Follow us on Twitter
twitter icon@FreshPatents


Timestamp patents

      

This page is updated frequently with new Timestamp-related patent applications.

Hdr/wdr image time stamps for sensor fusion
Provided are systems and methods for determining timestamp information for high dynamic range and/or wide dynamic range composite images. For example, an apparatus is provided that comprises an image sensor configured to capture a plurality of sub-frames of a scene, wherein each sub-frame comprises an image of the scene captured using an exposure time that is different from at least one other exposure time of at least one other sub-frame of the plurality of sub-frames.

Method and system for synchronizing robot with server
Provided are a method and system for synchronizing a robot with a server. The service sends a time service command including a current time of the server to the robot, and the robot receives the time service command, so as to enable time synchronization of the robot with the server.

Selective capture with rapid sharing of user computer or mixed reality actions, states using interactive virtual streaming
A method for streaming interactive media between clients includes streaming a first series of packets from a server to a first client. The packets include data, instructions and timestamps for executing the instructions.

Website integrity and date verification with a blockchain
Systems and methods are disclosed which use a block chain (“blockchain”) to enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. In an exemplary operation, an internet browser retrieves a website document, hashes at least a portion of the website document to produce a first hash value, retrieves blockchain registration data for the website document; compares the first hash value with a second hash value found in a blockchain; and responsive to the first and second hash values matching, displays a verification indication.

Adaptive self-trained computer engines with associated databases and methods of use thereof
In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: an adaptive self-trained computer engine programmed, during a training stage, to electronically receive an initial speech audio data generated by a microphone of a computing device; dynamically segment the initial speech audio data and the corresponding initial text into a plurality of user phonemes; dynamically associate a plurality of first timestamps with the plurality of user-specific subject-specific phonemes; and, during a transcription stage, electronically receive to-be-transcribed speech audio data of at least one user; dynamically split the to-be transcribed speech audio data into a plurality of to-be-transcribed speech audio segments; dynamically assigning each timestamped to-be-transcribed speech audio segment to a particular core of the multi-core processor; and dynamically transcribing, in parallel, the plurality of timestamped to-be-transcribed speech audio segments based on the user-specific subject-specific speech training model.. .

Programming language for execution by drone
One embodiment provides a method comprising maintaining a weather model based on predicted weather conditions for an air traffic control zone. A hash table comprising multiple hash entries is maintained.

Write-ahead logging through a plurality of logging buffers using nvm
An example system for write-ahead logging through a plurality of logging buffers using a non-volatile memory (nvm) is disclosed. The example disclosed herein comprises a processing unit coupled to one or more controllers from one or more client applications.

Methods, apparatus and articles of manufacture to provide secondary content in association with primary broadcast media content
Example methods, apparatus and articles of manufacture to provide media content are disclosed. Example apparatus disclosed herein include means for identifying primary media content presented on a first media presentation device.

Visual voicemail managing deleted messages
A method for managing visual voicemail messages includes displaying a list of voicemail messages on a telecommunications handset, receiving user commands for operating on the voicemail messages including a delete message command and in response to a delete message command, marking a voicemail message for deletion with a delete timestamp and moving the voicemail message to a deleted messages folder. A deleted message age indicator function processes to control permanent deletion of voicemail messages in the deleted messages folder based on delete timestamps and a global delete time value in cooperation with a visual voicemail platform..

Electronic communication platform
An electronic communication platform for audio- or video- conferencing is provided. Audio (video) streams are transmitted from client stations to a central media server, which re-transmits the streams to all other stations, and also makes a recording of each individual stream.

System and storing and processing database requests

A system is provided that is adapted to service web-based database service requests. In one implementation, a database service is provided for servicing web-originated service requests.

Time series database search system

Systems, device and techniques are disclosed for a time series database search system. A data object may be received.

A automatic measurement of app load power consumption on mobile devices based on physical measurement

The invention discloses a method for automatic measurement of app load power consumption on mobile devices based on physical measurement. The method includes: 1) sending a designated mobile web and a mobile phone model to a server; 2) the server sends the mobile web to a browser to the corresponding mobile phone to load the mobile web, and starting a power meter; 3) when the mobile web finished loading on the mobile phone, the server processes the measured data: first, obtaining timestamps in the page loading process according to the request time, the reception time, and computation time of network resources, synchronizing the timestamps with the server time, and calculating power consumption of the mobile phone during the mobile web load based on synchronized times and data measured by the power meter.

Methods and systems for capturing a plurality of three-dimensional sub-frames for use in forming a volumetric frame of a real-world scene

An exemplary volumetric frame capture controller (“controller”) transmits first and second commands to first and second three-dimensional (“3d”) capture devices disposed, respectively, at first and second positions with respect to a real-world scene. The first and second commands are to capture, respectively, first and second 3d sub-frames representative of the real-world scene from first and second vantage points associated with the first and second positions.

Methods and systems for delaying message notifications

Methods and systems are provided for delayed message notification associated with a content item. The system can receive a notification from a first user and intended for a second user, and can comprise a message, a content identifier, and a timestamp indicating a relative time within a content item associated with the content identifier.

Assessing user activity using dynamic windowed forecasting on historical usage

Systems and methods for assessing user activity using dynamic windowed forecasting on historical usage. The system includes a server including an electronic processor.

Time tracking with trits

A memory controller circuitry includes a timestamp circuitry and a demarcation voltage (vdm) selection circuitry. The timestamp circuitry is to capture a global timer index from a global timer having a granularity, g.

Object re-identification with temporal context

Techniques for object re-identification based on temporal context. Embodiments extract, from a first image corresponding to a first camera device and a second image corresponding to a second camera device, a first plurality of patch descriptors and a second plurality of patch descriptors, respectively.

Legal timeline analytics

Various of the disclosed embodiments concern systems and methods for applying legal analytics. In some embodiments, a legal analytics platform retrieves legal data from an electronic database, analyzes some or all of the legal data, and identifies interesting patterns and results of statistical analyses.

Determining cacheability of webpages

Methods, systems and computer-readable storage mediums encoded with computer programs executed by one or more processors for determining cacheability of a webpage are disclosed. In an embodiment, a request for a webpage is received.

Device, packet processing to facilitate circuit testing

Techniques and mechanisms to modify packet information in support of on-chip test functionality. In an embodiment, an integrated circuit (ic) chip includes a protocol stack to receive and process packetized information—e.g., where the processing of at least one isochronous timestamp packet (itp) includes circuitry of the protocol stack replacing non-deterministic data of the itp with substitute information.

Sparse superline removal

Provided are an apparatus, system, and method for sparse superline removal. In response to occupancy of a replacement tracker (rt) exceeding an rt eviction watermark, an eviction process is triggered for evicting a superline from a sectored cache storing at least one superline.

Method for recreating time-based events using a building monitoring system

An electronic processor-implemented method (10) is provided for virtually recreating time-based events associated with a building (12) using a building monitoring system (13) having a plurality of monitored electronic devices (16). The method (10) includes storing time-stamped event data (18) for events associated with each monitored electronic device (16) in an electronic memory (20), and storing a visual representation (22) of the building (12) in the electronic memory (20).

Navigation system and method

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for altering or generating a navigation path for a vehicle based on aggregated environmental data received from a plurality of vehicles. In one particular implementation, a vehicle may one or more sensors for determining a road condition and/or environmental information around a vehicle.

Message verification

According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core configured to obtain, from a timestamp, a truncated timestamp comprising a first number of least significant bits of the timestamp and not comprising at least one most significant bit of the timestamp, to derive a hash value based at least in part on the timestamp, a payload and a secret value, and to compile a first message comprising the truncated timestamp, the payload and, at least in part, the hash value, and a transmitter configured to be directed by the at least one processing core, to transmit the first message toward a recipient.. .
Nokia Technologies Oy

Timestamp-based session association

Systems and methods for associating sessions using (tcp packet-level) timestamps are provided. A collection of data packets received during one or more sessions within a time period may be retrieved.
Parrable Inc.

Asynchronous garbage collection in parallel transaction system without locking

Methods, systems, and computer-readable storage media for determining that a transaction of a plurality of transactions performed in at least a portion of a system includes a delete operation, the plurality of transactions being managed by a secondary transaction manager and including a subset of all transactions performed in the system, in response to the delete operation, inserting a clean-up entry in the secondary transaction manager, attaching the clean-up entry to a subsequent transaction in order to determine and assign a time to the cleanup-entry that is used to subsequently trigger garbage collection, and selectively comparing the time to a most-recently-reported minimum read timestamp that is periodically reported to the secondary transaction manager from a primary transaction manager of the system, wherein the clean-up entry is executed in response to determining that the time is less than the most-recently-reported minimum read timestamp.. .
Sap Se

Video content selection

A method and apparatus are disclosed for detecting a user selection of a positioning tag; retrieving directional information and timestamp information relating to the selected tag; comparing directional information relating to the selected tag with directional information of an array of cameras arranged to capture video content from a recording area; identifying video content captured by one or more cameras from an array of cameras arranged to capture video content from a recording area, wherein the video content captured by the one or more cameras is identified if the one or more cameras have captured video content from a section of the recording area relevant to the location of the selected tag over a time period relevant to the timestamp information relating to the selected tag; and selecting the identified video content obtained from the one or more cameras for display.. .
Nokia Technologies Oy

Autonomous vehicle pickup directed by socially derived meta data in public environments

Embodiments of the present invention disclose a method, computer program product, and system for directing movements of an autonomous vehicle. A vehicle operator exiting a vehicle is detected.
International Business Machines Corporation

Autonomous vehicle pickup directed by socially derived meta data in public environments

Embodiments of the present invention disclose a method, computer program product, and system for directing movements of an autonomous vehicle. A vehicle operator exiting a vehicle is detected.
International Business Machines Corporation

Image processing device configured to regenerate timestamp and electronic device including the same

An image processing device includes a vision sensor and a processor. The vision sensor generates a plurality of events in which an intensity of light changes and generates a plurality of timestamps depending on times when the events occur.

Timestamped license data structure

Technology is disclosed herein for a timestamped license data structure. In at least one implementation, program instructions stored on one or more computer readable storage media, when executed by a processing system, direct the processing system to at least, responsive to a launch of an application, obtain a license file for the application, the license file comprising a license data structure comprising: a user license; a licensing service signature; a licensing service public key; and a trusted timestamp package.

System and caching time series data

The present invention provides a method and system for caching time series data. A computer system for caching time series data is disclosed.

Coincidence resolving time readout circuit

A coincidence resolving time readout circuit is described. An analog sipm sensor for detecting photons and generating an sipm output signal is provided.

Systems and methods for wi-fi latency reduction in docsis backhaul

A wireless communication node includes a receiving portion configured to detect, over a wireless communication channel, a request to send (rts) message from a transmitting station within a communication vicinity of the wireless communication node. The rts message includes at least one duration field.
Cable Television Laboratories, Inc

Network event prediction method and apparatus and establishing network-event prediction model

A method includes determining signaling sequence data of a user according to signaling plane data of the user, the signaling plane data of the user includes n pieces of signaling data and a timestamp of each of the n pieces of signaling data, and each of the n pieces of signaling data includes a signaling type, determining a first probability value of occurrence of a first network event according to the signaling sequence data of the user and a first supervised prediction model, determining a second probability value of occurrence of the first network event according to expert feature data of the user and a second supervised prediction model, the expert feature data of the user represents a value of at least one preset feature of the user, and determining a predicted occurrence probability of the first network event according to the first probability value and the second probability value.. .
Huawei Technologies Co., Ltd.

Target detection and mapping

A system for providing a geographical location for a detected moving object is presented. The system comprises a camera configured to capture a first image of a field of view at a first time, and a second image of a field of view at a second time.
Innovative Signal Analysis, Inc.

Link prediction with spatial and temporal consistency in dynamic networks

A computer-implemented method executed by at least one processor for performing link prediction with spatial and temporal consistency by employing a time-dependent matrix factorization technique is presented. The method includes developing, at a plurality of timestamps, relational data of a sequence of network structures each including a plurality of nodes and learning, by the at least one processor, a feature vector of each node of the plurality of nodes of the sequence of network structures by concurrently optimizing a temporal fitting constraint and a network propagation constraint.
Nec Laboratories America, Inc.

System and alarm correlation and root cause determination

A fault management (fam) system monitoring a telecommunication network is able to determine a root cause of a malfunction within the network. The root cause determination is accomplished by receiving alarms from network elements, which may be physical devices, logical interfaces, or a combination thereof.
Teoco Ltd.

Transaction management in distributed ledger systems

In various implementations, a method of managing transactions in a distributed ledger is performed by a first network node that is configured to maintain a distributed ledger in coordination with a plurality of network nodes. In various implementations, the first network node includes a processor, a non-transitory memory, and a network interface.
Cisco Technology, Inc.

System and methods to associate multimedia tags with user comments and generate user modifiable snippets around a tag time for efficient storage and sharing of tagged items

Example methods and apparatus to add a tagged snippet of multimedia content to a playlist are disclosed. An example apparatus comprises an automatic content recognition search service to search a fingerprint database to find a match between query fingerprints for a snippet of multimedia content captured from a multimedia program at a timestamp and reference fingerprints of matching reference multimedia content stored in the fingerprint database, a tag service to generate a tag representing the snippet of multimedia content, wherein the tag, the timestamp, meta information associated with the matching reference multimedia content, and a monitored variable for a number of viewers of the snippet of multimedia content are stored in a database storage as a tagged snippet of multimedia content, and to add the tagged snippet of multimedia content to a playlist for an identified multimedia program if the number of viewers of the tagged snippet exceeds a threshold..
Gracenote, Inc.

Method and system for storage and transfer of verified data via blockchain

A method for verified data storage via blockchain includes: storing a blockchain comprised of a plurality of blocks, each comprised of a block header and a plurality of transaction values, the block header including a timestamp; receiving a transaction notification including an entity identifier and data values; validating the data values based on a validation notification received from a verifying entity; generating a new block header comprised of a current timestamp, a block reference value, and a transaction reference value, the block reference value being generated via hashing of the block header included in a most recent block based on the timestamp, and the transaction reference value being generated via hashing of new transaction values including the data values; generating a new block comprised of the generated new block header and the new transaction values; and transmitting the new block to a node associated with the blockchain.. .
Mastercard International Incorporated

Global consistency with recency in distributed database management systems

Techniques are described that are performed by one or more database management system (dbms) of the plurality of dbms nodes comprising one or more database servers performing database operations on one or more databases of the dbms nodes. The techniques describe receiving, at a qc node, a distributed query that specifying a database of a target dbms node.
Oracle International Corporation

Frequency offset compensation for wifi ranging

Timestamps associated with when transmissions are sent and received between a pair of communication devices are used to determine a distance between the pair of communication devices. The communication devices operate according to a wireless communication protocol, which specifies that a requester of a ranging measurement session is to compensate for a clock frequency offset between the pair of communication device and that a responder is not to compensate for the clock frequency offset.
Marvell World Trade Ltd.

Dynamic advertisement stream replacement

Mechanisms are provided for replacing default advertisement streams in a media stream with replacement advertisement streams. User profile information is obtained for a particular user and/or device.
Mobitv, Inc.

Malware beaconing detection methods

A method for detecting malware beaconing in a network, the method includes capturing network traffic over a network connection at a network connected device, representing the network traffic over the network connection as a set of tuples wherein each of the tuples includes at least a source internet protocol address, a destination internet protocol address, and a destination port, associating timestamps with each of the set of tuples, and analyzing the tuples using the timestamps based on frequency of connections to determine malware beaconing on the network, wherein the analyzing is performed by a computing device.. .
Netsec Concepts Llc

Data transmission method and apparatus

A method including receiving, by a first device, a request message from a second device regularly, wherein the request message carries a timestamp corresponding to the request message currently received; determining, by the first device, whether the value of the timestamp is less than a preset threshold; and synchronizing, by the first device according to a corresponding relationship between timestamps and fragmented data locally cached by the first device, the fragmented data corresponding to the timestamp to the second device when the value of the timestamp is less than the preset threshold, wherein the fragmented data is obtained by fragmenting the full amount of data recorded by the first device. The present disclosure solves the technical problem of frequent failure during full-amount data updating between systems..
Alibaba Group Holding Limited

Risk-based monitoring of clinical data

A computing device generates an audit trail for monitoring clinical data. In particular, the computing device receives clinical data comprising patient data and investigator site data.
Remarque Systems, Inc.

Discount offer with time period defined by user impression

An online system receives a discount offer from a merchant and displays the offers to users. Some of the discount offers provide for a discount that becomes valid when the discount offer is displayed to the user and remains valid for an offer duration.
Facebook, Inc.

Systems and methods of retrospectively determining how submitted data transaction requests operate against a dynamic data structure

A computer system is provided for retrospectively processing a data structure that includes a plurality of entries. The computer system determines if certain data transactions requests that have been recorded in the data structure could have been executed differently (e.g., by being processed at an earlier point in time).
Nasdaq Technology Ab

Building management system with eventseries processing

A building management system (bms) includes building equipment, an eventseries generator, and a storage interface. The building equipment are configured to generate a plurality of data samples.
Johnson Controls Technology Company

Communication system and synchronization method

A synchronization method is suitable between a first electronic apparatus and a second electronic apparatus. The synchronization method include following steps.
Htc Corporation

Method for live broadcast based on hls protocol and electronic device

The invention is a method for live broadcast based on hls protocol and electronic device provided, wherein a m3u8 index list is downloaded from a sub-server and a program resource slice downloaded according to the m3u8 index list is played, after a master server redistributes another sub-server, the m3u8 index list and a program resource slice are downloaded from the new distributed sub-server; the program resource slice downloaded from the new sub-server is analyzed to acquire a pts timestamp information in the downloaded slice; and the pts timestamp information in the slice downloaded from the new sub-server is compared with the pts timestamp information in the slice downloaded from the original sub-server, and it is determined whether the currently downloaded program resource slice is played according to the comparison result. It provides the users with a smooth watching experience of the live broadcast video in one's terminal device..
Le Shi Zhi Xin Electronic Technology (tianjin) Limited

Conference management

In some examples, a system for conference management can include a processor to initiate a conference comprising a plurality of cameras and at least one user and process a series of images with at least one service to generate service output, the series of images comprising an aggregation of images from the plurality of cameras. The processor can also detect metadata associated with each of the series of images by the at least one service and aggregate the metadata and the service output based on a timestamp for each image to detect an event.
International Business Machines Corporation

System and supporting selective backtracking data recording

Systems and methods can support a data processing apparatus. The data processing apparatus can include a data processor that is associated with a data capturing device on a stationary object and/or a movable object.
Sz Dji Technology Co., Ltd.

Communication device and method

A device is provided. The device includes a processor, a screen, and a memory including an application configured to record, transmit, receive, play, display, and group visual messages.
Vivoo Inc.

Identifying network conditions

A method of identifying a network condition between a pair of network devices, the method comprising: determining a first time period between receiving a first-received packet for an initial media frame and receiving a first-received packet for a subsequent media frame, wherein the packets are received at one of the devices via a network and each received packet comprises a timestamp; determining a second time period between the timestamp of the packet for the initial media frame and the timestamp of the packet for the subsequent media frame; and identifying a network condition in dependence on a difference between the first and second time periods.. .
Imagination Technologies Limited

System and discovering paths in a network

Systems and methods for discovering, testing, and optimizing paths in a network are provided. According to one embodiment, configuration data of a first and second packet forwarding device is obtained by a first and second agent associated with the first and second packet forwarding devices, respectively.
Fortinet, Inc.

Method for synchronously taking audio and video in order to proceed one-to-multi multimedia stream

A one-to-multi multimedia stream method separately gets video and audio sources form the video and audio chips of a mobile device and reanalyzes related source data to correct the timestamp of video and audio data to ensure the synchronization of the output video and audio. Thus the incapability caused by not synchronized audio and video in stream decoding server can be solved.
Da Sheng Inc.

Virtual hdbaset link

Methods and systems for providing a virtual hdbaset® link. In one embodiment, a first switch transmits packets over an ethernet network that includes one or more hops.
Valens Semiconductor Ltd.

Methods and systems for interactive multimedia creation

A multimedia creation tool which determines the time structure of a sequence of media and text files using user inputted timestamps. A sequence of text strings are associated with a sequence of media files using timestamps input manually and with user commands.
Plugg Music Inc.

Systems and methods for employee time recording

A time record system for automatically determining a status of an employee is discussed. The time record system includes multiple image sensing devices to detect a visual indicator that uniquely identifies an employee.
Wal-mart Stores, Inc.

Method and system for automated work pattern quantification

A method and system for automating work pattern quantification and providing worker feedback based on quantified metrics is provided. The system may first identify a work pattern to be quantified for a user.
Google Inc.

Apparatus and asynchronous event timestamping

Methods and apparatuses are described for obtaining a timestamp of an interface event. In one configuration, a host receives an in-band interrupt (ibi) from a sensor.
Qualcomm Incorporated

Controlling operation of a machine by performing reconciliation using a distributed cluster of nodes

The operation of a machine can be controlled by performing reconciliation using a cluster of nodes. In one example, a node can receive parent timestamped data from a parent dataset and child timestamped data from child datasets that are children of the parent dataset in a hierarchical relationship.
Sas Institute Inc.

Updatable message channels/topics for customer service interaction

A computer-implemented process for displaying one or more message channels may include arranging the one or more message channels for a user of a computing system to view. Each of the one or more message channels may include a message channel icon, a message channel name, a message, a timestamp of the message, and a badge number..
Freshdesk Inc.

Multi-hop reflector sessions

A method for measuring and reporting performance parameters in a network having at least one originator for generating test protocol data units, and multiple reflectors for relaying the test protocol data units along successive segments of a test path in the network. The method generates the test protocol data units at the originator and transmits the test protocol data unit along a test path that includes multiple reflectors.
Accedian Networks Inc.

Devices, digitally transporting signals in gnss repeater systems using cpri

Disclosed are devices, systems, apparatuses, methods, products, and other implementations of gnss repeater systems and methods for improving phase and frequency alignment of rf signals transported through fiber optic communication channels. Acquired rf signals are processed at a remote outdoor unit, where they are digitized, formatted into a cpri frame, and timestamped.

Methods and systems for hands-free fare validation and gateless transit

A system and method in which a user application on a mobile device facilitates hands-free fare validation and gateless entry/exit at a transit facility like a transit station or a transit vehicle. The user application communicates with a bluetooth gateway to authenticate the device and provides device-specific information for device identification and location determination.
Bytemark, Inc.

Heuristic alarm and event aggregation and correlation service provider network operation

In one embodiment, a method for heuristic event aggregation and correlation includes grouping events from a same device into event groups. Neighboring events in an event group have a timestamp gap of less than a defined timestamp gap threshold.
Cisco Technology, Inc.

Asynchronous mirror inconsistency correction

A method for correcting data inconsistency in an asynchronous data replication environment is disclosed. In one embodiment, such a method includes detecting an error on a secondary track of a secondary volume, wherein the secondary volume is in a mirroring relationship with a primary volume.
International Business Machines Corporation

Asynchronous mirror consistency audit

A method for auditing data consistency in an asynchronous data replication environment is disclosed. In one embodiment, such a method includes copying, at a primary storage system, a primary data track and recording a time that the primary data track was copied.
International Business Machines Corporation

Approximation of resistor-capacitor circuit extraction for thread-safe design changes

A system to design an integrated circuit and a method of fabricating an integrated circuit include performing a design change for a net among a plurality of nets of the integrated circuit. An extraction is performed for the net and includes re-computing values for a resistor-capacitor (rc) circuit representation of the net.
International Business Machines Corporation

Multi-version concurrency control method in database and database system

A multi-version concurrency control method in a database and a database system is presented. The database system sets a data page link of a page, where the data page link includes a page pointer, and a page pointer is used to point to another version page prior to a last operation on the version page.
Huawei Technologies Co., Ltd.

Persistent file handle object container memory expiry

A method for managing persistent file handles includes starting an expiry timer and creating a persistent file handle (phdl) container for storing extended file attributes including, a generation number (gn), a share gn (sgn), a previous sgn, and a timeout max value for an expiry timer, where a sgn is a timestamp of a volume migration or an online creation in relation to the expiry timer. The method additionally includes creating a phdl iterator to update the sgns for every volume exported to clients, volumes created online or for a restarting of a network-share service on a server.
Tegile Systems, Inc.

Cognitive feature analytics

A system and method to build feature evolution models for existing applications (“apps”) in the market based on open app data repositories). A feature evolution model of an app depicts the app name, its historical versions (historical version labels, release timestamps of each version), rating values of each version, and structured features (e.g., umbrella features and low-level features) each version introduces, improves or deletes.
International Business Machines Corporation

Visual positioning inspection cell and method

A visual positioning inspection cell for inspection of parts includes an inspection subsystem with sensors, and a positioning subsystem of the sensors with at least three cameras. Both systems are synchronized with each other by means of an indexing transmitted through a hardware line, for example accompanied by a timestamp.
Tecnatom, S.a.

Wearable system for autonomous detection of asthma symptoms and inhaler use, and for asthma management

A system adapted to assisting patients manage asthma includes a wearable sensor for detection of asthma symptoms and inhaler use, having a microphone capable of generating an electrical signal indicative of asthma symptoms or inhaler use; a processor with firmware adapted to process the electrical signal to determine potential asthma symptoms and inhaler use; and store the electrical signal in the memory when the electrical signal potentially corresponds asthma symptoms or inhaler use. In particular embodiments, the system includes an electronic asthma diary including detected asthma symptoms and detected inhaler usage, both with timestamps, and a prescribed treatment protocol.
The Trustees Of Dartmouth College

Detailed call records for voice over lte calls

A performance monitoring system and method is based on a detailed call record (dcr). A dcr contains records of events occurring in different network domains (14, 20, 40) that are related to a single, specific volte call.
Telefonaktiebolaget Lm Ericsson (publ)

Reliable timestamp credential

A process for generating an access credential by a communication device may include determining whether a communication device successfully executed a predetermined shutdown sequence when the communication device last transitioned to an inactive state, determining whether the communication device has synchronized with an authorization network subsequent to transitioning back to an active state, and generating the access credential including a timestamp. The access credential may indicate whether the access credential has reliable timestamp information.

Predicting wait time for new session initiation during increased data traffic latency

A system includes at least one server that is configured to provide a multi-client network service to a plurality of existing users. When the server receives requests to join the multi-client network service from new users, the server may issue timestamps to each new user, obtain load metric based on the requests or timestamps, and collect the load metric to obtain historical data characterizing a demand in the multi-client network service over time.
Sony Interactive Entertainment Llc

Distributed database for synchronizing the accessibility of nodes and shared devices

A technique for an access node to synchronize the accessibility of a plurality of access nodes within a network is described. The technique receives an accessibility update and/or device update from a remote node.
Wigwag, Inc.

Delaying new session initiation in response to increased data traffic latency

A system includes at least one server that is configured to provide a multi-client network service to a plurality of existing users. When the server receives requests to join the multi-client network service from new users, the server may issue timestamps to each new user and obtain load metric based on the requests or timestamps.
Sony Interactive Entertainment Llc

System and profiling media

Disclosed is a method and system for evaluating media files for use in marketing and advertisements. An audio segment is provided to a number of survey participants.
Veritonic, Inc.

Method and device to timestamp a digital image

The disclosure is intended in particular to prove with images the correct performance of clinical protocol steps in clinical trials.. .

Low-speed bus time stamp methods and circuitry

Methods and circuitry for low-speed bus time stamping and triggering are presented in this disclosure. A master device and slave devices can be interfaced via a communication link that comprises a data line and a clock line.
Lattice Semiconductor Corporation

Distributed localization systems and methods and self-localizing apparatus

A self-localizing apparatus uses timestampable signals transmitted by transceivers that are a part of a distributed localization system to compute its position relative to the transceivers. Transceivers and self-localizing apparatuses are arranged for highly accurate timestamping using digital and analog reception and transmission electronics as well as one or more highly accurate clocks, compensation units, localization units, position calibration units, scheduling units, or synchronization units.
Verity Studios Ag

Nanosecond accuracy under precision time protocol for ethernet by using high accuracy timestamp assist device

In methods, systems, and devices, master and slave node timestamp synchronization units identify a node start frame delimiter of a time protocol message on transmission medium by matching patterns in the time protocol message to known start frame delimiter patterns. Master and slave node processors of such timestamp synchronization units capture a corresponding node clock time at which the node start frame delimiter is identified by referring to a corresponding node clock signal while each is identifying the node start frame delimiter.
Globalfoundries Inc.

Local unit for monitoring the maintenance of an item of equipment and the validation of a task on the item of equipment

A local maintenance monitoring unit is intended to be installed near an item of equipment, in order to make it possible to validate a task that is carried out by a maintenance technician on the item of equipment. The local maintenance monitoring unit is provided with short-range display or communication unit in order to transmit a check-value and a timestamp to a portable communication terminal with which the technician is equipped.
Getraline

Method and system for crop type identification using satellite observation and weather data

A computer-implemented method for crop type identification using satellite observation and weather data. The method includes extracting current and historical data from pixels of satellite images of a target region, generating temporal sequences of vegetation indices, based on the weather data, converting each timestamp of the temporal sequences into a modified temporal variable correlating with actual crop growth, training a classifier using a set of historical temporal sequences of vegetation indices with respect to the modified temporal variable as training features and corresponding historically known crop types as training labels, identifying a crop type for each pixel location within the satellite images using the trained classifier and the historical temporal sequences of vegetation indices with respect to the modified temporal variable for a current crop season, and estimating a crop acreage value by aggregating identified pixels associated with the crop type..
International Business Machines Corporation

Trusted timer service

A trusted time service is provided that can detect resets of a real-time clock and re-initialize the real-time clock with the correct time. The trusted time service provides a secure communication channel from an application requesting a timestamp to the real-time clock, so that malicious code (such as a compromised operating system) cannot intercept a timestamp as it is communicated from the real-time clock to the application.

Software wrapper and installer using timestamp validation and system identification validation

Systems, methods, and apparatuses for installing a software product using timestamp validation and system identification validation are disclosed. An example method to lock a software product in a software wrapper includes determining a unique hard drive serial number of a user device to which the software product is to be installed and generating a hash number of the unique hard drive serial number.
Virtual Marketing Incorporated, D/b/a Fusion 92

System and flexible video construction

System and method for flexible video construction, particularly of a personalized video clip which provides instructions to a viewer with regard to health and wellness. An ordered list of video input files is chained together, to create a single output video file using a chosen container.
Telesofia Medical Ltd.

System and method to implement a wireless sniffer in networks using a dedicated sniffer network

An apparatus comprises a memory and processing circuitry that are configured to implement a first network control protocol (ncp) mac layer configured to handle mac layer communications of the first ncp, and sniffer edge circuitry. The sniffer edge circuitry is configured to communicate with the first ncp mac layer and a second ncp mac layer and to capture events related to second ncp (wigig) communications.

Latency measurer

In some described examples, a latency measurer receives packets from a tapping point. The packets may comprise wrapped packets including a wrapper header.
Hewlett Packard Enterprise Development Lp

System and enhancing target tracking via detector and tracker fusion for unmanned aerial vehicles

A system and a method for enhancing target tracking via detector and tracker fusion for unmanned aerial vehicles (uavs) are provided. The method comprises receiving at least one raw input image of objects to be detected; based on the at least one raw input image of objects, generating the objects' candidate information; based on the objects' candidate information, calculating location and velocity estimation of an object at a current timestamp based on a detector and tracker fusion; and based on the location and velocity estimation of the object at the current timestamp, predicting the location and velocity estimation of the object at a future timestamp..
Tcl Research America Inc.

Data storage methods, query methods, and apparatuses thereof

The present application discloses methods for storing data, methods for querying data, and apparatus thereof. A method for storing data may include receiving a data record to be stored.
Alibaba Group Holding Limited

Detection system, detection apparatus, detection method, and detection program

A detection apparatus extracts an account and a source address of the account from authentication information obtained from an authentication apparatus configured to perform user authentication, groups accounts for each of time slots at predetermined time intervals and each of source addresses in accordance with a timestamp and the source address of the account, and extracts an account group from which duplication of an identical account in an identical group has been excluded. Subsequently, the detection apparatus calculates the number of duplicate accounts among the extracted account groups.
Nippon Telegraph And Telephone Corporation

Stateful backend drivers for security processing through stateless virtual interfaces

Methods and systems are disclosed for stateful backend drivers for security processing through stateless virtual interfaces within virtual machine (vm) host servers. A security application runs within a hosted vm, and a header is stored for the security application that includes a host backend identifier (bid).
Nxp Usa, Inc.

Independent administering of verified user-controlled electronic identifications utilizing specifically programmed computer-implemented methods and computer systems

In some embodiments, the instant invention provides for a central identification management computer system that includes at least: a computer programmed with software instructions that at least include: code to receive a user registration request from a user who desires to establish a user identification profile; code to independently verify profile information of the user; code to register the user identification profile with the central identification management computer system; code to receive an identification request; code to generate a timed unique alpha-numeric identifier where the at least one first timed unique alpha-numeric identifier is associated with the user identification profile stored in the database of the central identification management system; code to transmit the timed unique alpha-numeric identifier in response to identification request; and code to record, in a permanent identification usage log, the timed unique alpha-numeric identifier, and a timestamp related to the identification request.. .

Short message communication within a mobile graphical map

In one embodiment, a computer-implemented process is programmed or configured to allow a first mobile device to generate and send enriched pin data to a geographical messaging system. Enriched pin data may include latitude and longitude data, a timestamp, and a media element.
Palantir Technologies Inc.

Traceability of a multi-actor job string by block chain, allowing at least two levels of confidence in the information stored

Some embodiments are directed to a system for the traceability of a job string performed by multiple actors, including a database for storing the information generated for each job of the string, wherein each actor can, after having obtained a right of access to the database, add a first information element signed by a certificate obtained from a secured hardware device associated with the actor; and a second information element signed by a temporary certificate supplied by a security server, the first and second elements being associated with a timestamp in the database.. .
Bull Sas

Computerized detection and semantic characterization of trends in digital media content

A computer system stores digital media content such as images and video along with associated tags and timestamps. The system detects trends in the media content by semantic analysis which includes generation of a temporal tag graph that includes data indicative of a semantic representation of the tags over a plurality of time periods.
Adobe Systems Incorporated

Generating a compact video feature representation in a digital medium environment

Techniques and systems are described to generate a compact video feature representation for sequences of frames in a video. In one example, values of features are extracted from each frame of a plurality of frames of a video using machine learning, e.g., through use of a convolutional neural network.
Adobe Systems Incorporated

Providing semantic connectivity between a java application server and enterprise threat detection system using a j2ee data

A log processing job executing on a log producing computing system is initiated for processing log data associated with the log producing computing system. Log entries are determined to be available for processing.
Sap Se

Heterogeneous event queue

Processing multiple kinds of event messages in a computing system includes storing received event messages in a data storage system that includes storage for a first plurality of records associated with event messages. Each event message includes a timestamp.
Ab Initio Technology Llc

Generating code for real-time stream processing

A computer-implemented method for generating code for real-time stream processing, where data is streamed in tuples, and where each tuple has a timestamp and a value. One or more processors receive source code.
International Business Machines Corporation

Intelligent court system and a data thereof acquisition method

An intelligent court system and a data acquisition method includes an intelligent ball, a plurality of wearing devices, a plurality of location base stations, gateway and server, the location base stations, the gateway; the intelligent ball is disposed with a first uwb label; the wearing device is disposed with a second uwb label; the location base station is disposed with a uwb receiving and transporting device, a micro-controller, a clock device and a data communication device, the micro-controller controls the uwb receiving and transporting device to receive the information from the intelligent ball and the wearing device and adds a timestamp of a clock signal from the uwb receiving and transporting device, and then transports the information to the gateway via the data communication device; the server receives the information from the gateway to determine the position and/or the motion trail of the intelligent ball and/or the wearing device.. .
Gengee Technology Co., Ltd.

Reducing signature matching uncertainty in media monitoring systems

Methods, apparatus, systems and articles of manufacture to reduce signature matching uncertainty in media monitoring systems are disclosed. Disclosed example apparatus include a signature comparator to compare first neighborhoods of monitored signatures with second neighborhoods of reference signatures to determine a first sequence of successive signature matching results, the first and second neighborhoods having respective neighborhood sizes spanning a first duration.
The Nielsen Company (us), Llc

High-throughput algorithm for multiversion concurrency control with globally synchronized time

Throughput is preserved in a distributed system while maintaining concurrency by pushing a commit wait period to client commit paths and to future readers. As opposed to servers performing commit waits, the servers assign timestamps, which are used to ensure that causality is preserved.
Google Inc.

System and methods for tamper proof interaction recording and timestamping

A system and method for securely recording voice communications, comprising an authentication server, further comprising at least a software components operating on a network-capable computing device, and a database, wherein an authentication server verifies the validity of voice communications and a database stores voice communication recordings.. .
Newvoicemedia, Ltd.

Structure-level anomaly detection for unstructured logs

A computer-implemented method, computer program product, and computer processing system are provided. The method includes preprocessing, by a processor, a set of heterogeneous logs by splitting each of the logs into tokens to obtain preprocessed logs.
Nec Laboratories America, Inc.

Lifecycle for offline data

Techniques are described for managing lifecycles of offline data on mobile devices. In some implementations, offline data instances stored at a mobile device are monitored based on a set of memory management rules.
Sap Se

Systems and methods for measuring time spent associated with a social networking system

Systems, methods, and non-transitory computer readable media can obtain a first event stream including one or more events of a first type, where each event of the first type is associated with a timestamp. A second event stream including one or more events of a second type can be obtained, where each event of the second type is associated with a timestamp.
Facebook, Inc.

Systems and methods for locating image data for selected regions of interest

A server system obtains a first video sub-stream comprising a first plurality of images of a scene and obtains a second video sub-stream comprising a second plurality of images of at least a portion of the scene. Images of the second video sub-stream have a higher image resolution than images of the first video sub-stream.
Google Inc.

Using cache lists for processors to determine tracks to demote from a cache

Provided are a computer program product, system, and method for using cache lists for processors to determine tracks in a storage to demote from a cache. Tracks in the storage stored in the cache are indicated in lists.
International Business Machines Corporation

Network performance monitoring

A network device may include one or more processors configured to receive a measurement message en route to a destination via a network, where the measurement message includes a test packet of a two-way active measurement protocol (twamp) session. The network device may determine information based on the measurement message.
Viavi Solutions Inc.

Low-complexity measurement of packet traversal time in network element

A network element includes multiple interfaces and circuitry. The interfaces are configured to connect to a communication system.
Mellanox Technologies Tlv Ltd.

Hierarchically stored data processing

Methods and systems are described for receiving data including a hierarchy change log comprising change records specifying changes made to hierarchical data. The hierarchical data includes hierarchically arranged nodes.
Sap Se

Using cache lists for processors to determine tracks to demote from a cache

Provided are a computer program product, system, and method for using cache lists for processors to determine tracks in a storage to demote from a cache. Tracks in the storage stored in the cache are indicated in lists.
International Business Machines Corporation

Serializing machine check exceptions for predictive failure analysis

Upon occurrence of multiple errors in a central processing unit (cpu) package, data indicating the errors is stored in machine check (mc) banks. A timestamp corresponding to each error is stored, the timestamp indicating a time of occurrence for each error.
Intel Corporation

Distributed seamless roaming in wireless networks

One embodiment of the present invention provides a system for configuring an access point in a wireless network. During operation, the access point discovers one or more existing access points associated with the wireless network.
Ubiquiti Networks, Inc.

Determination device through clustering analysis of position history data, method, and non-transitory computer readable storage medium

According to an embodiment a determination device through a clustering analysis of position history data incudes an estimation unit that, by conducting a clustering analysis on history data of pieces of geographical position information on earth of a plurality of movable bodies that is obtained by a positioning device, based on a horizontal position constituted of a latitude and a longitude and a lapse of time, acquires pieces of area information indicating a characteristic of geographical area in which there is a tendency for the movable bodies to be positioned, the history data being accumulated sequentially in a storage device with pieces of movable body identification information and pieces of timestamp information, and a determination unit that determines whether the movable body is present in a specified point in time and the geographical area, based on the pieces of area information acquired for one of the movable bodies.. .
Yahoo Japan Corporation

Distributed control synchronized ring network architecture

A ring network architecture includes multiple communication nodes configured in a ring. Wave pipelining is used to provide for high bandwidth and low latency on-chip communications.
Degirum Corporation

Method and reproducing contents based on presentation time in automotive network

A method for operating a first communication node connected to an in-vehicle network is provided. The method comprises generating a header including a count field indicating a wraparound count for a presentation time of contents and a timestamp field indicating the presentation time, generating a payload field including the contents, and transmitting a frame including the header and the payload field to a second communication node connected to the in-vehicle network..
Kia Motors Corporation

Methods and systems for synchronization using delay asymmetry

This invention relates to methods and devices for timing synchronization. The invention has particular application where timing is being carried out over packet networks using, for example, the ieee 1588 precision time protocol (ptp).
Emirates Telecommunications Corporation

Online prediction of clock offsets between networked machines

Technologies are described for determining clock offsets between computing devices. Clock offsets between the computing devices are determined based on timestamp information associated with forward packets and reverse packets sent between the computing devices.
Microsoft Technology Licensing, Llc

System and parallel power monitoring

One aspect of the disclosure provides a data acquisition system (“daq”) for monitoring, in parallel, the power consumption of a plurality of subsystems of a device under test (“dut”). The daq comprises a plurality of power monitors and a field-programmable gate array (“fpga”) chip.
Google Inc.

Media content synchronized advertising platform apparatuses and systems

The media content synchronized advertising platform apparatuses and systems (“ad-synch”) transforms tv program schedule listing information and user channel selection via ad-synch components, into channel-synchronized product placement advertisement. A system is disclosed, comprising: a memory; a processor disposed in communication with said memory, and configured to issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions for: providing tv program schedule listing data including a plurality of ad tags to a user mobile device, receiving a user media program selection message from the user mobile device; retrieving an ad tag associated with the user selected media program from the tv program schedule listing data; identifying an advertised item embedded in the media program based on the retrieved ad tag; determining an available ad template associated with the retrieved ad tag; generating an ad for the embedded advertised item based on the available ad template; and providing the generated ad to the user mobile device based on a timestamp of the ad tag..
Symphony Advanced Media

Recovering a replica in an operator in a data streaming processing system

A device, method and computer-readable medium for recovering a replica in an operator in a data streaming processing system are disclosed. A method may obtain a checkpoint in an input data stream, determine a maximum-timestamp at the checkpoint in the input data stream, calculate a completeness point that is greater than the maximum-timestamp for an output data stream and process data records from the checkpoint onwards that have a respective timestamp that is greater than or equal to the completeness point that was calculated to generate a new replica to replace a failed replica..
At&t Intellectual Property I, L.p.

Processing module and associated method

A processing module for a receiver device. The processor module comprises a channel estimate generation component arranged to output channel estimate information for a received signal, and a timestamping module arranged to determine a toa measurement for a marker within a packet of the received signal based at least partly on the channel estimate information for the received signal generated by the channel estimate generation component.
Nxp B.v.

Real-time positioning of current-playing-position marker on progress bar and index file generation for real-time content

Embodiments are directed towards presenting a current-playing-position marker on a progress bar along with real time content. An initial timeline value of the content may be determined, along with an initial presentation timestamp value for the first frame of the content.
Sling Media Pvt. Ltd.

Command processing method and server

A command processing method and a server are provided. The method includes: receiving, by the server, a target request that carries a target command and that is sent by a client; using a current time as a target timestamp of the target request; adding a local associated command corresponding to the target context number and a local conflicted command corresponding to the target command to a target dependency set; forwarding the target request to a replica server, updating the target dependency set according to a feedback from the replica server, and storing an updated target dependency set synchronously with the replica server; and determining a target execution sequence of the target command and each command in the updated target dependency set.
Huawei Technologies Co., Ltd.

Metadata analyzing

In embodiments, a system receives a file comprising metadata to which rules are applied. Alerts may be generated based on the rules processing of the metadata.
Uipco, Llc

Testing a data coherency algorithm

Testing a data coherency algorithm of a multi-processor environment. The testing includes implementing a global time incremented every processor cycle and used for timestamping; implementing a transactional execution flag representing a processor core guaranteeing the atomicity and coherency of the currently executed instructions; implementing a transactional footprint, which keeps the address of each cache line that was used by the processor core; implementing a reference model, which operates on every cache line and keeps a set of timestamps for every cache line; implementing a core observed timestamp representing a global timestamp, which is the oldest construction date of data used before; implementing interface events; and reporting an error whenever a transaction end event is detected and any cache line is found in the transactional footprint with an expiration date that is older than or equal to the core observed time..
International Business Machines Corporation

Content-aware anomaly detection and diagnosis

Methods and systems for detecting a system fault include determining a network of broken correlations for a current timestamp, relative to a predicted set of correlations, based on a current set of sensor data. The network of broken correlations for the current timestamp is compared to networks of broken correlations for previous timestamps to determine a fault propagation pattern.
Nec Laboratories America, Inc.

Systems and methods for interrelating text transcript information with video and/or audio information

A system or method for manipulating audiovisual data using transcript information. The system or method performs the following actions.
Axon Enterprise, Inc.

Combined activities history on a device

This application is directed to performing a plurality of activities each of which is performed in a respective application with content associated with a content type selected from a group consisting of television programming, online content, on-device application, information views, and other content types. Each activity is associated with a timestamp, and described using a predefined format covering an action and content associated with the action.
Google Inc.

Unique identification generation for records in a data streaming processing system

A device, method and computer-readable medium for generating unique identification for records in a data streaming processing system are disclosed. A method may collect an identification of a source of a data record, a timestamp of the data record and a count of a number of records a data source has added to the stream with that timestamp, generate a unique identification with the identification of the source of the data record, the timestamp of the data record and the count of the number of records the data source has added to the stream with that timestamp, apply the unique identification to the data record and transmit the data record with the unique identification to a downstream operator within a data stream processing system..
At&t Intellectual Property I, L.p.

Automatic movement and activity tracking

Computer-implemented systems and methods for classifying movement of an object are provided. Geolocation data for an object and timestamps associated with the geolocation data are processed to automatically identify a movement of the object.
Sap Se

Time synchronization for nodes in a wireless personal area network (wpan)

Described herein are systems, methods, and apparatuses for time synchronization for nodes in a wireless personal area network (wpan). A first message can be received, via an advertising channel, from an advertising node of a wpan, the first message comprising an advertising message and a message identifier.
Intel Corporation

Chroma-based video converter

This disclosure describes a chroma-based video converter that includes a first interface that receives the video signal to be encoded. The converter includes a frame splitter configured to receive one or more rgb frames, the frame splitter splits the rgb frame into r data, g data, and b data.
Clearone Communications Hong Kong Ltd.

Anchors for live streams

A stream hosting server generates anchors associated with a live stream, each anchor specifying a timestamp of the live stream that represents an opportune moment for a user to join the live stream. When a viewer client device sends a request to join the live stream, the stream hosting server analyzes the anchor list and selects an appropriate anchor.
Google Inc.

Authenticated access to cacheable sensor information in information centric data network

In one embodiment, a method comprises: receiving, by a requestor device in a data network, authentication request parameters for generating a secured request for a data object, the authentication request parameters comprising a shared encryption key and a prescribed update time interval value; generating, by the requestor device, the secured request based on generating a reduced-resolution time value by dividing a current device timestamp value of the requestor device by the prescribed update time interval value, and encrypting the reduced-resolution time value using the shared encryption key; and outputting, by the requestor device, the secured request specifying an object name identifying the data object and the encrypted reduced-resolution time value, enabling a content supplier device to authenticate the secured request based on determining whether the reduced-resolution time value, multiplied by the prescribed update time interval, substantially matches a corresponding timestamp value of the content supplier device.. .
Cisco Technology, Inc.

Systems and methods for tracking computer messages

A message tracking computing device for tracking messages is provided. The message tracking computing device includes a memory in communication with a processor.
Mastercard International Incorporated

Facilitating operations on pluggable databases using separate logical timestamp services

A refreshable pdb clone is associated with a pdb-specific logical timestamp (lt) service that continuously reflects the lt of the most recent changes that have fully committed within the pdb clone during a refresh operation. Such an lt service is used to perform queries over the changing data in the pdb clone while the pdb clone is undergoing a refresh operation.
Oracle International Corporation

Rendering time series metric data associated with multi-dimensional element id information

Techniques for displaying time series metric data are disclosed herein. In some aspects, a management system generates time series metric data that include metric values associated with system entities and a timestamp associated with each of the metric values.
Ca, Inc.

Monitoring processes running on a platform as a service architecture

The present disclosure involves systems, software, and computer implemented methods for monitoring processes running on a platform as a service architecture. One example method includes storing a received sample of monitored attributes of a computer process in a sample memory buffer that includes other stored samples.
Sap Se

Systems and methods for ride control synchronization

A ride control system includes a central controller configured to synchronize movements of separate groups of ride vehicles along a path. Each of the separate groups of ride vehicles includes multiple individual ride vehicles unconnected to one another and forming a virtual train.
Universal City Studios Llc

Method and securing timing packets over untrusted packet transport network

Methods, devices, systems, techniques, and computer program products are provided to secure timing synchronization to network nodes connected over an inherently insecure best effort public network with mechanisms to improve accuracy of timing protocols such as a statistically estimated edge timestamp offset encoded into the timing message to account for network jitter and processing latency variances incurred due to the security packet processing and encryption; to ensure slave network nodes shall only accept timing messages from trusted timing sources; to establish a secure tunnel with a trusted timing source for exchange of timing packets; to provide authentication and security for timing packets over the insecure public network; and to enhance message anonymity with variable payload padding.. .
Nokia Solutions And Networks Oy

Unmanned aerial vehicle sensor activation and correlation system

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a sensor activation and correlation system. One of the methods includes obtaining information describing a flight plan for implementation.
Unmanned Innovation, Inc.

Network data source time management for data streaming processing system

A method, computer-readable medium, and device for processing a stream of records are disclosed. A method may receive a registration request from a data source to join in providing a plurality of records to the stream, synchronize a timing system with the data source, receive an initial timestamp from the data source, and post the initial timestamp to a plurality of operators or a plurality of subscribers before the data source is allowed to send records into the stream..
At&t Intellectual Property I, L.p.

Generating and displaying a computer generated image on a future pose of a real world object

Methods and systems for displaying a computer generated image corresponding to the pose of a real-world object in a mixed reality system. The system may include of a head-mounted display (hmd) device, a magnetic track system and an optical system.
Microsoft Technology Licensing, Llc

Using content identification as context for search

Techniques for using contextual information relating to content presented by a television as part of a search query for an information search are presented. A search management component, at a given moment in time during presentation of television-related content by a communication device in or associated with a television, identifies contextual information associated with a section of the television-related content and generates a content identifier timestamp associated with the contextual information and the section of television-related content.
Google Llc

Time-correlated ink

Techniques for time-correlated ink are described. According to various embodiments, ink input is correlated to content.
Microsoft Technology Licensing, Llc

Systems and methods for signaling missing or corrupted video data

In various implementations, methods, apparatuses, and computer-readable media are described for providing an indication that a file includes corrupted video frames. For example, the file can include an indicator to indicate one or more video frames associated with a particular playing timestamp and playing duration are corrupted.
Qualcomm Incorporated

Cluster-based processing of unstructured log messages

Some embodiments relate to assigning individual log messages to clusters. An initial cluster assignment may be performed by applying a hash function to one or more non-variable components of the message to generate an initial cluster identifier.
Oracle International Corporation

Section identification in video content

Video content can be analyzed to identify particular sections of the video content. Speech to text or similar techniques can be used to obtain a transcription of the video content.
A9.com, Inc.

Cluster-based processing of unstructured log messages

Some embodiments relate to assigning individual log messages to clusters. An initial cluster assignment may be performed by applying a hash function to one or more non-variable components of the message to generate an initial cluster identifier.
Oracle International Corporation

Cluster-based processing of unstructured log messages

Some embodiments relate to assigning individual log messages to clusters. An initial cluster assignment may be performed by applying a hash function to one or more non-variable components of the message to generate an initial cluster identifier.
Oracle International Corporation

Mesh network of nearby mobile devices as a combined speaker system for audio

Implementations disclose a mesh network of nearby mobile devices as a combined speaker system for audio. A method includes receiving a prompt to join a speaker mesh network as a master computing device of the speaker mesh network, the speaker mesh network comprising one or more other computing devices detected within a geographic vicinity of a computing device, generating, by the computing device acting as the master computing device, playback synchronization instructions for the one or more other computing devices, the playback synchronization instructions to cause playback of a media item to be synchronized at a playback timestamp relative to a clock time, and transmitting the generated playback synchronization instructions to the one or more other computing devices..
Google Inc.

Audience measurement and feedback system

In one embodiment, a method includes receiving trick-mode start timestamps of trick-mode events performed on a video sequence in end-user devices such that each trick-mode start timestamp is associated with a trick-mode event performed on a video sequence in one end-user device, receiving trick-mode end timestamps of the trick-mode events, aggregating the trick-mode start timestamps according to a time value of each of the trick-mode start timestamps, aggregating the trick-mode end timestamps according to a time value of each of the trick-mode end timestamps, identifying a plurality of start clusters from the aggregation of the trick-mode start time stamps, identifying a plurality of end clusters from the aggregation of the trick-mode end time stamps, analyzing the plurality of start clusters and the plurality of end clusters, and identifying a level of engagement of a section of the video sequence based on the analyzing.. .
Cisco Technology, Inc.

Video conferencing computer systems

A video conferencing computer system is programmed for establishing, for a deposition, a videoconferencing session between users including at least a witness and a deposing attorney by transmitting display information to a respective user computer for each user over a data communications network. The computer system is programmed for presenting, during the deposition and at each user computer, a graphical user interface displaying a real-time video of the witness captured from a camera and a view of a selected document so that each user computer displays in real-time the view of the selected document.
Virtual Legal Proceedings, Inc.

Wireless sensor network security

In some examples, a computing device may receive sensed data of a first sensor sent in a first transmission. The computing device may associate a first timestamp with the sensed data.
Hitachi, Ltd.

Time-based network authentication challenges

Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for time-based network authentication challenges includes monitoring a session at a firewall to identify a user associated with the session, generating a timestamp for an authentication factor associated with the user after the user successfully authenticates for access to a resource based on an authentication profile, intercepting another request from the user for access to the resource at the firewall, and determining whether the timestamp for the authentication factor is expired based on the authentication profile..
Palo Alto Networks, Inc.

Reachability-based coordination for cyclic dataflow

A computer-readable storage medium stores computer-executable instructions that, when executed by a processor, perform operations including scheduling first and second threads to operate independently on first and second partitions of data. The operations include beginning a first operation on the first and second partitions by the first and second threads, respectively.
Microsoft Technology Licensing, Llc

Wireless sensor network localization

In some examples, a computing device may receive sensed data information sent in a transmission by a first sensor, the sensed data information including a sensor identifier and sensed data of a first sensor. The computing device may associate a first timestamp with the sensed data information.
Hitachi, Ltd.

Synchronization of machine vibration data after collection

A machine data collection system uses tachometer timing information to perform post-collection synchronization of measurement data that was collected asynchronously using multiple sensors. In machine predictive analysis systems, timing information derived from a tachometer signal is typically used to make measurement calculations per rotation.
Epro Gmbh

Network authorization system and method using rapidly changing network keys

A system and method for authorizing a client device to access a host device based on timestamps including preferably at least two time units. Both devices contain multiple sequence tables that relate an order of time units to the value of one of the time units.

Method for performing sensor clock estimation of one or more sensors in electronic device, and associated apparatus

A method for performing sensor clock estimation of one or more sensors in an electronic device and an associated apparatus are provided. The method may include: receiving sensor data from a sensor within the one or more sensors when polling the sensor; obtaining a data quantity, wherein the data quantity indicates a number of samples within the sensor data received from the sensor; estimating a polling time latency and a sensor clock error at least according to the data quantity with aid of at least one estimation model; and based on the polling time latency and the sensor clock error, generating a plurality of timestamps of the sensor data received from the sensor, for performing an action according to the sensor data from the sensor, wherein the timestamps indicate sampling time of at least one portion of the samples, respectively..
Mediatek Inc.

Optimizing retrieval of data related to temporal based queries

A computer-implemented method generates a candidate answer triple for use in retrieving information used to answer a question. One or more processors parse a question to identify a lexical answer type for the question, a question action for the question, and a question timestamp for the question to make up a question triple.
International Business Machines Corporation

Techniques for generating structured metrics from ingested events

The disclosed embodiments include a method performed by a data intake and query system. The method includes ingesting data including raw data obtained over a computer network from a plurality of remote computer systems, and generating events, where each event includes a segment of the raw data and a respective timestamp.
Splunk Inc.

Method and system for testing software based system

A method and a system for testing a software based system. The method includes collecting data from the software based system under test by a first data processing device; virtualizing and timestamping the collected data by the first data processing device; abstracting data storage type and data storage location of the collected data by the first data processing device; broadcasting the virtualized and timestamped data to at least one second data processing device; reacting to the collected data at its location with an action carried out locally by the first data processing device or by sending communication pertaining to the action to the first data processing device from the at least one second data processing device; and updating execution of the test based upon the action..
Profilence Oy

Technologies for low-power and high-accuracy timestamps

Technologies for low-power and high-accuracy timestamps are disclosed. A compute device may have a sensor hub to capture sensor data with a corresponding timestamp.
Intel Corporation

Formatting sensor data for use in autonomous vehicle communications platform

A sensor synchronization system for an autonomous vehicle is described. Upon initializing a master clock on a master processing node for a sensor apparatus of the autonomous vehicle, the system determines whether an external timing signal is available.
Uber Technologies, Inc.

Navigation system including navigation server, mobile terminals, and beacon signal generating devices

A navigation server includes a network interface controller through which identification information and movement line information of a mobile terminal are received from the mobile terminal, the movement line information including location information and a timestamp, a storage device in which movement line data of the mobile terminal and location data of different places are stored, and a processor configured to extract the movement line data from the movement line information and record the extracted movement line data in the storage device. The processor, in response to a search criteria received from the mobile terminal through the network interface controller, generates using the movement line data and the location data of the different places, a navigation map that shows a place that is located along a route defined by the movement line data and meets the search criteria, and transmits the navigation map to the mobile terminal for display..
Toshiba Tec Kabushiki Kaisha

Wireless device ranging

A method and apparatus for detecting, by a first device, a timing measurement frame from a second device, the timing measurement frame having a plurality of time measurement samples, wherein at least the first of the measurement samples has a transmit timestamp value; determining transmit timing values for the subsequent measurement samples; applying a receive timestamp value to each of the received measurement samples; and determining a relative clock drift between a clock of the first device and a clock of the second device by comparing the receive timestamp values with transmit timing values of one or more measurement samples contained in the frame.. .
Nokia Technologies Oy

Authentication using dynamic verbal questions based on social and geospatial history

An approach is provided for authenticating a user. Geolocations are collected during a first time period and social media interactions are collected during a second time period.
International Business Machines Corporation

Cellular network hierarchical operational data storage

A system may include a first processor for storing, in a key-value column-based database, data records from data sources of a cellular network that is transformed into a single format. Customer identifiers may be used as key-values for indexing the data records in the key-value column-based database.
At&t Mobility Ii Llc

Computer system and database management method

A blockwise-erase nonvolatile storage device for storing a database includes extended logical-to-physical conversion information that associates, for each of a plurality of logical addresses, a timestamp, a physical address, and a reference counter with each other. Each reference counter indicates the number of referring sources to refer to data associated with both the logical address and the timestamp that are associated with the reference counter.
Hitachi, Ltd.

Transitioning between data stream processors in a publish-subscribe system

A data stream processors transition system which implements techniques for transitioning control from a first data stream processor to a second data stream processor. The data stream processors transition system preserves the integrity of data streams produced by first and second data stream processors when transitioning control between the first to the second data stream processors.
Linkedin Corporation

Data mirror invalid timestamped write handling

For handling data mirror invalid timestamped write activities, an apparatus is disclosed. The apparatus includes a data mirror that mirrors write activities from a first storage device at a first site to a second storage device at a second site.
International Business Machines Corporation

Inter-chip time synchronization

A device implementing an inter-chip time synchronization system may include a first circuit having a first clock and a second circuit having a second clock. The first circuit may be configured to capture a first timestamp from the first clock responsive to receiving a sampling signal from the second circuit.
Apple Inc.

System and creating, analyzing, and categorizing media

In one aspect, a method of managing online media is disclosed. The method comprises receiving a media file from a media source, the media file representative of an event and receiving a user input indicating an occurrence to be identified in the media file.
Cayke, Inc.

Neural network hardware accelerator architectures and operating method thereof

A memory-centric neural network system and operating method thereof includes: a processing unit; semiconductor memory devices coupled to the processing unit, the semiconductor memory devices contain instructions executed by the processing unit; a weight matrix constructed with rows and columns of memory cells, inputs of the memory cells of a same row are connected to one of axons, outputs of the memory cells of a same column are connected to one of neurons; timestamp registers registering timestamps of the axons and the neurons; and a lookup table containing adjusting values indexed in accordance with the timestamps, the processing unit updates the weight matrix in accordance with the adjusting values.. .
Sk Hynix Inc.

Neural network hardware accelerator architectures and operating method thereof

A memory-centric neural network system and operating method thereof includes: a processing unit; semiconductor memory devices coupled to the processing unit, the semiconductor memory devices contain instructions executed by the processing unit; weight matrixes including a positive weight matrix and a negative weight matrix constructed with rows and columns of memory cells, inputs of the memory cells of a same row are connected to one of axons, outputs of the memory cells of a same column are connected to one of neurons; timestamp registers registering timestamps of the axons and the neurons; and a lookup table containing adjusting values indexed in accordance with the timestamps, the processing unit updates the weight matrixes in accordance with the adjusting values.. .
Sk Hynix Inc.

Efficient property graph storage for streaming / multi-versioning graphs

A data storage and retrieval system for a computer memory includes a stream graph engine extracting graph data from streaming data, the graph data occupying a sliding window and comprising a plurality of slices representing a set of contiguous graphs, and where each slice of the plurality of slices corresponds to a given graph structure and its properties at a particular time, the stream graph engine causing the computer memory to store an on-disk portion of the graph data including a key table, a timestamp table and a plurality of property files, wherein the key table comprises a plurality of pointers to corresponding entries of the timestamp table, wherein each of the entries of the timestamp table comprise a corresponding timestamp and a pointer to the properties files, wherein the properties files comprise properties of a corresponding graph of the set of contiguous graphs, an in-memory portion of the graph data having a cache data structure storing a subset of the key table, and a versioning control module storing evolving changes in the graph data in the computer memory.. .
International Business Machines Corporation

Global database transaction management service

A transaction management service layer monitors a plurality of read and write transactions being executed by the data engines by way of client libraries at each of a plurality of data engines. In addition, the transaction management server layer maintains and coordinates transaction timestamp and sequence numbers that are shared by the plurality of data engines.
Sap Se

Processing offline updates to records of a database system

Disclosed are examples of systems, apparatus, methods, and computer program products for processing offline updates to records of a database system. In some implementations, a first update to a record is processed, and the record is modified according to a first action and first data of the first update.
Salesforce.com, Inc.

Electronic document author identification

A method on a client device is described. First document content information that corresponds to a first plurality of document elements of an electronic document is received from a data server.
Workiva Inc.

Time-bound conditional resource deallocation

Method and system for deallocating shared system resources. In an example, the system includes a memory storing a system resource allocation database, a processor running a scheduler, including an i/o and a scheduler engine.
Red Hat, Inc.

Processing timestamps and heartbeat events for automatic time progression

An event processing system for processing events in an event stream is disclosed. The system is configured for configuring a stream processor to micro-batch incoming events from a stream source.
Oracle International Corporation

Methos and downhole sensing using neutron pulses and gamma radiation measurments

A method and apparatus for characterizing the properties of the region surrounding a borehole. In one embodiment, a downhole tool including a neutron generator is used to generate neutron pulses into the region surrounding the borehole.

Method and processing laser point cloud data

A method and an apparatus for processing laser point cloud data includes obtaining laser point data to be used by a data receiver comprising an acquisition time; determining a timestamp for representing the acquisition time, and splitting the timestamp into a base timestamp and an offset timestamp; and storing the base timestamp and compressed laser point cloud data. Laser point cloud data output by a laser radar is compressed and comprises only offset timestamps corresponding to respective laser points.
Beijing Baidu Netcom Science And Technology Co., Ltd.

Systems and methods for a hardware feedback loop to verify received content has been presented on a display

Examples of the present disclosure are related to systems and methods for a hardware feedback loop that verifies received media has been presented on asynchronous displays. More particularly, embodiments may be utilized as an auditing tool to provide assurances that images appear on a display via a timestamp verification..
Vitrotv Corporation

System and method providing data-driven user authentication misuse detection

Systems, methods, and other embodiments are disclosed for data-driven user authentication misuse detection. In one embodiment, for each of multiple authentication attempts to a computing device by a user via user authentication log messages: user authentication log data having user attribute values is collected; the user authentication log data is transformed into a tracer data structure having the user attribute values organized in a common format; the tracer data structure is augmented with timestamp data to generate an event data structure, where the timestamp data represents a time at which the user authentication log data is observed by the computing device; a user behavior model filter, representing account usage patterns of the user, is updated based at least in part on the event data structure.
Oracle International Corporation

Short range wireless translation methods and systems for hands-free fare validation

Systems and methods using bluetooth with a user application on a mobile device to facilitate hands-free fare validation at a transit station. Utilizes a set of signal strength detection data points and timestamps from a mobile device and synchronizes location data points and timestamps from a camera and determines an estimated location of the mobile device according to the set of signal strength detection data points and timestamps from the mobile device and the location data points and timestamps from the camera.
Bytemark, Inc.

System and creating time-accurate event streams

Embodiments of the present invention may provide an improved distributed computing system. Entities in the distributed computing system may be divided into four categories: writers, readers, gateways, and applications.
Iex Group, Inc.

Multi-view video codec supporting residual prediction

Multi-view video coding/decoding supporting residual prediction involving a reference picture of different view and timestamp compared to a currently coded/decoded picture is improved in terms of robustness and/or processing cost by avoiding checking any picture availability or non-availability in a decoded picture buffer.. .
Fraunhofer-gesellschaft Zur Foerderung Der Angewandten Forschung E.v.

Gallery view in online meeting systems

Gallery views in online meeting user interfaces are described. Participants may be represented on a gallery that includes a subset of participants in an online meeting.
Microsoft Technology Licensing, Llc

Method for click-stream analysis using web directory reverse categorization

Information on a click stream associated with a user and meta tags commonly used by search engines can be used to profile a user. The click stream may comprise network addresses and timestamps and may be the only source of user information used for the profile.
Open Text Sa Ulc

Systems, methods, and apparatus to process background requests while monitoring network media

Methods, apparatus, systems, and articles of manufacture to monitor mobile internet usage are disclosed. An example method includes accessing a log of requests from a proxy.
The Nielsen Company (us), Llc

Packaging content for delivery

Systems and methods for delivering content to user equipment are described. The content may be delivered using internet protocol (ip) delivery, quadrature amplitude modulation (qam) delivery, or another delivery format.
Comcast Cable Communications, Llc

Intelligently splitting text in messages posted on social media website to be more readable and understandable for user

A method, system and computer program product for improving readability and understandability in messages posted on a social media website. The messages posted on a social media website, such as the user's social networking feed, are scanned.
International Business Machines Corporation

Non-blocking request processing

A non-blocking request processing method and a device. The non-blocking request processing method includes: receiving a non-blocking request from a requestor; determining an execution completion estimated timestamp of the non-blocking request; and sending the execution completion estimated timestamp to the requestor..
Boe Technology Group Co., Ltd.

Methods and providing adaptive private network centralized management system time correlated playback of network traffic

System and techniques are described for time correlated playback of traffic patters between nodes in a network. Node statistics of data transfers between nodes are received in a control point, wherein the node statistics include a time stamp (tn) according to time at the control point of when a request statistics message was sent to each node, a node timestamp (ta) according to time at each node of when the message was received in the node, and a first delta between tn and ta that is used to determine a second delta which adjusts the node statistics.
Talari Networks Incorporated

Systems and methods for suppressing unwanted home automation notifications

Various arrangements for handling a home automation notification are presented. A home automation event may be determined to have occurred based on wireless data received from a home automation device.
Echostar Technologies L.l.c.

System and managing retail products

In some embodiments, apparatuses and methods are provided herein useful to monitoring retail products. In some embodiments, there is provided a system for monitoring retail products including: one or more shelf image capturing devices disposed within a retail shopping facility.
Wal-mart Stores, Inc.

System and managing retail products

In some embodiments, systems, apparatuses and methods are provided herein useful for monitoring retail products including: one or more shelf image capturing devices disposed within a retail shopping facility; one or more stock image capturing devices disposed within a stockroom of the retail shopping facility; and a control circuit in communication with the one or more shelf image capturing devices and the one or more stock image capturing devices. The control circuit may configured to: analyze the captured shelf images and associated shelf timestamp to determine a rate of shelf product depletion for a particular retail product; analyze the captured stock images and the associated stock timestamp to determine a rate of stock depletion; compare the rate of shelf product depletion and the rate of stock product depletion; and send a stock depletion warning regarding a particular retail item to a supply chain management server..
Wal-mart Stores, Inc.

Dual stage attention based recurrent neural network for time series prediction

Systems and methods for time series prediction are described. The systems and methods include encoding driving series into encoded hidden states, the encoding including adaptively prioritizing driving series at each timestamp using input attention, the driving series including data sequences collected from sensors.
Nec Laboratories America, Inc.

Efficient determination of committed changes

A minimum value (mv) is computed for start timestamps that each correspond to an uncommitted transaction. In an embodiment, the mv is computed for a pluggable database that is open on at least first and second instances of a database.
Oracle International Corporation

Efficient determination of committed changes

A minimum value (mv) is computed for start timestamps that each correspond to an uncommitted transaction. In an embodiment, the mv is computed for a pluggable database that is open on at least first and second instances of a database.
Oracle International Corporation

Multibyte heterogeneous log preprocessing

Methods and systems for log management include pre-processing heterogeneous logs and performing a log management action on the pre-processed plurality of heterogeneous logs. Pre-processing the logs includes performing a fixed tokenization of the heterogeneous logs based on a predefined set of symbols, performing a flexible tokenization of the heterogeneous logs based on a user-defined set of rules, converting timestamps in the heterogeneous logs to a single target timestamp format, and performing structural log tokenization of the heterogeneous logs based on user-defined structural information..
Nec Laboratories America, Inc.

Berry impact recording device

Disclosed are various embodiments for a berry impact recording device. The berry impact recording device comprises a shell.
University Of Georgia Research Foundation, Inc.

Wireless transmission of temperature data for a geographic area

A user obtains an individual's body temperature data and transmits the data to a medical monitor (e.g., a medical device) for display. Additional data includes a timestamp and location of the body temperature data.
Exergen Corporation

Touch and device orientation-based device pairing

Systems and methods are provided for pairing a mobile device with a second device based on the mobile device being placed flat against a touch screen of the second device. The mobile device determines that is has been placed in a predetermined orientation that matches the orientation of the display of the second device.
Adobe Systems Incorporated

Vibration image acquisition and processing

A shaker test apparatus is provided along with a method of collecting and processing images, wherein a shaker table is driving the device under test by a vibration controller at a known vibration frequency and period, wherein a device under test obtains a steady-state vibration characteristic of that excitation frequency when mounted on the shaker table. While the device under test is being excited, a trigger signal controller triggers a camera to capture a series of still image frames at a regular sampling frequency that is less than the vibration frequency (under-sampling), and a timer associated with the camera records a timestamp of an image capture time for each image frame.
Crystal Instruments Corporation

Event based interrogation zone tracking system for product samples

The invention provides a temporary installation of a system of rfid-based terminals and user-worn rfid devices within an event interrogation zone. At an event, terminals are located within, and associated with, vendor booths erected in the interrogation zone.
Intellitix Technologies Inc.

User activity monitoring

Systems and methods are disclosed for associating an entity with a risk score that may indicate a security threat associated with the entity's activity. An exemplary method may involve monitoring the activity of a subset of the set of entities (e.g., entities included in a watch list) by executing a search query against events indicating the activity of the subset of entities.
Splunk Inc.

Optimized merge-sorting of data retrieved from parallel storage units

A data storage system includes storage nodes adapted to provide retrieval of time-based data in response to a receipt of a time-based data retrieval request associated with data streams. Each of the data streams includes time-ordered data items having a header.
Netscout Systems Texas, Llc

Methods and procedures for timestamp-based indexing of items in real-time storage

A method for storing time-based data streams in a high-capacity network is provided. A time-based data storage request is received from an application.
Netscout Systems Texas, Llc

Wireless sensor device and software system for measuring linear position of a rotating object

A computer system comprises a sensor device configured to attach to a rotating object. The sensor device has a gyroscopic sensor that is configured to measure rotational motion on one or more planes.
Myriad Sensors, Inc.

Intelligently splitting text in messages posted on social media website to be more readable and understandable for user

A method, system and computer program product for improving readability and understandability in messages posted on a social media website. The messages posted on a social media website, such as the user's social networking feed, are scanned.
International Business Machines Corporation

Method and system for managing electronic message threads

An electronic message thread management system is disclosed. The electronic message thread management system may include a memory and at least one processor.
Ringcentral, Inc.

Anonymizing machine data events

Components of a system for generating anonymized data from timestamped event data are disclosed. The generation of anonymized data is performed in accordance with an anonymization configuration.
Splunk Inc.

System for rapid tracking of genetic and biomedical information using a distributed cryptographic hash ledger

A hardware device and/or software system providing a method of timestamping, indexing, securing, and transmitting biomedical information (such as dna sequences, patient chart notes, lab tests, diagnoses, radiology results, and similar information) along with metadata associated with this information (such as date, time, author); using a public or private distributed cryptographic hash ledger method to create a stable, tamperproof index that permits auditing and tracing information transit over an or several electronic networks/transmission methods; optionally compressing and/or encrypting information using secure encryption methods such as quantum-safe/quantum-secure/quantum-resilient methods that secures the key and the payload independently, and then storing the information on a local electronic device or computer, such as a dna sequencing machine, or transmitting the information over an electronic network or storing it on a removable device.. .
Novus Paradigm Technologies Corporation

Program execution recording and playback

A computer system receives a first instruction identifier identifying a first instruction being executed by a first thread associated with a first virtual machine and receives a second instruction identifier identifying a second instruction being executed by a second thread associated with the first virtual machine. The system produces an execution record comprising the first instruction identifier, a first thread identifier identifying the first thread, a first timestamp reflecting a first real-time clock value associated with executing the first instruction, the second instruction identifier, a second thread identifier identifying the second thread, and a second timestamp reflecting a second real-time clock value associated with executing the second instruction.
Red Hat, Inc.

Client device access to data based on address configurations

Various systems, mediums, and methods herein describe mechanisms that enable client devices to have access to data based on various address configurations. A smart phone system may be configured to receive a request.
Paypal, Inc.

Interaction system and interaction method thereof

The present invention provides an interaction system and an interaction method thereof. The interaction system includes a display device, a detector, a database and a processing module.

Event-based comment grouping for content items

A method for event-based comment grouping for content items is disclosed. The method includes identifying, by a processing device, user comments corresponding to a content item, the user comments comprising playback timestamps having selectable links to access a portion of the content item that is associated with a respective time interval, dividing the content item into a plurality of content item segments that are associated with respective time intervals, grouping the user comments to associate with respective content item segments based on the playback timestamps of the user comments, selecting a content item segment of the content item segments based on interactions with the user comments, and providing a subset of the grouped user comments associated with the selected content item segment for display during playback of the content item..
Google Inc.

Mitigation of transmission control protocol throughput degradation in communication devices due to predictable radio impairment events

Methods, systems, and devices for wireless communication are described. A communication device may rewrite a tcp timestamp, delay sending of a tcp acknowledgement packet, or both, to reduce the likelihood that a tcp connection times out during a radio impairment event.
Qualcomm Incorporated

Clock synchronization frequency offset estimation method adapted to wia-pa network

The present invention claims a clock synchronization frequency offset estimation method adapted to a wia-pa network, and belongs to the technical field of industrial wireless sensor networks. The method comprises the following steps: a.
Chongqing University Of Posts And Telecommunications

Event signal processing method and apparatus

Provided is an event signal processing method and apparatus. The event signal processing method includes acquiring, from an event based sensor, coordinates of an active pixel corresponding to an event and a timestamp corresponding to the event; mapping the event to a target voxel included in a three-dimensional (3d) grid based on the coordinates of the active pixel and the timestamp; and updating a value of the target voxel based on the event..
Samsung Electronics Co., Ltd.

Mobile application to prompt physical action to measure physiologic response in implantable device

A user equipment that includes a touchscreen, and at least one processor configured to generate first timestamp data based upon detection of a first touch event on the touchscreen, and second timestamp data based upon detection of a second touch event on the touchscreen, for calculation by a medical device system of a patient-specific functional status parameter associated with a sit-to-stand performance test over a time segment inclusively bounded by a first time defined by the first timestamp data and a second time defined by the second timestamp data.. .
Medtronic, Inc.

Method and system for measurement and characterization of channel delays for broadband power line communications

Disclosed are various embodiments for a system and method of measuring and characterizing a plc communication network comprising transmitting a plurality of packets from a plc master device to a plc terminal device via a plc communication network, measuring a plurality of round-trip time (rtt) timestamps for the plurality of packets in the plc master device, determining an observed probability density function based on the plurality of rtt timestamps, approximating a plurality of probability density functions, determining a rating for the probability density functions based on a comparison of the probability density functions to the observed probability density function, characterizing the plc communication network based on the ratings of the plurality of probability density functions, and scheduling subsequent transmissions based on the characterization of the plc communication network.. .
Board Of Regents, The University Of Texas System

Encodingless transmuxing

An encodingless transmuxer produces a manifest file and segments for streaming media content over different streaming protocols without encoding or otherwise modifying the binary data from the original encoding of the media content file. The transmuxer detects key frame positions from the media content file metadata.
Verizon Digital Media Services Inc.

Channel data encapsulation use with client-server data channels

Systems and methods are disclosed that relate to network security to monitor and report threats in network traffic of a datacenter. For example, one embodiment discloses a method of receiving, by a first security microservice, a first channel data encapsulation packet encapsulating a first encapsulation context and a first encapsulated data, performing a security service on the first encapsulated data using the first encapsulation context, transmitting by the first security microservice a second channel data encapsulation packet to a second security microservice, wherein the second channel encapsulation packet comprises a request for security services, receiving by the first security microservice a response from the second security microservice comprising a second security microservice context, a second security microservice timestamp, and a second security microservice load.
Shieldx Networks, Inc.

Method and updating an encryption key

A method and apparatus for updating an encryption key for performing encrypted communication over a communications network. The method comprises, within a timestamp distribution node, transmitting a message to at least one timestamp reception node of the communications network containing a timestamp value.
Nxp B.v.

System and distributing and replaying trigger packets via a variable latency bus interconnect

Systems and methods are disclosed for distributing and replaying trigger packets via a variable latency bus interconnect in a trace system. An embodiment of such a method comprises generating a plurality of trigger packets from a plurality of trigger sources on a system on chip.
Qualcomm Incorporated

Analytics for edge devices

Disclosed is a technique that can be performed by an electronic device. The technique can include generating timestamped events, where the timestamped events include raw data generated by electronic device.
Splunk Inc.

Systems and methods for configuration-less process bus with architectural redundancy in digital substations

This disclosure relates to systems and methods for configuration-less process bus. In one embodiment, the system includes at least one process interface unit (piu).
General Electric Technology Gmbh

Multiple source watermarking for surveillance

A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame.
International Business Machines Corporation

Selecting photographs for a destination or point of interest

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computerized travel services. One of the methods includes identifying photographs using an index of photographs, the photographs being identified from the index as photographs geographically related to a point of interest or destination and having a creation timestamp corresponding to a time of the year; determining for each of the photographs, a relevancy score based at least in part on: selection success data of the photograph for image queries referring to the point of interest or destination, and references to the point of interest or destination in documents associated with the photograph; and selecting a selected photograph from the photographs based at least in part on a respective visual quality score and the respective relevancy scores, the visual quality score representing a degree of visual quality of the respective photographs..
Google Llc

Optimized re-training for analytic models

A method and system are provided for retraining an analytic model. The method includes building, by a processor, a markov chain for the analytic model.
International Business Machines Corporation

Mechanism for efficient storage of graph data

Aspects of the present disclosure include a system comprising a machine-readable storage medium storing at least one program and computer-implemented methods for efficiently storing graph data. Consistent with some embodiments, the method includes using the graph data to construct a tree topology bitmap that represents a topology of a portion of the nodes in a tree data structure representing the graph data.
Ebay Inc.

Method, device, system, and storage medium for implementing time synchronization in optical transport network

A master device generates a time synchronization message, performs a first correction on a correction domain of the time synchronization message, and sends it including a first timestamp t1 to a slave device. The slave device performs a second correction on the correction domain of the time synchronization message, adds a second timestamp t2, generates a delay request message, performs a third correction on the correction domain of the delay request message, and sends to the master device the delay request message including a third timestamp t3.
Sanechips Technology Co., Ltd.

Cognitive feature analytics

A system and method to build feature evolution models for existing applications (“apps”) in the market based on open app data repositories). A feature evolution model of an app depicts the app name, its historical versions (historical version labels, release timestamps of each version), rating values of each version, and structured features (e.g., umbrella features and low-level features) each version introduces, improves or deletes.
International Business Machines Corporation

Synchronizing user input with a user interface

Synchronizing user input with a user interface is disclosed. User input that identifies a selected location on a display device that is presenting a first user interface (ui) is received at the first time.
Red Hat, Inc.

Automated quantitative imaging system

A quantitative imaging system (100) for automating delivery of a radiopharmaceutical and imaging a patient. The system (100) includes a qi controller (102) that controls the operation of the system.
Koninklijke Philips N.v.

Installation identification for family applications

In one embodiment, a method includes, by a second application that is a member of a family of applications and is installed on a client device, broadcasting a communication that includes a second hashed installation identifier and a second timestamp, the second timestamp indicating a time that the second application was installed on the client device, and receiving a response from a first application, wherein the first application is a member of the family of applications, and wherein the response includes a first hashed installation identifier and a first timestamp indicating a time that the first application was installed on the client device. The method may also include the second application comparing the second timestamp to the first timestamp, and if the first application was installed on the client device before the second application, the second application may save the first hashed installation identifier as a family identifier..
Facebook, Inc.

Recipient-specific scheduling of electronic communication

An embodiment may involve obtaining a recipient-specific record of interaction data for a particular recipient, the recipient-specific record including, for each of a plurality of electronic communications: (i) a respective timestamp indicating a time the respective electronic communication was transmitted and (ii) a respective indication of whether a client device requested a respective web resource using an individual identifier embedded in the respective electronic communication. The embodiment may further involve determining a particular time at which to send a further electronic communication to the particular recipient or another recipient, with the particular time selected based on respective timestamps from the recipient-specific record that are associated with the respective web resources, and transmitting an instruction to an electronic communication server device, with reception of the instruction causing the electronic communication server device to transmit the further electronic communication to the particular recipient or the other recipient at the particular time..
Rise Interactive Media & Analytics, Llc

Method and system for partitioned blockchains and enhanced privacy for permissioned blockchains

A method for generation of blocks for a partitioned blockchain includes: storing blocks comprising a partitioned blockchain, wherein each block includes a header and transaction entries; receiving transaction data entries for each of a plurality of subnets; generating a hash value of the header included in the most recently added block; generating a new block header, the new block header including the generated hash value, a timestamp, and a sequence of pairs including a pair for each of the plurality of subnets, each pair including a subnet identifier associated with the respective subnet and a merkle root of each of the transaction data entries received for the respective subnet; generating a new block, the new block including the generated new block header and the transaction data entries for each of the plurality of subnets; and transmitting the new block to a plurality of nodes associated with the partitioned blockchain.. .
Mastercard International Incorporated

Method, apparatus and system for synchronizing audiovisual content with inertial measurements

A method, apparatus and system for synchronizing audiovisual content with inertial outputs for content reproduced on a mobile content device include, in response to a vibration of the mobile content device, receiving a recorded audio signal and a corresponding recorded inertial signal generated by the vibration. The recorded signals are each processed to determine a timestamp for a corresponding peak in each of the recorded signals.
Thomson Licensing

Unified logs and device statistics

A computing device includes an interface configured to interface and communicate with a dispersed storage network (dsn), a memory that stores operational instructions, and a processing module operably coupled to the interface and memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. The computing device detects a state change within the dsn based on at least one signal received via an interface.
International Business Machines Corporation

Heterogeneous sampling delay line-based time to digital converter

A delay line-based time to digital converter includes: a coarse counter for counting a pulse of a timing clock and measuring a time when an edge of an input signal is detected; a fine time interpolator including a plurality of first delay elements and a plurality of second delay elements, a delay line with the input signal as an input, and a flip-flop unit with outputs of the first delay element or outputs of the second delay elements as inputs and the timing clock as an operation frequency; and a timestamp generator for receiving a digital value on a time measured by the coarse counter and the fine time interpolator, and generating a timestamp on the input signal by using the received digital value.. .
Seoul National University R&db Foundation

System and methods for locating a mobile device

A system for locating a mobile device emitting a radio frequency signal. A wireless access point device of a wireless local area network is configured to communicatively connect to a wide area network.
Yo Wireless Global Ltd

Methods and systems to perform at least one action according to a user's gesture and identity

The present invention discloses methods and systems for performing at least one action at a system according to a user's gesture information. The required steps comprises of capturing the user's gestures information by a mobile apparatus, wherein the apparatus comprises an antenna, a processor, a storage medium, at least one accelerometer, wherein the accelerometer has at least 3 axis; comparing gesture information against one or more predefined gesture information at the mobile apparatus and when the gesture information matches a predefined gesture information, the mobile apparatus selects a first identity based on the predefined gesture information, sends encrypted information to a system through a reader wherein the encrypted information comprises the predefined gesture information, the first identity, a timestamp, and a device identity.
Pismo Labs Technology Ltd

Ascertaining events in media

Disclosed are various embodiments relating to the identification of events that occur within a media item. In one embodiment, among others, a media item is rendered for display on client devices.
Imdb.com. Inc.

System and synchronizing a distributed clock in a packet-compatible network

There are provided a clock node, a controller, a method of operating the clock node and a method of operating the controller in a time distribution network (tdn) comprising the controller being in data communication with the clock nodes via a control path. The method of operating the clock node comprises: sending, from the clock node via the control path to the controller, a first timestamp-related data; receiving, by the clock node via the control path from the controller, clock-recovery control data generated by the controller using the first timestamp-related data received from the clock node; processing the received clock-recovery control data to extract data usable for phase and frequency recovery; and using the extracted data to steer frequency and phase characterizing the clock node..
Adva Optical Networking Se

Remote forensic investigation

A method includes dispatching a drone to a site. The drone includes audio/visual equipment.
At&t Intellectual Property I, L.p.

Reference synchronisation

A method at a first device for synchronising a first clock of the first device to a second clock of a second device, includes receiving a first message comprising an identifier from a third device; generating a first timestamp in dependence on the time at which the first message is received at the first device according to the first clock; receiving a second message from the second device comprising the identifier and a second timestamp, the second timestamp having been generated in dependence on the time at which the second device received the first message from the third device according to the second clock; and adjusting the first clock in dependence on a time difference between a time indicated by the first timestamp and a time indicated by the second timestamp.. .
Imagination Technologies Limited

Priority-based processing of messages from multiple servers

Systems and methods for priority-based processing of messages received from multiple servers. An example method comprises: receiving a plurality of network packets from one or more servers; processing the plurality of network packets to produce a first message associated with a first timestamp and a second message associated with a second timestamp; writing the first message to a first message queue of a plurality of message queues; writing the second message to a second message queue of the plurality of message queues; and retrieving, from the plurality of message queues, the first message and the second message in an order of their respective associated timestamps..
Splunk Inc.

Content management in caching services

A caching management method includes embedding a notification request tag in a dummy file, uploading the dummy file to a cache server, recording a timestamp indicating a first point in time that the dummy file is uploaded to the cache server, receiving an eviction notification indicating a second point in time that the dummy file is evicted from the cache server, and calculating an eviction time indicating an amount of time taken for the dummy file to be evicted from the cache server. Transmission of the eviction notification is triggered in response to processing the notification request tag, and the dummy file is not retrieved from the cache server between the first point in time and the second point in time.
International Business Machines Corporation

Detecting poisoning attacks of internet of things (iot) location beacons in wireless local area networks (wlans) with silence periods

Poisoning attacks by spoofing location beacons in a wlan are detected using silence periods. A location beacon identifier is received from a mobile device allegedly within range of a location device transmitting location beacons, along with a timestamp of transmission for each of the location beacons.
Fortinet, Inc.

System and method to measure and score application health via correctable errors

Disclosed are systems, methods, and non-transitory computer-readable storage media for monitoring application health via correctable errors. The method includes identifying, by a network device, a network packet associated with an application and detecting an error associated with the network packet.
Cisco Technology, Inc.

Identifying heartbeat messages

Examples relate to identifying heartbeat messages. In one example, a computing device may: obtain a plurality of messages that includes incoming messages and outgoing messages, each incoming message being sent from a server device to a client device, and each outgoing message being sent from the client device to the server device; identify candidate message pairs, each candidate message pair including one incoming message and one outgoing message; and identify a heartbeat message pair from the candidate message pairs based on at least one of: plurality of timestamps that includes i) incoming message timestamps that each correspond to one of the incoming messages, and ii) outgoing message timestamps that each correspond to one of the outgoing messages; a number of occurrences of each candidate message pair included a message log; or characteristics of data included in the incoming message and outgoing message of each candidate message pair..
Entit Software Llc

Digital data content certification system, data certification device, user terminal, computer program and method therefor

A file is created in which digital data and a certificate are integrated and content authentication for the digital data and the certificate are performed simultaneously. A data authentication device (1) is provided with: an original data receiving means which is communicably connected to a user terminal (2) and a timestamp provision device (3), and receives original data to be authenticated from the user terminal (2); an intermediate file creation means which creates an authentication file corresponding to the original data, and attaches the actual original data to the authentication file to create an intermediate file; a timestamp request means which transmits the intermediate file to the timestamp provision device (3); a date/time security information acquisition means which receives from the timestamp provision device (3) date/time security information containing date/time information and a hash value for the intermediate file; an authenticated file creation means which embeds the received date/time security information in the intermediate file and creates an authenticated file; and an authenticated file transmission means which transmits the authenticated file to the user terminal (2).
Genius Note Co., Ltd

Method and time synchronisation in wireless networks

A wireless media distribution system is provided comprising an access point (6) for broadcasting media and a plurality of stations (2) for reception and playback of media. Each station is configured for receiving and decoding a timestamp in a beacon frame transmitted repeatedly from the access point.
Imagination Technologies Limited

Master synchronisation

A method at a first device for synchronising a first clock of the first device to a second clock of a second device, includes receiving a first message comprising an identifier from the second device; generating a first timestamp in dependence on the time at which the first message is received at the first device according to the first clock; receiving a second message from the second device comprising the identifier and a second timestamp, the second timestamp having been generated in dependence on the time at which the second device transmitted the first message to the first device; and adjusting the first clock in dependence on a time difference between a time indicated by the first timestamp and a time indicated by the second timestamp.. .
Imagination Technologies Limited

Generating moving thumbnails for videos

A method of generating a moving thumbnail is disclosed. The method includes sampling video frames of a video item.
Google Inc.

Method and adjusting event timestamp relating to clinical trial

A computer implemented method includes receiving an event log corresponding to event entries of an electronic diary of a participant of a clinical trial, wherein the event log is generated in a client device, and the event log includes an event identifier and an event timestamp for at least two event entries; determining a block of event entries within the event log, the block including a first event entry and a second event entry at least one of whose event timestamps are verified being correct in view of corresponding service timestamps of a server apparatus, wherein the first and the second event entry are arranged chronologically; and adjusting the event timestamp of the second event entry based on the first timestamp.. .
Crf Box Oy

Data lineage analysis

According to an example of the present disclosure, a system and a computer-implemented method of tracing data flow are disclosed. The method includes profiling and classifying, by at least one processing device, domains based on features of columns containing data.
Global Ids, Inc.

Method and apparatus of real-time retimer delay measurement

Described is an apparatus comprising a first circuitry, a second circuitry, a third circuitry, and a fourth circuitry. The first circuitry may be an elastic buffer coupled to a received clock, a local clock, a received-clock data, and a local-clock data.