Images List Premium Download Classic

Invoke

Invoke-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Systems and method for using closed captions to initiate display of related content on a ...
Google Llc
August 09, 2018 - N°20180227641

This application discloses a method for using closed captions to initiate display of related content. A computer system identifies a set of first information in closed captions of a video stream, and searches an identity database using the set of first information as queries.
Device display security with user-specified filtering of display contents
International Business Machines Corporation
August 09, 2018 - N°20180225478

Disclosed embodiments provide a temporary privacy mode for an electronic device. The user selects one or more regions of allowable content and/or unallowable content.
Device display security with user-specified filtering of display contents
International Business Machines Corporation
August 09, 2018 - N°20180225477

Disclosed embodiments provide a temporary privacy mode for an electronic device. The user selects one or more regions of allowable content and/or unallowable content.
Invoke Patent Pack
Download 156+ patent application PDFs
Invoke Patent Applications
Download 156+ Invoke-related PDFs
For professional research & prior art discovery
inventor
  • 156+ full patent PDF documents of Invoke-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Flexible command line interface redirection
Brocade Communications Systems Llc
August 09, 2018 - N°20180225162

Systems, methods, apparatus, and computer-readable medium are described for executing a foreground bound process with characteristics similar to a background process. In certain implementations, a code wrapper is executed before and/or after the foreground bound process is invoked that dissociates the process input/output with the standard input/output provided by the operating system and redirects the input/output ...
Load and software configuration control among composite service function chains
Nokia Solutions And Networks Oy
August 09, 2018 - N°20180225139

A method, an apparatus and a computer program product are related to service function chain management. Management functionality is directed to efficient controlling software configuration for service function chains and to adaptively invoke, reconfigure or stop virtual machines for load balancing purposes to cope with the dynamic life traffic..
Computer readable storage media and methods for invoking an action directly from a scanned code
Quikkly Limited
August 09, 2018 - N°20180225114

Systems and methods for performing functions are disclosed herein. An example non-transitory computer-readable storage medium may store one or more programs, and the one or more programs may comprise instructions which, when executed by one or more processors of a computing device, cause the computing device to obtain a scanned code, analyze the scanned code to identify a direct action ...
Invoke Patent Pack
Download 156+ patent application PDFs
Invoke Patent Applications
Download 156+ Invoke-related PDFs
For professional research & prior art discovery
inventor
  • 156+ full patent PDF documents of Invoke-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Software robots for programmatically controlling computer programs to perform tasks
Soroco Private Limited
August 09, 2018 - N°20180225010

A system comprising at least one computer hardware processor configured to perform: generating an object hierarchy comprising a plurality of objects corresponding to active graphical user interface (gui) elements of at least one application program; controlling the at least one application program to perform a task comprising a sequence of actions at least in part by using the object hierarchy ...
Notification of delivery of a rrlp multilateration timng advance request message to a base station ...
Telefonaktiebolaget L M Ericsson (publ)
August 02, 2018 - N°20180220390

The present disclosure describes various techniques for enabling a serving gprs support node (sgsn) to provide a base station system (bss) with an indication that a logical link control (llc) protocol data unit (pdu) sent to a given wireless device contains a radio resource location services protocol (rrlp) multilateration timing advance request message such that the bss after transmitting the ...
Radio access network (ran) cell site diagnotic test tool system and method
Telefonaktiebolaget Lm Ericsson (publ)
August 02, 2018 - N°20180220312

A radio access network (ran) cell site field test tool with a mobile application extension wherein a diagnostic function can be invoked automatically based on preconfigured event criteria or can be initiated remotely by a preregistered human or machine user. Example diagnostic functions may include the ability to test one or all the following functional/structural subsystems of a ran ...
Synchronization of property values between a client and a server
Microsoft Technology Licensing, Llc
August 02, 2018 - N°20180219962

A system is provided for synchronizing a property value between a proxy of an application of a client and a corresponding remote object of a server. The application instantiates a proxy of a proxy class corresponding to a remote object of a remote object class where the proxy class specifies a property with a proxy getter.
Deferring invocation requests for remote objects
Microsoft Technology Licensing, Llc
August 02, 2018 - N°20180219961

A system is provided for an application executing at a client to send invocation requests to remote objects of a server. Each invocation request is generated when the application invokes a proxy of a proxy class of the application corresponding to a remote object of a remote object class.
Invocation path security in distributed systems
Pivotal Software, Inc.
August 02, 2018 - N°20180219863

Systems, methods, and computer program products for an application to securely record and propagate an invocation context for invoking other applications are described. The applications being invoked not only receive a user's authentication token, but also authentication tokens of an entire invocation chain.
System and method for generating and executing automated test cases
Cognizant Technology Solutions India Pvt. Ltd.
August 02, 2018 - N°20180217921

A system, computer-implemented method and computer program product for generating and executing test cases is provided. The system comprises a configuration unit configured to receive test data corresponding to one or more test cases and link the received test data to one or more test scripts.
Invoke Patent Pack
Download 156+ patent application PDFs
Invoke Patent Applications
Download 156+ Invoke-related PDFs
For professional research & prior art discovery
inventor
  • 156+ full patent PDF documents of Invoke-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Acceleration management node, acceleration node, client, and method
Huawei Technologies Co., Ltd.
August 02, 2018 - N°20180217856

Embodiments of the present application provide an acceleration management node. The acceleration management node separately receives acceleration device information of all acceleration devices.
Systems, methods, and apparatuses for implementing schema-driven on-the-fly code generation within a cloud based computing ...
Salesforce.com,inc.
August 02, 2018 - N°20180217819

In accordance with disclosed embodiments, there are provided systems, methods, and apparatuses for implementing schema-driven on-the-fly code generation within a cloud based computing environment. For instance, an exemplary system having at least a processor and a memory therein includes means for: designing an application having a plurality of method calls to perform functionality for the application; defining at least one ...
Processor including multiple dissimilar processor cores that implement different portions of instruction set architecture
Apple Inc.
August 02, 2018 - N°20180217659

In an embodiment, an integrated circuit may include one or more processors. Each processor may include multiple processor cores, and each core has a different design/implementation and performance level.
Data model view with complex calculation capability
Sap Se
July 26, 2018 - N°20180210902

Described herein is a framework for providing data model views with complex calculation capability. In accordance with one aspect, the framework receives a request to calculate target results.
Tail latency aware foreground garbage collection algorithm
Samsung Electronics Co., Ltd.
July 26, 2018 - N°20180210825

A solid state drive (ssd) is disclosed. The ssd may include a host interface logic to receive a write command from a host and flash memory to store data.
System and method for dynamic scaling of concurrent processing threads
American Express Travel Related Services Company, Inc.
July 26, 2018 - N°20180210804

A system and method for the dynamic scaling of concurrent processing threads are provided. The system may include a scheduler, a master controller, a thread controller, a process invoker, a reprocess validator, and a server cluster comprising various managed servers.
Api-based service command invocation
International Business Machines Corporation
July 26, 2018 - N°20180210768

Api-based service command invocation is provided through a method that includes identifying one or more executable commands of a service. The one or more executable commands correspond to one or more service operations supported by the service.
Systems and methods for adaptive vulnerability detection and management
University Of North Texas
July 19, 2018 - N°20180205755

Systems and methods providing adaptive vulnerability detection and management are described. Certain embodiments include monitoring system parameters of a cloud-based system, invoking a security ontology knowledge base configured to relate the monitored system parameters to unknown and known vulnerabilities, identifying, based on the monitored system parameters and the invoked security ontology knowledge base, one or more vulnerabilities of the system, ...
Loading