
Microsoft Technology Licensing, Llc

Light incident angle controllable electronic device and manufacturing method thereof

Disclosed herein is a method of changing characteristics of an electronic device, including the steps of: applying light to an electronic device through a plurality of media having different refractive indexes from each other, the electrical characteristics of the electronic device being changed depending on the amount of incident light; and changing an incident angle of light applied the electronic device to adjust the amount of incident light. There is provided a method of providing light incident angle dependency by a simple procedure of accumulating additional media in various electronic devices.
Postech Academy-industry Foundation

Tfd i/o partition for high-speed, high-density applications

A microelectronic package can include a substrate having first and second surfaces, first, second, and third microelectronic elements each having a surface facing the first surface, terminals exposed at the second surface, and leads electrically connected between contacts of each microelectronic element and the terminals. The substrate can have first, second, and third spaced-apart apertures having first, second, and third parallel axes extending in directions of the lengths of the apertures.
Invensas Corporation

Automatic sound level control

A method includes identifying, by a computing device including a processor, a plurality of words from data. The method includes determining a location of the computing device.
At&t Mobility Ii Llc

Apparatus and encoding or decoding an audio signal using a transient-location dependent overlap

An apparatus for encoding an audio or image signal, includes: a controllable windower for windowing the audio or image signal to provide the sequence of blocks of windowed samples; a converter for converting the sequence of blocks of windowed samples into a spectral representation including a sequence of frames of spectral values; a transient location detector for identifying a location of a transient within a transient look-ahead region of a frame; and a controller for controlling the controllable windower to apply a specific window having a specified overlap length to the audio or image signal in response to an identified location of the transient, wherein the controller is configured to select the specific window from a group of at least three windows, wherein the specific window is selected based on the transient location.. .
Fraunhofer-gesellschaft Zur Foerderung Der Angewandten Forschung E.v.

Device and bandwidth extension for audio signals

An audio signal decoding apparatus is provided that includes a receiver that receives an encoded information, a memory, and a processor that demultiplexes the encoded information, including encoding parameters that are used for decoding a low frequency spectrum and index information that identifies a most correlated portion from a low frequency spectrum for one or more high frequency subbands. The processor also replicates a high frequency subband spectrum based on the index information using a synthesized low frequency spectrum, the synthesized low frequency spectrum being obtained by decoding the encoding parameters.
Panasonic Intellectual Property Corporation Of America

Device control method, device management system, and voice input apparatus

Methods, systems, and media for managing a plurality of target devices are provided. A voice command is received by an input associated with a first target device.
Panasonic Intellectual Property Corporation Of America

Keyword determinations from conversational data

Topics of potential interest to a user, useful for purposes such as targeted advertising and product recommendations, can be extracted from voice content produced by a user. A computing device can capture voice content, such as when a user speaks into or near the device.
Amazon Technologies, Inc.

Speaker identification device and registering features of registered speech for identifying speaker

[solving means] the speech recognition unit 102 extracts the text data corresponding to the registration speech, as the extraction text data. The registration speech is a speech input by a registration speaker reading aloud registration target text data that is preliminarily set text data.

Speech recognition wake-up of a handheld portable electronic device

A system and method for parallel speech recognition processing of multiple audio signals produced by multiple microphones in a handheld portable electronic device. In one embodiment, a primary processor transitions to a power-saving mode while an auxiliary processor remains active.
Apple Inc.

Voice input assistance device, voice input assistance system, and voice input method

Provided is a technology for enabling an operation to be conducted through use of words shortened more for an operation item estimated to be desired stronger. A voice input assistance device includes: a shortened-phrase storing unit configured to store an operation item and a shortened phrase corresponding to a desirability of the operation item in association with each other; a desirability estimation unit configured to estimate the desirability of each operation item through use of a predetermined index, and to identify the shortened phrase from the shortened-phrase storing unit based on the desirability; and an output processing unit configured to present the shortened phrase identified by the desirability estimation unit..
Clarion Co., Ltd.

Methods and systems for recipe management

Systems and methods for obtaining content over the internet, identifying text within the content (e.g., such as closed captioning or recipe text) or creating text from the content using such technologies as speech recognition, analyzing the text for actionable directions, and translating those actionable directions into instructions suitable for network-connected cooking appliances. Certain embodiments provide additional guidance to avoid or correct mistakes in the cooking process, and allow for the customization of recipes to address, e.g., dietary restrictions, culinary preferences, translation into a foreign language, etc..
Koninklijke Philips N.v.

System for providing occupant-specific acoustic functions in a vehicle of transportation

A system, for implementation at a vehicle of transportation, having multiple arrangements of occupant-zone-specific acoustic equipment in the vehicle. Each arrangement is positioned at a respective occupant-specific acoustic zone of the vehicle.
Gm Global Technology Operations Llc

A label facestock

The invention relates to a facestock for adhesive label, an adhesive label and an adhesive label laminate comprising an uniaxially in machine direction oriented facestock. According to an embodiment core layer comprises the following components: propylene homopolymer; a modifier consisting of at least one of the following: olefin elastomer, olefin plastomer and olefin block copolymer; and low density polyethylene.
Upm Raflatac Oy

Mobile computing weight, diet, nutrition, and exercise management system with enhanced feedback and goal achieving functionality

An illustrative mobile computing device executing weight, nutrition, health, behavior and exercise application software serves as a simulated combination personal trainer and dietician/nutritionist for the user using comprehensive databases storing personalized health, nutrition and exercise information. A mobile computing device, such as a smartphone, executing such software monitors, tracks and/or adjusts caloric intake, energy expenditure taking into account nutritional information and behavioral factors.
Smarten Llc

Automated generation and presentation of lessons via digital media content extraction

An automated lesson generation learning system extracts text-based content from a digital programming file. The system parses the extracted content to identify a sentence, and key words within the sentences, to use as prompts in the lesson.
Wespeke, Inc.

Contemporaneous capture and tagging of media evidence for education evaluation

An educational evidence and evaluation system for generating media files and context parameters and linking the media files and context parameters to education profiles during evaluation of a subject is disclosed. An example educational evidence and evaluation system comprises a capture engine that captures two media files, a context engine that tags the media files with context parameters, and a linking engine that links the media files and their tagged context parameters to an education profiles of a subject, wherein the evaluation engine links a first media file and its first context parameter to the education profile of a first subject before the capture engine captures a second media file..
Pearson Education, Inc.

Slow moving object road warning system

A computing device identifies a slow moving object and activates an alert signal a predetermined period of time when the slow moving object is identified. A sensor measurement is received from a sensor to compute a speed of travel of a moving object.
Slow Ride Llc

Method for creating of an improved rolling code radio control

A method for creating, with an unset radio control provided with a nfc device, an adjunct rolling code radio control controlling a user device, with which an original radio control is already associated having a rolling code based on a variation algorithm unknown by the unset radio control, wherein includes identifying the algorithm via a sniffer provided with a nfc device. If the sniffer possesses the algorithm, then the algorithm is transmitted via nfc from the sniffer to the unset radio control; if instead the sniffer does not possess the algorithm, it acquires the algorithm with an apparatus connectable to the internet and provided with a nfc device, then transmits the algorithm via nfc from the apparatus to the unset radio control.
Silca S.p.a.

System and reminding a user that an infant is on board a vehicle

A system for reminding a user of an infant's presence is disclosed. The system features a memory that stores computer-executable instructions and a processor which is communicatively coupled to said memory.

Apparatus and monitoring moving objects

A monitoring area is scanned by an area sensor device (e.g., an optical distance meter) detects objects. Moving objects are identified among the detected objects, and, among the identified moving objects, a moving object which is present in the monitoring area and which has been newest identified is set as a tracking target.
Denso Corporation

Dual mount searchable binder

A searchable binder which is operationally compatible with a binder management system having a cabinet with shelves or a file cabinet with file drawers for removable storage of searchable binders. Each binder has a body with front and rear covers and a spine.

Multi-jurisdictional progressive fast play lottery games with pool replenishment and associated methods

A multi jurisdictional master controller evaluates lottery data associated with each ticket purchased in each of the different jurisdictions as provided by each corresponding state server associated with each corresponding jurisdiction. A common jackpot is determined after each lottery ticket is purchased for the multi-jurisdictional lottery game that is accumulated from a percentage of each lottery ticket purchased.
Intralot, Inc.

Determining appearances of objects in a virtual world based on sponsorship of object appearances

An online system provides objects for presentation to a user via a virtual world, each object having an organic appearance for display. The online system receives sponsorship requests for sponsoring appearances of one or more objects in the virtual world.
Facebook, Inc.

Identification device, identification method, identification program and computer readable medium including the identificatioin program

A device for determining authenticity including processing circuitry which generates a reference image data of a counterfeit prevention medium at an observation angle for comparison with captured image data obtained based on a pattern of light observed from the counterfeit prevention medium at the observation angle between an imaging direction of the captured image data and a reference line of a surface of the counterfeit prevention medium, calculates similarity between the captured image data and the reference image data, and determines authenticity of the counterfeit prevention medium based on whether the similarity exceeds a threshold.. .
Toppan Printing Co., Ltd.

Vehicle-based identification and access

A method for conducting an interaction using a vehicle is disclosed. A vehicle can be identified based on one or more vehicle characteristics, including a license plate number, a make, a model, and a color.

Multiple-band identification and ranging

A long-range power-efficient multiple-band identification system and method includes, for example, a base-station control module and paired electronic key fob. The base-station control module and paired electronic key fob is arranged to provide a uhf (ultra-high frequency) wake transmitter for transmitting a wakeup signal in a uhf frequency range to the paired electronic key.
Texas Instruments Deutschland Gmbh

System and ticket validation

A method and system is provided for facilitating ticket exchange by validating ticket authenticity. Images of the barcodes of tickets are captured and decoded so that the encoded ticket information may be analyzed.
Motio, Inc.

System and determining grade errors of a route

In one embodiment of the subject matter described herein, a system is provided that includes a vehicle that is operating in accordance with the operational settings of a trip plan. The operational settings dictate how the vehicle system is to travel at different locations along the route.
General Electric Company

Automated transmission of aircraft anomalous incident data via preferred transmission modes

This disclosure is directed to techniques for automated transmission of surveillance incident data or other anomalous incident data from an aircraft via a preferred transmission mode. An example method includes detecting, by a processing device onboard an aircraft, an anomalous incident involving the aircraft that qualifies for reporting relative to a set of anomalous incident reporting criteria.
Honeywell International Inc.

Content creation tool

A server for content creation is described. A content creation tool of the server receives, from a first device, a content identifier of a physical object, a virtual object content, and a selection of a template corresponding to an interactive feature for the virtual object content.
Daqri, Llc

Three-dimensional fracture abundance evaluation of subsurface formations

A method, apparatus, and program product evaluate fracture abundance in a subsurface formation by modeling a fracture network in a three-dimensional volume using geometric primitives. A fracture abundance parameter, e.g., a p32 fracture density, may be determined in part based upon the combined areas of the primitives with cells of a three-dimensional grid..
Schlumberger Technology Corporation

Relevance based visual media item modification

A method that receives a visual media item and determines an identity of at least one intended viewer of the visual media item is disclosed. The method may further identify a visual representation of an object that is comprised by the visual media item and determine a relevance of the object based, at least in part, on the identity.
Nokia Technologies Oy

Method and electronic device for determining whether a point lies within a polygon in a multidimensional space

A computer-implemented method for determining whether a point lies within a first polygon in a multidimensional space and an electronic device for carrying out the method is disclosed. The method comprises accessing first polygon coordinates defining each of a position and a shape of the first polygon in the multidimensional space; accessing the point coordinates defining the position of the point in the multidimensional space; identifying regions of the multidimensional space each encompassing a respective portion of the first polygon coordinates, the regions approximating the first polygon; and storing, in a non-transitory computer-readable medium, region coordinates of at least one of the regions; whereby an analysis of the region coordinates and point coordinates is executable to generate an indication that the point lies within the first polygon and an indication that the point does not lie within the first polygon.
Yandex Europe Ag

Method and device for traffic sign recognition

Embodiments provide a method for recognizing a traffic sign from an input image. The method may include extracting image features from the input image; modifying the image features based on a predetermined image saliency map to determine modified image features; determining a plurality of traffic sign candidates by applying an adaptive boosting algorithm on the modified image features; determining a confidence score for each traffic sign candidate by applying a support vector regression algorithm; and recognizing a traffic sign based on the confidence score for each traffic sign candidate..
Agency For Science, Technology And Research

Methods and systems for corneal topography, blink detection and laser eye surgery

A method of blink detection in a laser eye surgical system includes providing a topography measurement structure having a geometric marker. The method includes bringing the topography measurement structure into a position proximal to an eye such that light traveling from the geometric marker is capable of reflecting off a refractive structure of the eye of the patient, and also detecting the light reflected from the structure of the eye for a predetermined time period while the topography measurement structure is at the proximal position.
Optimedica Corporation

Pedestrian tracking at a traffic intersection to identify vulnerable roadway users for traffic signal timing, pedestrian safety, and traffic intersection control

Pedestrian detection and counting for traffic intersection control analyzes characteristics of a field of view of a traffic detection zone to determine a location and size of a pedestrian area, and applies protocols for evaluating pixel content in the field of view to identify individual pedestrians. The location and size of a pedestrian area is determined based either on locations of vehicle and bicycle detection areas or on movement of various objects within the field of view.
Iteris, Inc.

Morphology identification in tissue samples based on comparison to named feature vectors

Locating morphology in a tissue sample is achieved with devices and methods involving storage of a plurality of feature vectors, each associated with a specific named superpixel of a larger image of a tissue sample from a mammalian body. A microscope outputs, in some embodiments, a live image of an additional tissue sample or a digitized version of the output is used.
Schwalb Consulting, Llc

Systems and methods for obtaining 3-d images from x-ray information

Methods, hardware, and software transform 2d anatomical x-ray images into 3d renderings for surgical preparation. X-ray images of a body part are identified by camera model.
Indian Institute Of Technology, Bombay

System and functional reconstruction of integrated circuits from layout analysis of circuit images

A method for reverse engineering the layout structure of an integrated circuit includes providing an image of a layer of the integrated circuit; processing the image to identify differentiated regions; associating the differentiated regions; and deriving a functional relationship between the association of the differentiated regions.. .
Roccor, Llc

Quality metrics for automatic evaluation of dual ish images

The present disclosure is directed to a computer system designed to (i) receive a series of images as input; (ii) compute a number of metrics derived from focus features and color separation features within the images; and (iii) evaluate the metrics to return (a) an identification of the most suitable z-layer in a z-stack, given a series of z-layer images in a z-stack; and/or (b) an identification of those image tiles that are more suitable for cellular based scoring by a medical professional, given a series of image tiles from an area of interest of a whole slide scan.. .
Ventana Medical Systems, Inc.

Primitive processing in a graphics processing system with tag buffer storage of primitive identifiers

A graphics processing system has a rendering space which comprises one or more tiles. The system comprises a processing module configured to perform hidden surface removal for primitives of a tile to determine primitive identifiers identifying the primitives which are visible at each of a plurality of sample positions in the tile.
Imagination Technologies Limited

Instruction storage

Techniques are disclosed relating to low-level instruction storage in a processing unit. In some embodiments, a graphics unit includes execution circuitry, decode circuitry, hazard circuitry, and caching circuitry.
Apple Inc.

Processing image fragments from one frame in separate image processing pipes based on image analysis

Fragments making up an image frame may be defined. Fragment based image analysis may be used to identify depicted objects of interest in particular fragments.
Intel Corporation

Method and presenting supply chain information to a consumer

A smart tracking device, such as a cellular m2m device, is attached to a plastic pallet for monitoring, recording and reporting the location, condition and manifest record of the pallet as it moves through a supply chain for shipment of products from a manufacturer to a consumer. The cellular m2m device has a subscriber identification module (sim) to uniquely identify the pallet with which it is associated in a cellular network.

Predictive approach to contract management

Embodiments of the present invention provide methods, computer program products, and systems for a predictive approach to contract management. In one embodiment, acceptable contract parameters are predicted based, at least in part on historic data and specified thresholds of identified contract parameters.
International Business Machines Corporation

Constrained cash computing system to optimally schedule aircraft repair capacity with closed loop dynamic physical state and asset utilization attainment control

A method of providing a first set of computer systems with access to a recommendation pertaining to operation of one or more assets based on the one or more assets being in revenue service or in repair is disclosed. Operations data and inspection data is collected at the first set of computer systems.
General Electric Company

Amenity, special service and food/beverage search and purchase booking system

The present invention relates to systems, methods and computer program products for an a la carte amenity, special service, food/beverage and accommodation feature search and booking engines. Aspects of the present invention allow customers to identify, via arbitrary search, amenities and/or special services (including food/beverage) available at lodging facilities, restaurants clubs/lounges/bars, dwellings and travel accommodation venues.

System and tracking a box and correlating a quality characteristic of the box to an overall equipment effectiveness of a packaging line that manipulates the box during a product packaging process

A method of tracking a box and correlating a quality characteristic of the box to an overall equipment effectiveness of a packaging line that manipulates the box during a product packaging process includes: at a first location, associating a unique identifier with a pre-erected form of the box, capturing at least one quality characteristic of the box, and storing the at least one quality characteristic and the associated unique identifier in a database; moving the pre-erected form of the box to a second location; at the second location, converting the pre-erected form of the box into an erected box, manipulating the erected box through the packaging line, and in an event where the erected box is involved in a disruption in the packaging line correlating the unique identifier of the associated erected box with the associated disruption and saving a record of the disruption and the unique identifier in a storage medium.. .
Georgia-pacific Corrugated Llc

System for a geographic location based sharing request network

Embodiments of the invention are directed to a system, method, or computer program product for building a geographic location based sharing request network. The invention generates and builds a sharing request network based on user geographic locations for efficiently and conveniently matching and connecting users to one another and third party systems.
Bank Of America Corporation

Policy driven payroll engine

A method and apparatus for running a payroll. The method identifies a policy instance for an employee by a computer system, wherein the policy instance includes a group of execution units in the computer system that implements a group of rules for a policy with respect to running the payroll for the organization.
Adp, Llc

System and creating historical records based on unstructured electronic documents

A system and method for generating recommendations based on unstructured electronic documents. The method includes analyzing a plurality of electronic documents to determine at least one transaction parameter for each electronic document, wherein at least one of the analyzed electronic documents includes at least partially unstructured data; creating a template for each analyzed electronic document, wherein each template is a structured dataset including the determined at least one transaction parameter for the respective electronic document; identifying at least one commonality among the created templates; and creating, based on the identified commonalities, a historical record, the historical record characterizing at least a portion of the transaction parameters of at least one group of the electronic documents..
Vatbox, Ltd.

Processing apparatus having a reference identification tied to a locked entry

Systems, methods, and non-transitory computer-readable mediums storing computer program code implement methods for providing a computer-aided dual-date system and method for accounting. In some cases, the described systems and methods include steps of receiving a plurality of accounting transactions to a computer device, storing the plurality of accounting transactions, and utilizing the plurality of stored accounting transactions to generate a financial statement.

Methods and systems for identifying competitors using content items including content extensions

Systems and methods for identifying competitors using content extensions in content items in content items associated with their content placement campaigns are described. A processor identifies one or more competing entities from auctions in which the first entity places a bid.
Google Inc.

System for triggering of living option resource allocation

Embodiments of the invention are directed to a system, method, or computer program product for triggering of living option resource allocation. In some embodiments, the invention provides a system for triggering of living option resource allocation.
Bank Of America Corporation

Method of raising capital via a business entity with a contract to generate revenue for the entity

A method of raising capital including the steps of: providing a business entity; providing an entity officer responsible for the operation and day-to-day decision-making of the entity; selling all or part of the original owner's interest in a business (e.g. A restaurant) or property (e.g.

Request fulfillment system, method, and media

Systems, methods, and apparatus are disclosed for generating and processing natural language requests. A request processing system processes a received natural language request to identify an intent of the natural language request and a confidence level of the identified intent.
Sears Brands, L.l.c.

System and management and optimization of waiting time for check-out service by means of unique identifier recognition via local wi-fi network

System and method for management and optimization of waiting time for check-out service by using an unique identifier recognition via local wi-fi network with the purpose to manage one or several check-out positions (cashiers or counters), optimizing waiting time for check-out service. This system and method is designed to be used by persons, where each individual is identified by the unique physical address identifier (such as the mac address) of their personal mobile device with wi-fi connection.

Collaborative manipulation of media files

Browsing session data of a first user of a first client device at an enterprise website is accessed together with user information associated with the first user. The accessed data is used to determine that the first user would like to collaborate with a second user of a second client device.
Oct8ne Inc.

Systems and methods for identifying potential shoplifting incidents

Embodiments relate to systems and methods for identifying potential shoplifting incidents. In one embodiment, a system can receive and analyze information related to a number of items removed from a display and a number of items added to a shopping receptacle.
Wal-mart Stores, Inc.

Systems and methods to process donations

Systems and methods are provided to facilitate donations via mobile communications. In one aspect, a system includes a data storage facility and an interchange having a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications.
Boku, Inc.

Image-based listing using image of multiple items

Example embodiments of a system and method for image-based listing of an item, using an image of multiple items, are generally described herein. In some example embodiments, an image-based listing system includes an identifying module to identify a portion of an image of multiple items, the portion of the image depicting the item; a tagging module to associate tag information with the portion of the image, the tag information being associated with the item; and a listing module to list the item, the listing of the item comprising displaying at least some tag information..
Ebay Inc.

Distribution using social proximity

An initial user is selected and social data associated with the user is retrieved. Social contacts within the profile are identified and assessed for association with a product or product type.
International Business Machines Corporation

Segmented advertising database system

A method and apparatus for managing a personalization database. The computer system selects a number of segments of profile information about a user from a plurality of segments of the profile information about the user located in a human resources database.
Adp, Llc

Advertisement management based on mobile resource performance

Mobile device performance is predicted for a specified timeframe to drive selection of presentation media to be rendered on the mobile device during the specified timeframe. Further, mobile device context is determined for the specified timeframe according to current and historical context data.
International Business Machines Corporation

Advertisement management based on mobile resource performance

Mobile device performance is predicted for a specified timeframe to drive selection of presentation media to be rendered on the mobile device during the specified timeframe. Further, mobile device context is determined for the specified timeframe according to current and historical context data.
International Business Machines Corporation

Selecting content for presentation to a group of online system users based on temporal, spatial, interest, and purpose information of the group

An online system identifies a group of users of the online system based on connections between the users of the group maintained by the online system and distances between the users during a particular time interval. The online system predicts a purpose of the group and one or more common interests shared by users of the group.
Facebook, Inc.

Apparatus and focused marketing messaging based on estimated building occupancy

An occupancy based focused marketing system for augmenting market control techniques corresponding to one or more buildings of one or more building types within a geographic subsector is provided. The occupancy based traffic control system has a subsector occupancy aggregator, an other facility occupancy estimator, and a subsector market control processor.
Enernoc, Inc.

Delivering content

The invention relates to a user device comprising: an output component for outputting media content to a user; computer storage holding a user model of a user, the user model comprising personal information of the user; an input component configured to receive a content identification document identifying pieces of content to be output to the user by the output component: a content modifier configured to modify the document received by the input component based on the user model of the user, the content modifier operable to filter out at least one piece of content identified by the content document to generate a modified identification document, wherein the output component is configured to interpret each piece of content identified in the modified identification document for outputting to the user, wherein the filtered out piece(s) of content is not provided to the user.. .
Piksel, Inc.

Segmented user profiles

A web page personalization system comprises a profile database and a profile manager. The profile database stores profiles for users.
Adp, Llc

Sequential hypothesis testing in a digital medium environment

Sequential hypothesis testing techniques are described, which involve testing sequences of increasingly larger number of samples until a winner is determined. In particular, sequential hypothesis testing techniques is based on whether a result of a statistic has reached statistical significance that defines a confidence level in the accuracy of the results.
Adobe Systems Incorporated

System for incentivizing charitable giving based on physical activity and a using the same

A system and method for incentivizing charitable giving based on physical activity includes a computer and a sports ball associated with a first participant identifier. The sports ball includes a sensor that detects and logs activity data.
Uncharted Play, Inc.

Systems and methods for providing ai-based cost estimates for services

Systems and methods for providing ai-based cost estimates for services are disclosed. The method may comprise receiving, at one or more processors, data from a scanning of a location, the scanning performed by one or more of a camera, a computer vision device, an inertial measurement unit, or a depth sensor.
Yembo, Inc.

Entity-specific value optimization tool

Examples of the disclosure provide a system and method for entity-specific value optimization. An elasticity estimation module receives a data request for an item associated with an individual entity, and identifies a value response curve for the item associated with the individual entity.
Wal-mart Stores, Inc.

Survey based on user behavior pattern

A method is provided to identify availability of a user and to prompt the user about a survey which is due on the user. The identification of availability is based on defined behavior patterns of the user.
International Business Machines Corporation

Dynamic tracking, analysis and acquisition of e-commerce advertising channels for toll-free markets

The present invention assists the critical real-time decision making required to make important decision on bidding on various customer procurement commodities in a telephonic sales market. The invention provides dynamic pricing as a function of internet or other types of advertisement costs for the telephonic market.

Method and distributing advertisements using social networks and financial transaction card networks

An exemplary method for distributing an offer to a mobile device includes identifying a location of a first mobile device, identifying offer preferences for a user of the first mobile device, and distributing the offer to the first mobile device. The offer is an offer for the purchase of goods or services, the offer meets the offer preferences of the user of the first mobile device, and the offer is encoded with a first offer identifier corresponding to the user of the first mobile device..
Mastercard International Incorporated

Item status tracking

A method and system for tracking the status of a label. The system can include a memory with a database.
United States Postal Service

Universal secure registry

A computer system for authenticating a user involved in a transaction and a method thereof is provided. The computer system comprises a communications interface configured to receive identification information including information specific to a mobile electronic device and information specific to a user account, and a one-time authentication code.
Universal Secure Registry, Llc

Universal secure registry

A mobile electronic device for authenticating a user involved in a transaction and a method thereof is provided. The mobile electronic device includes a biometric sensor, a user interface configured to pin or other secret information known to the user, and one or more processors configured to authenticate the user based on the user input, authenticate the user based on the biometric information, retrieve identification information including mobile device and user account information, and generate a one-time authentication code specific to the transaction.
Universal Secure Registry, Llc

Facial recognition identification for in-store payment transactions

The present disclosure relates to systems, methods, and devices for facial recognition identification for in-store payment transactions. In particular, a payment system allows a user to engage in a payment transaction with a merchant to purchase goods or services at an in-store checkout location.
Facebook, Inc.

System and securely transferring funds between persons

A computer-based method includes receiving, at a computer-based authorization system, a request to authorize payment to a first party at an electronic payment device from an account with funds that have been paid by a second party. The request includes an encrypted indication of an account number that corresponds to the account and a cash card number entered by the first party at the electronic payment device.
American Cash Exchange, Inc.

Method and system for instantaneous payment using recorded guarantees

A method for processing a guaranteed electronic transaction, includes: storing account profile, each include an account number and balance; receiving a transaction message from an acquiring financial institution via a payment network, the message including a specific account number, transaction amount, and payment guarantee data; identifying a specific account profile that includes the specific account number; deducting the transaction amount from the account balance in the specific account profile; generating a record of payment guarantee that includes the transaction amount and data associated with the payment guarantee data; generating a return message including a response code indicating transaction approval and data associated with the generated record; transmitting the generated record to a computing system via a communication network; and transmitting the generated return message to the acquiring financial institution via the payment network.. .
Mastercard International Incorporated

System and transaction payments using a mobile device

A system and method for performing a financial transaction may include processing a purchase transaction for products for purchase by a customer to determine a transaction amount. A communication with a mobile device of the customer may include communicating a store identifier, pos identifier, and the transaction amount.
Wal-mart Stores, Inc.

System and splitting a card data structure

Methods, systems, and computer program products are included for splitting a gift card by generating one or more other gift cards. A transaction processor receives a request to split a first value that corresponds to a first data structure, the request including a first identifier that is associated with the first data structure.
Paypal, Inc.

Methods and systems for tracking carts and retail products in a shopping space

In some embodiments, apparatuses and methods are provided herein useful for a retail facility to maintain information regarding product location, in part, from correlating a shopper's cart path and their purchased items with those of other shoppers. In some approaches, the methods and apparatuses may determine a cart path for a particular shopping cart by analyzing aisle markers captured by an image capturing device in the shopping cart, associate that cart path with the purchased items from that shopping cart, and compare the associated cart path and purchased items with similar information from other customers.
Wal-mart Stores, Inc.

Method and system for facilitating installments in an electronic transaction

A method for facilitation of installments for an electronic transaction includes: receiving a transaction message for an electronic transaction including an account identifier, transaction identifier, transaction date, and transaction amount; storing a transaction record for the transaction including the transaction identifier, transaction amount, transaction date, and a due date based on the transaction date; receiving an installment request, the request including the transaction identifier and installment options; calculating installment terms based on the installment options, transaction amount, transaction date, and due date, wherein the installment terms and/or options including an installment amount and number of installments; generating a plurality of transaction records, each related to an installment including the transaction identifier, installment amount, and a payment date based on the due date and number of installments, the number of transaction records being equivalent to the number of installments; and replacing the transaction record with the generated plurality of transaction records.. .
Mastercard International Incorporated

Systems and methods for providing a tailored user experience at a self-service kiosk

Embodiments of the disclosure enable a tailored user experience to be provided. A kiosk system includes a scanner component configured to identify biometric data; a metric component configured to communicate with the scanner component to identify user identifier data based on the biometric data; a transaction component configured to communicate with the metric component to identify a financial account corresponding to the identified user identifier data, and generate a request for authorization for a financial transaction using the identified financial account; and a dispenser component configured to communicate with the transaction component to determine whether to dispense the beverage.
Mastercard International Incorporated

Method for conducting monetary and financial transactions by treating amounts as collections of distinct units of account

A method for conducting monetary and financial transactions in an economy by treating amounts as collections of distinct individual, minimal, and indivisible units of account, each of which has a persistent identity and history throughout its lifecycle. A method is disclosed for conducting monetary transactions on the basis of appending the record of relationship between each individual unit of account and its respective owners throughout the lifecycle of the unit.

An online meeting system and method

The invention provides an online meeting controller operable to connect devices having installed an online meeting application which is operable to present a user interface for the device. The user interface of each device is operable to display data from the other device so as to allow users at each device to participate in an online meeting.
Suitebox Limited

System and providing work allocation and collaboration

A task tracking method includes recognizing, through a message communication tool, and tracking, as a task, a message that includes project information associated with a project or complete date information of a task associated with the project; identifying a member and a non-member of the task in response to tracking the task; and assigning the task associated with the project to the non-member through the message communication tool and granting a right to use the task so that collaboration is performed between the member and the non-member perform.. .
Nhn Entertainment Corporation

Message service method using character, user terminal for performing same, and message application including same

A message service method using a character, a user terminal for performing the same, and a message application including the same are disclosed. The message service method comprises the steps of: identifying a chat mode related to a method of expressing the contents of a chat; and displaying, in a chat room, the contents of a chat between a user terminal and a counterpart terminal according to the chat mode, wherein the chat mode may include a first chat mode in which 3d characters corresponding to the user terminal and the counterpart terminal are used, and a second chat mode in which the 3d characters are not used..

Systems and methods for collecting and processing image data

In some embodiments, apparatuses and methods are provided herein useful to collecting and processing image data relating to retail deliveries. In some embodiments, there is provided a system for capturing images of merchandise delivery containers, the system comprising: at least one unmanned aerial vehicle (uav) having an optical sensor for capturing image sequences; a memory device for storing the captured image sequences; an image database including images of at least one of text, symbols, logos, graphic designs, and pictures from known merchandise delivery containers; and a control circuit configured to: receive the captured image sequences; compare the image sequences with the images from the image database; determine individual images in the image sequences that match the images from the image database to identify merchandise delivery containers; and determine, based on the image sequences, address information corresponding to the geographical locations of the identified merchandise delivery containers..
Wal-mart Stores, Inc.

Method for transmitting perishable shipments

A method for transmitting perishable shipments in vehicles, including: a first communications module (m1) for establishing a communication connection to a communications terminal of a supplier which receives authorization data via a communications network (n1); a first identification routine for clearly identifying a supplier; a second communications module (m2) for establishing a communication connection via a wireless communications network (n2) to a communication device of a control device of the access assembly of a vehicle; a second identification routine for clearly identifying the system by the access assembly; a third communications module (m3) for receiving update request information from the driver; and an update routine for updating authorization data in a memory of the system.. .
Continental Automotive Gmbh

Automated inventory control rfid bin

Disclosed are various embodiments for automated tracking of inventory levels in storage bins. In one embodiment, among others, an adjustable bin divider may comprise a supporting base that has a receiving slot at an end, the receiving slot comprising a slide channel that extends along a top portion of the supporting base; a radio frequency identification (rfid) tag that is attached to the supporting base; and a radio frequency (rf)-blocking slide divider that comprises a first panel with an rf shield and a second panel that has a narrowed end, the first panel being connected to the second panel at the narrowed end, the first panel being inserted in the receiving slot, the narrowed end fitting within the slide channel of the receiving slot, wherein the rf-blocking slide divider conceals the rfid tag from detection from an rfid reader at a position along the slide channel..
Stanley Industrial & Automotive, Llc

Distributed autonomous robot systems and methods

Described in detail herein are systems and methods for detecting absent like physical objects at a first facility and replenishing the like physical objects from the second facility to the first facility. The system includes an autonomous robot device configured to detect absent like physical objects at a first facility and transmit an identifier associated with the like physical objects to a first computing system.
Wal-mart Stores, Inc.

Systems and methods for identifying and managing item stocking status in a retail environment

Embodiments relate to systems and methods for identifying out-of-stock situations based on customer shopping lists and patterns. A system for identifying out-of-stock situations can comprise an electronic shopping list, an inventory database, and a stocking status engine communicatively coupled with the electronic shopping list and the inventory database and configured to analyze the electronic shopping list and the inventory database to identify a stocking status of at least one item on the electronic shopping list in a retail environment.
Wal-mart Stores, Inc.

System and parallelizing order-by-order planning

A system and method is disclosed for parallelizing order-by-order planning in a supply chain network. The system includes a database configured to store data describing a demand priority sequence, each demand priority sequence comprising at least one demand of an end-item and data describing the supply chain network comprising a plurality of network components, each network component configured to supply one or more items to satisfy demand.
Jda Software Group, Inc.

Connection multiplexing for a parallel processing environment

Systems and methods are disclosed for connection multiplexing in a parallel processing environment. An example method includes requesting, responsive to a request to perform multiple database operations in a single transaction, a connection identifier for a physical connection to the database, providing the connection identifier to each of a plurality of workers, and performing the multiple database operations using the plurality of workers.
Sap Se

Self-organizing parallel deployment of database artifacts

Systems and methods deploy artifacts to a database in a self-organizing matter as a single transaction. An example method includes determining one or more root nodes in a dependency graph, the dependency graph including a node for each of the plurality of artifacts, each node having a respective dependency count, wherein the one or more root nodes have a respective dependency count of zero.
Sap Se

Constrained time computing control system to simulate and optimize aircraft operations with dynamic thermodynamic state and asset utilization attainment

A method of providing a first set of computer systems with access to a recommendation pertaining to operation of one aircraft in one or more fleets of aircraft is disclosed. Operations data is collected at the first set of computer systems.
General Electric Company

Device management system and maintenance work method using the system

A device management system includes a storage unit which stores, in advance and in correlation with device identification information set in each steam controller, location information indicating a location of each steam controller. The storage unit further stores in advance work patterns for the steam controller according to a classification based on a device type and an installation state of the steam controller.
Tlv Co., Ltd.

Fog drone fleet orchestrator

Embodiments herein describe a fog drone that selects, organizes, monitors, and controls a plurality of drones in a fleet. The fog drone receives a job to be completed from a dispatcher and identifies the resources for accomplishing the job such as the amount of material (e.g., fiber optic cable) or the type of drones (e.g., drones with rf antennas or digging implements) needed to execute the job.
Cisco Technology, Inc.

System and methods for reporting and managing incidents using electronic devices

A method of managing a report for an incident via a remote server that includes receiving an indication of an occurrence of an incident from a first electronic device; receiving information for the generation of an incident report from at least two electronic devices; storing the information in a storage location associated with the incident; determining if the stored information includes all information required to generate a complete incident report; upon a negative determination, transmitting an indication of the stored information and of information needed required to generate the complete incident report to at least one electronic device of the plurality electronic devices; and upon a positive determination, changing the state of the storage location associated with the incident and generating the incident report from the stored information associated with the incident.. .
Lexmark International Technology Sarl

Evaluating keyword performance

Systems and methods for evaluating keyword performance include receiving history data indicative of online actions performed regarding one or more advertisements. A set of one or more keywords may be associated with the one or more advertisements.
Google Inc.

Method and system for using and inspecting e-tickets on a user terminal

A method for inspecting an e-ticket on a mobile communication device of a user, including rendering the e-ticket on a display of the mobile communication device, wherein the e-ticket includes a ticket information area for displaying user related information, and a ticket validation area for displaying inspection related information when at least one predefined condition is met, enabling a ticket inspector to execute a checking gesture in the ticket validation area when the ticket inspector ascertains one or more predefined identifiers in the ticket validation area, displaying a confirmation code in the ticket validation area, upon execution of the checking gesture, enabling the ticket inspector to execute a confirmation gesture in the ticket validation area when the displayed confirmation code matches a predefined confirmation code, and marking the e-ticket as used upon execution of the confirmation gesture.. .
W-zup Communication Oy

Fast training of support vector data description using sampling

A computing device determines an svdd to identify an outlier in a dataset. First and second sets of observation vectors of a predefined sample size are randomly selected from a training dataset.
Sas Institute Inc.

Modifying the modality of a computing device based upon a user's brain activity

Technologies are described herein for modifying the modality of a computing device based upon a user's brain activity. A machine learning classifier is trained using data that identifies a modality for operating a computing device and data identifying brain activity of a user of the computing device.

Systems and methods for determining that a media item is being presented

The various implementations described herein include systems and methods for determining that media items are currently being presented. In one aspect, a method performed at a client device includes: (1) identifying a media item potentially being presented on an output device coupled to the client device; (2) calculating a level of confidence that the identified media item is currently being presented to the user; (3) subsequent to the calculating, determining that at least one predetermined event associated with user interaction with the media item has occurred; and (4) based on the at least one predetermined event, increasing or decreasing the level of confidence that the identified media item is currently being presented to the user..
Google Inc.

Recognition apparatus based on deep neural network, training apparatus and methods thereof

A recognition apparatus based on a deep neural network, a training apparatus and methods thereof. The deep neural network is obtained by inputting training samples comprising positive samples and negative samples into an input layer of the deep neural network and training.
Fujitsu Limited

Stored value card and carrier assembly with tamper evident label

A stored value card and carrier assembly including a carrier formed from one or more panels, at least one stored value card sandwiched and sealed within the carrier, and a label removably adhered or coupled to the card and adhered or coupled to an interior of the carrier such that the bond to the carrier or card is greater than the bond to the other of the card or carrier. The label includes at least a portion of activation indicia, such as a barcode, either printed or otherwise applied thereon.
Travel Tags, Inc.

Radio frequency identification activation

Radio frequency identification (rfid) enabled devices are presented. In some examples, a rfid tag may be arranged on the device and the device may further include a rfid tag mode modifier which is configured to transfer the mode or state of the rfid tag from a first mode, such as an inactive mode, to a second mode, such as an active or enabled mode, or vice versa.
Bank Of America Corporation

Active rfid-based real time location systems

A computer-implemented method includes identifying one or more tag readers. The one or more of tag readers are positioned peripherally to a region.
International Business Machines Corporation

Graphene-based micro-scale identification system

A system for labeling an object uses at least one object label made from a material that absorbs and reflects incident energy uniformly across all wavelengths of incident energy at a ratio proportional to a thickness of the material and that includes a pattern having variations in the thickness of the material along at least one of two orthogonal directions across the label. An interrogator directs a predetermined wavelength of radiation to the at least one label, and a reader to receives reflected radiation from the label at the predetermined wavelength and interprets the reflected radiation to recognize the pattern..
International Business Machines Corporation

Item recommendations using image feature data

An apparatus and method to facilitate providing recommendations are disclosed herein. A query image is received via a user interface.
Ebay Inc.

Object detection for an autonomous vehicle

An object detection system for an autonomous vehicle processes sensor data, including one or more images, obtained for a road segment on which the autonomous vehicle is being driven. The object detection system compares the images to three-dimensional (3d) environment data for the road segment to determine pixels in the images that correspond to objects not previously identified in the 3d environment data.
Uber Technologies, Inc.

Learning highlights using event detection

A highlight learning technique is provided to detect and identify highlights in sports videos. A set of event models are calculated from low-level frame information of the sports videos to identify recurring events within the videos.
Google Inc.

Feature density object classification, systems and methods

A system capable of determining which recognition algorithms should be applied to regions of interest within digital representations is presented. A preprocessing module utilizes one or more feature identification algorithms to determine regions of interest based on feature density.
Nant Holdings Ip, Llc

Programmable overlay for negotiable instrument electronic image processing

Embodiments of the invention include systems, methods, and computer-program products for generating an overlay of a highlight or mask of a negotiable instrument on a representative's display for keying the instrument. The system overlays and changes the display of a representative's computer screen in real-time for improved keying instruments by generating highlighting or masking of specified portions of the instrument.
Bank Of America Corporation

An apparatus, method and computer program for identifying biometric features

A method, apparatus and computer program, wherein the method comprises: illuminating a portion of skin of a user; detecting light scattered by the illuminated portion of skin and using the detected light to identify locations of biometric features within the illuminated portion of skin; and configuring a light source to selectively illuminate identified locations of biometric features.. .
Nokia Technologies Oy

Arrangement of an aperture and a filter region for a filter sensor device and filter sensor device

The arrangement comprises a filter region (10) filtering electromagnetic radiation and a shielding component (20) inhibiting propagation of electromagnetic radiation. The filter region comprises a central filter region (11) and a separate peripheral filter region (13).
Ams Ag

Data retrieval in pattern recognition systems

Methods, apparatuses and systems directed to pattern identification and pattern recognition. In some particular implementations, the invention provides a flexible pattern recognition platform including pattern recognition engines that can be dynamically adjusted to implement specific pattern recognition configurations for individual pattern recognition applications.

Audit capabilities in pattern recognition systems

Methods, apparatuses and systems directed to pattern identification and pattern recognition. In some particular implementations, the invention provides a flexible pattern recognition platform including pattern recognition engines that can be dynamically adjusted to implement specific pattern recognition configurations for individual pattern recognition applications.

Smartcard and controlling a smartcard

A smart card 102 may include a processor for controlling operation of the smartcard, a biometric sensor for identification of an authorised user, and an accelerometer for sensing movements of the smartcard. The processor may be arranged to permit access to one or more secure feature(s) of the smartcard based on the movements sensed by the accelerometer and authentication of the user's identity via the biometric sensor..
Zwipe As

Sewer pipe inspection and diagnostic system and method

A method is disclosed for interrogating enclosed spaces such as sewers and the like by commanding a camera to travel through the enclosed space while transmitting the video feed from the camera to a remote location for viewing and processing. The processing involves image manipulation before analyzing frames of the video using a neural network developed for this task to identify defects from a library of known defects.
City Of Long Beach

Informational display for moving objects visible through a window

A method displays information on an object visible through a moving transparent screen and geographical coordinates are identified. The geographical coordinates of the window are used for a part of an object stored in a database, a resulting projection location on the window is identified upon projection of the object in the direction of an observer looking through the window and moving along with the window.
Siemens Aktiengesellschaft

Identification of objects in a scene using gaze tracking techniques

Techniques and systems for identifying objects using gaze tracking techniques are described. A computing system may determine or infer that an individual is requesting to identify an object that is unknown to the individual based at least partly on images of the individual, images of a scene including the object, or both.

System and determining an entity status based on unstructured electronic documents

A system and method for determining an entity status based on unstructured electronic documents. The method includes analyzing a transaction electronic document to determine at least one transaction parameter for the transaction electronic document, wherein the transaction electronic document includes at least partially unstructured data; creating a template for the transaction electronic document, wherein the template is a structured dataset including the determined at least one transaction parameter; obtaining, based on the created template, an evidencing electronic document, wherein the evidencing electronic document at least indicates a status of an entity indicated in the transaction electronic document at a time indicated in the electronic document; and determining, based on the obtained evidencing electronic document, the status of the entity, wherein the determined status indicates whether the entity was authentic at the time indicated in the electronic document..
Vatbox, Ltd.

System and detecting interaction with living object

A living object detection system may detect the interaction between an observer and a target object. The system may include an object sensor device, an object classification data unit, and an object detection module.
Board Of Trustees Of Michigan State University

System and interpreting interpersonal communication

A method for interpreting interpersonal communication includes monitoring a first interaction between two or more individuals using a set of monitoring devices including a camera, a microphone, and the like. A culture and personality type of at least one individual is identified based on the monitored first interaction.
International Business Machines Corporation

Systems and methods for real-time user verification in online education

Systems and methods for real-time user verification in online education are disclosed. In certain example embodiments, user identifying information associated with a user and a request to access online education content may be received from a user device.
Mcafee, Inc.

Rotation invariant object detection

A method, including receiving a two-dimensional (2d) image of a three-dimensional (3d) object recorded at a first angle of rotation of the object, and identifying, in the 2d image, a set of image descriptors, each of the image descriptors including an image keypoint and one or more image features. The set of image descriptors are compared against sets of template descriptors for respective previously captured 2d images, each of the template descriptors comprising a template keypoint and one or more template features.
International Business Machines Corporation

Fingerprint detection circuit and fingerprint recognition system

The present invention provides a fingerprint detecting circuit applied in a fingerprint identification system, wherein the fingerprint identification system transmits a first signal to finger. The fingerprint detecting circuit includes a conductive layer to couple a touch from the finger; and an amplifier including a first input terminal coupled to the conductive layer; a second input terminal to receive a second signal; and an output terminal, wherein a first capacitance is between the output terminal and the first input terminal; wherein a phase of the first signal is inverse to a phase of the second signal.
Shenzhen Goodix Technology Co., Ltd.

Method and automatically recognizing input audio and/or video streams

A method and system for the automatic identification of audio, video, multimedia, and/or data recordings based on immutable characteristics of these works. The invention does not require the insertion of identifying codes or signals into the recording.
Iceberg Industries Llc

Fingerprint identification module

A fingerprint identification module including a cover plate, a fingerprint identification sensor, a first adhesive layer, and at least one light source is provided. The cover plate has an inner surface, an outer surface opposite to the inner surface, and a plurality of microstructures located at the inner surface.
Gingy Technology Inc.

Compact system for registering papillary ridge patterns

The invention relates to the field of biometric identification. The technical result consists in decreasing the overall dimensions and increasing the reliability of a system for registering papillary ridge patterns, while providing for reduced cost, high image quality, rapid operating speed and reduced energy consumption.
Abilma Llc

Fingerprint sensor sensing fingerprint

A fingerprint sensor apparatus including a fingerprint sensor and a processor circuit is provided. The fingerprint sensor is configured to capture a plurality of local fingerprint images of a fingerprint.
Novatek Microelectronics Corp.

Wearable device and controlling method thereof

Disclosed are a wearable device and controlling method thereof. The present invention includes a flexible surface light source, a photo panel located on a top surface of the flexible surface light source, and a controller coupled with the flexible surface light source and the photo panel.
Lg Electronics Inc.

Fingerprint identification thereof

A fingerprint identification method is provided. The method includes steps as follows: having a finger press on a photoelectronic sensor module; respectively emitting an invisible light beam reflected to a photoelectronic sensor module after passing through the finger and a visible light beam reflected to the photoelectronic sensor module via a surface of the finger; generating, by the photoelectronic sensor module, photocurrent signals based on the visible light beam and the invisible light beam; respectively generating, by an analog/digital converter module, a first digital signal and a second digital signal based on the photocurrent signals; and outputting, by a processor module, the first digital signal as a gray-scale fingerprint image and a second digital signal as a colored fingerprint image.
Gingy Technology Inc.

Fingerprint detecting circuit and fingerprint identification system

The present invention, belonging to a field of fingerprint detecting technology, relates to a fingerprint detecting circuit including: a first conductive layer; a second conductive layer; an inverting amplifier, comprising a single input terminal coupled to the first conductive layer; and an output terminal coupled to the second conductive layer; and a switching unit, configured for establishing a dc operating point of the inverting amplifier, wherein a terminal of the switching unit is coupled to the input terminal, and another terminal of the switching unit is coupled to the output terminal. The present invention utilizes the inverting amplifier with single input single output and the switching unit to quickly and correctly establish the dc biasing point of the inverting amplifier, and convert the sensing capacitance into the output signal.
Shenzhen Goodix Technology Co., Ltd.

Arrangement for, and , processing products associated with rfid tags and bar code symbols at the same workstation

A workstation has a metallic housing for supporting an electro-optical reader for reading bar code symbols. A radio frequency (rf) antenna of an rf identification (rfid) reader for reading rfid tags is mounted in a metallic container that is connected to the housing.
Symbol Technologies, Llc

Adaptive processing of radio frequency identification

Embodiments of the present disclosure relate to adaptive rfid communication. A tag device includes a storage configured to store content that is executable by a proxy device associated with a reader device.
International Business Machines Corporation

Method for preventing unauthorized diversion of nfc tags

A method, system and apparatus for pairing authorized nfc enabled rfid devices with an intended object or product. The method, system and apparatus can include a primary rfid with a radio frequency identification chip, a coil antenna, a bridge and a substrate; an association of the at least primary rfid device with an object; an integration of a material into one of the at least primary rfid device and the object that provides the rfid device with a predetermined resonant frequency; and the detuning of one or more secondary communication devices located proximate the rfid device..
Avery Dennison Retail Information Services, Llc

Tag-based locating

Methods and apparatus relating to processing a low-energy data packet are provided. A method includes receiving, using a receiver in a portable wireless device, a low-energy data packet from a low-energy tag.
Google Inc.

Storage device tampering detection

Apparatus (400, 500) and method (200, 220, 240, 260, 280, 300) for detecting unauthorized tampering with a data storage device (100, 110, 140, 520). In some embodiments, the data storage device has a housing (112, 142) and a memory (192) supported by the housing.
Seagate Technology Llc

Shared identity management (idm) integration in a multi-tenant computing environment

Techniques are disclosed for enabling tenant hierarchy information to be migrated directly between different multi-tenant system (e.g., from a shared idm system to a nimbula system, or vice versa). A corresponding new tenant is created in a nimbula system based on a combination of the tenant information and the service information from the shared idm system.
Oracle International Corporation

Use of aka methods and procedures for authentication of subscribers without access to sim credentials

Systems and methods which enable an authentication procedure to be used within the standard network security architecture to authenticate third party applications that are forbidden access to a particular secret key are disclosed. Third party smartphone applications that are unable to use sim-based authentication due to being forbidden access to a sim-based key are provided an alternate secret key for use in an eap-aka or eap-sim type procedure according to embodiments.
Sonus Networks, Inc.

Automated deployment and securitization of model-based composite applications

A computer implemented method of deploying a software application in a virtualized computing environment, comprising: receiving a description of the software application including an identification of a set of one or more application software resources; determining one or more types of security facility required for the set of application software resources and determining a security requirement for each of the determined types of security facility; selecting a security software resource for each of the determined types of security facility; determining a security configuration for each of the selected security software resources, the security configuration being based on a security requirement associated with a type of security facility for the security software resource; and generating a deployment specification for the software application specifying the application software resources and the security software resources for deployment of the application in the virtualized computing environment, each of the security software resources having associated the determined security configuration.. .
British Telecommunications Public Limited Company

Dynamically optimizing performance of a security appliance

A device may identify a set of features associated with the unknown object. The device may determine, based on inputting the set of features into a threat prediction model associated with a set of security functions, a set of predicted threat scores.
Juniper Networks, Inc.

Method and system for enterprise network single-sign-on by a manageability engine

A manageability engine (me) receives an authentication response from a user during pre-boot authentication and registers the user with a key distribution center (kdc), indicating that the user has successfully authenticated to the pc. The kdc supplies the me with single-sign-on credentials in the form of a key encryption key (kek).
Intel Corporation

Incorporating multiple authentication systems and protocols in conjunction

Embodiments of the disclosure provide a method of incorporating multiple authentication systems and protocols. The types of authentication systems and protocols can vary based on desired assurance levels.
Aetna Inc.

Verification distinguishing man from machine

The present disclosure provides a verification method for distinguishing a man from a machine, wherein the method comprises: s1: receiving trajectory information input by a terminal; s2: comparing the trajectory information with a preset trajectory; s3: judging whether verification passes at least from dimensionality of a comparison result of the trajectory information and the preset trajectory. As compared with the prior art, the verification method and apparatus for distinguishing a man from a machine in the present disclosure may recognize user identity through simpler operation, and particularly applied to the mobile device, may bring about better user experience, and meanwhile exhibit very high security and difficulty in cracking the machine..
Baidu Online Network Technology (beijing) Co., Ltd.

Methods and device authentication and secure data exchange between a server application and a device

In some embodiments, a method includes sending an authentication request to a client device to obtain a utilization code in response to a request from the client device to access data. The utilization code is uniquely associated with the client device.
Pegasus Media Security, Llc

Disease therapy game technology

A video game in possession of and/or in the proximity of a patient. The patient computing system receives an indication that it is to begin a game, and executes the game using identified game parameters that are associated with the patient by a clinician as part of a disease therapy program.
University Of Utah Research Foundation

Method for processing an input for controlling an infusion operation

A method for processing an input into a control device (3) for controlling the infusion operation of at least one infusion device (20) comprises the steps of: displaying a first view (v) on a touch-sensitive display device (30) of the control device (3), the first view (v) including a multiplicity of input elements (301-304); upon a first touch input by a user, determining a projection area (p) associated with the touch input on the first view (v); if the projection area (p) intersects with at least one input element (301-304) of the multiplicity of input elements (301-304), determining an intersection area (a1, a2) of the projection area (p) with the intersected at least one input element (301-304); and if the intersection area (a1, a2) with an intersected input element (301-304) is larger than a selection threshold (r1), identifying the associated input element (301-304) as selected. Herein, if the intersection area (a1, a2) with all of the at least one input element (301-304) does not exceed the selection threshold (r1), the intersected at least one input element (301-304) is displayed in an alternate view (v) if for the intersected at least one input element (301-304) a critical relevance criteria (c) is fulfilled.
Fresenius Vial Sas

Social health risk estimation

A method, a processing device, and a computer program product are provided. In various embodiments, one or more processing devices retrieves one or more network communications.
International Business Machines Corporation

Identifying and ranking risk factors using trained predictive models

Embodiments are directed to methodologies, systems and computer program products for generating, for each of a plurality of risk factors in a patient database containing information of a plurality of patients, an index of input values for the risk factor. For each patient p of the plurality of patients, a series of local impact scores is computed for the patient.
International Business Machines Corporation

Method and system for establishing network connection to a wearable eeg monitoring module

A system and a method for providing a network connection for a computer device (21) to a wearable eeg monitoring module (1) having a gateway to the internet (16), and comprising a patient record server (25) accessible over the internet, and providing an electronic patient medical database (26), each patient record including a unique identity for an associated wearable eeg monitoring module; a control server (19) providing an eeg module connection register (19a) including the unique identity of eeg monitoring modules associated with current connection information; and a network connection handling element (43) being adapted for detecting the presence of a wireless connection between the wearable eeg monitoring module (1) and the gateway, and for uploading current connection information to the control server (19). The control server (19) is adapted for updating the convection information in the eeg module connection register (19a) when receiving communicated connection information, and for providing the current connection information to a computer device (21) upon request.
T&w Engineering A/s

System and integration of telemedicine into mutlimedia video visitation systems in correctional facilities

A system and method for integration of telemedicine into multimedia video visitation systems of correctional facilities is disclosed herein. The system includes a telemedicine center that communicates with a medical center located at a correctional facility and a physician kiosk remote to the correctional facility.
Global Tel*link Corporation

Wearable device for real-time monitoring of parameters and triggering actions

A system provides healthcare monitoring and actuation of a user. The system establishes, via the distributed network, an operative communication channel with a wearable device of a user; generates and transmit a healthcare application to the wearable device via the operative communication channel; authenticates the wearable device at a first time based on at least receiving the indication that the user is in possession of the wearable device; determines that the user continues to remain in possession of the wearable device; identifies one or more trigger events associated with the user, wherein the one or more trigger events comprise healthcare trigger events, activity trigger events and location trigger events; and initiates one or more proactive response actions in response to the one or more trigger events..
Bank Of America Corporation

Identifying and ranking risk factors using trained predictive models

Embodiments are directed to methodologies, systems and computer program products for generating, for each of a plurality of risk factors in a patient database containing information of a plurality of patients, an index of input values for the risk factor. For each patient p of the plurality of patients, a series of local impact scores is computed for the patient.
International Business Machines Corporation

Method and system for predicting continous cardiac output (cco) of a patient based on physiological data

The various embodiments of the present invention disclose a method and system for predicting a physiological condition of a patient during post-surgery recovery in intensive care unit (icu). The physiological condition is the continuous cardiac output (cco) of a patient ahead of time based on past physiological data.

Efficient management of visible light still images and/or video

A visible light imaging system includes acquisition circuitry, an image generator that generates at least one of a visible light image and a visible light video with light sensed by the acquisition circuitry, a memory, and a controller. The controller, in response to executing instructions of the memory: launches a scan application, visually presents a first soft tool that retrieves an identification of a subject of interest to an imaging study based on a user input, obtains at least one of a visible light image and a visible light video, which is generated by the acquisition circuitry and the image generator for the subject, associates the retrieved identification of the subject and the at least one of the image and the video, and transfers the at least one of the image and the video, the identification of the subject, and the association to a data repository..
Koninklijke Philips N.v.

Method for triple-patterning friendly placement

The present disclosure is directed to a method for triple-patterning friendly placement. The method can include creating cell attributes identifying potential risk for triple-patterning design rule checking (tp drc) violations in both a vertical and a horizontal propagation in a placement region.
Taiwan Semiconductor Manufacturing Co., Ltd.

Method and system for designing fpga based on hardware requirements defined in source code

According to one embodiment, a source code is parsed to identify a first routine to perform a first function and a second routine to perform a second function. A control signaling topology is determined between the first routine and the second routine based on one or more statements associated with the first routine and the second routine defined in the source code.
Baidu Usa Llc

Scalable logic verification by identifying unate primary inputs

Embodiments herein describe a verification process that identifies unate primary inputs in input paths of a property gate. A property gate is logic inserted in a hardware design represented by a netlist which is used to verify the design.
International Business Machines Corporation

Scalable logic verification by identifying unate primary inputs

Embodiments herein describe a verification process that identifies unate primary inputs in input paths of a property gate. A property gate is logic inserted in a hardware design represented by a netlist which is used to verify the design.
International Business Machines Corporation

Cleansing system for a feed composition based on environmental factors

A cleansing system for improving operation of a petrochemical plant or refinery. The petrochemical plant or refinery may include a fractionation column, a condenser, and a pump.
Uop Llc

3d model creation support system and method

A 3d model creation support system which supports creation of a 3d model with attribute of an object configured with a plurality of configuration elements connected to each other, and a method thereof is provided. A system information database 41 in which system information including connection relationships between the plurality of configuration elements is registered; a shape model library 43 in which shape models corresponding to each of the plurality of configuration elements are registered; configuration element selection means 42 that selects configuration elements whose 3d models are not created among the plurality of configuration elements, based on the system information which is registered in the system information database; and configuration element identification means 44 that acquires a predetermined shape model corresponding to a predetermined configuration element which is selected by the configuration element selection means from the shape model library and creates a 3d model of the predetermined configuration element by matching the predetermined shape model to the point group data, are included..
Hitachi, Ltd.

Accommodating engineering change orders in integrated circuit design

A method includes receiving a register-transfer-level description and a gate-level description for an integrated circuit design. The gate-level description includes one or more spare latches implemented as reconfigurable latch filler cells.
International Business Machines Corporation

Accommodating engineering change orders in integrated circuit design

A computer-implemented method includes identifying an in initial register-transfer-level description for an integrated circuit design and adding one or more spare latches to the initial register-transfer-level description to yield a modified register-transfer-level description for the integrated circuit design. The computer-implemented method further includes performing placement and routing for the modified register-transfer-level description to yield a gate-level description for the integrated circuit design.
International Business Machines Corporation

Camera-activated data transfer from a source computing device to a target computing device

Mechanisms for transferring data from a source computing device to a target computing device are provided. A filename identifier (id) that identifies a file stored on the source computing device is presented on a display device.
Red Hat, Inc.

Techniques for presenting content to a user based on the user's preferences

Techniques for presenting content to users. The techniques include: obtaining user context information including a first keyword; identifying, based on the first keyword, a first attribute and a second attribute among the plurality of attributes, the first attribute being a characteristic of the first keyword and the second attribute being another characteristic of the first keyword; obtaining, based on the user context information, at least one second-order user preference among attributes in the plurality of attributes including a preference between the first attribute and the second attribute; identifying a set of content items among the plurality of content items based on the first attribute and the second attribute; determining a ranking of content items in the set of content items based on the at least one second-order user preference; and presenting content items to the user in accordance with the ranking..
Primal Fusion Inc.

Accessing content from suppressed url index

Systems, methods and devices are provided for generating and suppressing indexes that are utilized for navigating content. After a search query is processed, search results are received.
Lips Labs Inc.

Annotation of videos using aggregated user session data

A method for identifying products associated with items of content, including: receiving, by a server from a first client device, a first request for a first item of content; retrieving, by the server from data storage, the first item of content in response to the first request for the first item of content; retrieving, by the server from data storage, an identification of an internet search request transmitted by a second client device within a predetermined temporal window of playback of the first item of content by the second client device; retrieving, by the server from data storage, a second item of content selected in response to the internet search request transmitted by the second client device; and providing, by the server to the first client device, the first and second items of content.. .
Google Inc.

Short message classification for video delivery service and normalization

In one embodiment, a method selects a set of accounts related to a video using a first classifier that is trained to identify the set of accounts from a plurality of accounts and selects a token used to identify the video. A second classifier is trained to identify short messages that are related to the video using a first set of short messages from the accounts related to the video and the second set of short messages including the tokens.
Hulu, Llc

Answering questions via a persona-based natural language processing (nlp) system

A mechanism is provided, in a question answering (qa) system, for performing persona-based question answering is provided. An identification of a requested persona is received from a user along with a natural language question input specifying an input question to be answered by the qa system.
International Business Machines Corporation

Answering questions via a persona-based natural language processing (nlp) system

A mechanism is provided, in a question answering (qa) system, for performing persona-based question answering is provided. An identification of a requested persona is received from a user along with a natural language question input specifying an input question to be answered by the qa system.
International Business Machines Corporation

Answering questions via a persona-based natural language processing (nlp) system

A mechanism is provided, in a question answering (qa) system, for performing persona-based question answering is provided. An identification of a requested persona is received from a user along with a natural language question input specifying an input question to be answered by the qa system.
International Business Machines Corporation

Computer-implemented method, search processing device, and non-transitory computer-readable storage medium

A computer-implemented method for creating and searching a database, the method including, storing inquiry data within a database, dividing the inquiry data into sentences to generate sentence data, segmenting the sentence data to obtain word string data, identifying a plurality of content words within with the word string data, calculating a first probability for each of the plurality of content words, the first probability indicating a probability of a first word being adjacent to a second word, receiving an instruction including at least one word string, selecting a first extended keyword having a highest probability of being adjacent to the word string, extracting a second extended keyword having a lower probability than the first content word of being adjacent to the word string, searching the database based on a word string, first extended keyword and second extended keyword.. .
Fujitsu Limited

Identifier based glyph search

An identifier based glyph search is described. In one or more embodiments, a search input is analyzed in a digital medium environment to generate search tokens and locate a font.
Adobe Systems Incorporated

Detecting social relationships from user activity logs

Social relationships are detected between a plurality of users. A set of user activity logs is input, where these logs originate from one or more network services and cover a prescribed period of time.
Microsoft Technology Licensing, Llc





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.


2.723

file did exist - 17464

2 - 1 - 420