AT&T Intellectual Property I, L.P. Patent applications |
Patent application number | Title | Published |
20160142503 | Methods, Systems, and Products for Personalized Monitoring of Data - A personalized data monitoring service is provided to users. Data from a user's devices is collected and compared to user-defined rules and to ranges. Notification messages may be sent to notify of the data. Data labels may be added to explain the data and any abnormal condition. | 05-19-2016 |
20160142440 | Method and Apparatus for Decryption of Encrypted SSL Data from Packet Traces - A system for decrypts encrypted Secure Sockets Layer (SSL) data from packet traces without using private keys or a proxy. Decryption of encrypted SSL data is accomplished by intercepting a session key associated with a communication session transmitted from a user device to a server during handshaking between the user device and the server. The session key is then used to decrypt packet level traces of the communication session. The decrypted packet level traces are then used to measure traffic. | 05-19-2016 |
20160142395 | Ad Hoc Communications - Ad hoc communications are established between unknown contacts. For example, in today's mobile communications environment, there are many instances in which a user of smart phone may wish to send a message to an unknown user's smartphone. An ad hoc communication thus allows messaging with an unknown user. | 05-19-2016 |
20160142352 | System and Method for Cloud Based IP Mobile Messaging Spam Detection and Defense - A cloud based mobile internet protocol messaging spam defense. Short message service (SMS) messages are analyzed by a cloud based virtual machine to determine if should be considered potentially unwanted messages (e.g., spam). The cloud based virtual machine uses a user specific algorithm for determining if a message should be considered to be a potentially unwanted message. Messages that are determined to be potentially unwanted messages trigger a notification to be sent to a user device associated with the virtual machine. The notification requests confirmation from the user that the potentially unwanted message is an unwanted message. The user's response to a request for confirmation is then used to update an unwanted message database associated with the user and the user device. | 05-19-2016 |
20160142149 | System and Methods for Adaptive Equalization for Optical Modulation Formats - A method for modifying the performance of an adaptive equalizer in a receiver is provided. A carrier wave comprising a first polarization state and a second polarization state, wherein there is a correlation between the first polarization state and the second polarization state, is received. The first polarization state and the second polarization state are demultiplexed to generate two respective constellations. A first expected value based on the first constellation, and a second expected value based on the second constellation, are calculated. An adaptive equalizer receives a first and second signals associated with the respective polarization states. The adaptive equalizer generates outputs based on the signals. These outputs are used to generate error values. Feedback is input into the adaptive equalizer, wherein the feedback is based on the error values. | 05-19-2016 |
20160140965 | MULTI-LEVEL CONTENT ANALYSIS AND RESPONSE - Predetermined services are provided using preset instructions. A transcript of audible content provided over an electronic network and received at a communications device is analyzed to determine whether a trigger is present in the audible content. When the trigger is present in the audible content, preset instructions correlated with the trigger and instructing how to provide a predetermined service are identified. The predetermined service is provided by following the preset instructions. | 05-19-2016 |
20160134923 | Methods, Systems, and Products for Alternate Audio Sources - Audio and video signals are synchronized for pleasing presentation of content. As content is streamed to a device, an audio portion may lag or lead a video portion. Spoken words, for example, are out of synch with the lip movements. Video content is thus synchronized to audio content to ensure streaming content is pleasing. | 05-12-2016 |
20160134643 | Network Protection from Cyber Attacks - Electronic screen shots protect against cyber attacks. When any webpage is received, a screen shot of the webpage may be generated. Should the webpage be from an untrusted source, the screen shot protects downstream resources and clients from potential malware contained within the webpage. | 05-12-2016 |
20160134612 | User Authentication - A user may be authenticated using credentials associated with online retailers. A username and password associated with an online retailer, for example, may be submitted to a different online retailer. The different online retailer may thus use the username and password to verify the user, even though the username and password are associated with the online retailer. A single user identity, in other words, is more convenient for the user. | 05-12-2016 |
20160132549 | Methods, Systems, and Products for Maintaining Data Consistency in a Stream Warehouse - Methods, systems, and products characterize consistency of data in a stream warehouse. A warehouse table is derived from a continuously received a stream of data. The warehouse table is stored in memory as a plurality of temporal partitions, with each temporal partition storing data within a contiguous range of time. A level of consistency is assigned to each temporal partition in the warehouse table. | 05-12-2016 |
20160127874 | Methods, Systems, and Products for Location Determination - Location may be determined based on electrical outlets in a home or business. One or more of the electrical outlets may wirelessly communicate with a mobile device, thus updating a database with the location of the mobile device. As the mobile device moves within the home or business, a current location of the mobile device may be continually logged by passing one of the electrical outlets. Rules and operations may then be performed, based on the current location. | 05-05-2016 |
20160127862 | Search and Recovery of Mobile Devices - Search and recovery is performed for a lost or stolen mobile device. When the mobile device is lost or stolen, the mobile device may transmit a recovery signal for receipt by another device. If an acknowledgment is received, the mobile device confirms discovery by sending its current location. Moreover, seeker devices may be conscripted to search for the lost or stolen mobile device. | 05-05-2016 |
20160127794 | Methods and Apparatus to Generate Relevance Rankings for Use by a Program Selector of a Media Presentation System - Example methods and apparatus to generate relevance rankings for use by a program selector of a media presentation system are disclosed. An example method comprises tabulating a plurality of occurrence counts for respective ones of a plurality of terms of a program guide, each of the occurrence counts indicating a corresponding number of times each of the terms appears in the program guide, computing a plurality of relevance ranking scores for respective ones of a plurality of programs listed in the program guide based on the plurality of occurrence counts, selecting a list of programs from the program guide based on the relevance ranking scores, and outputting the list of programs. | 05-05-2016 |
20160127554 | Computer Telephony Integration (CTI) Complete Healthcare Contact Center - Methods, systems, and products enable a healthcare facility or server to process incoming communications. When a communication is received, the time and a recipient's address may be compared to a schedule of procedures. The recipient's address may be associated with a patient or with medical personnel, such as a physician or nurse. If the time and/or the recipient's address correspond to an entry in the schedule of procedures, then an alternate destination may be chosen for the communication. | 05-05-2016 |
20160127478 | Creating Services Using Service Modules - Concepts and technologies are disclosed herein for creating services using service modules. A control system can detect a service creation request. The control system can identify service modules to be included in a service requested by the service creation request. A service control function can be created to manage the service requested by the service creation request. The service modules can be coupled together, and the service requested by the service creation request can be output. | 05-05-2016 |
20160127345 | System And Method For Providing A Content Delivery Network Via A Motor Vehicle - A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content distribution network is low. The cache server determines that the motor vehicle is turned off, broadcasts a wireless signal as part of a wireless network when the motor vehicle is turned off, and provides a device access to the content cached in the cache server via the wireless network. | 05-05-2016 |
20160127201 | Service Assurance Platform as a User-Defined Service - Concepts and technologies are disclosed herein for a service assurance platform. A service assurance platform can be provided by a computing device comprising a processor. The computing device can obtain a service order comprising a request for functionality. The computing device can initiate determination of service offerings available to provide the functionality and initiate presentation of the service offerings determined to be available. The computing device can obtain a selection of a service offering of the service offerings and initiate orchestration of the service offering to instantiate a service that provides the functionality. | 05-05-2016 |
20160127172 | Device Operational Profiles - Concepts and technologies are disclosed herein for device operational profiles. According to one aspect disclosed herein, a profile orchestration system can receive information from a user device. The information can identify a service to be provided by the user device using, at least in part, sensor data received from one or more sensor devices. The profile orchestration system can determine a device operational profile that is suitable for generating one or more settings that are useable by the sensor device(s) to collect the sensor data. The profile orchestration system can send the device operational profile to a profile provisioning system. The profile provisioning system can utilize the device operational profile to provision the sensor device(s) with the setting(s). The sensor device(s) can utilize the setting(s) to perform one or more operations in support of the user device providing the service. | 05-05-2016 |
20160125872 | SYSTEM AND METHOD FOR TEXT NORMALIZATION USING ATOMIC TOKENS - A system, method and computer-readable storage devices are for normalizing text for ASR and TTS in a language-neutral way. The system described herein divides Unicode text into meaningful chunks called “atomic tokens.” The atomic tokens strongly correlate to their actual pronunciation, and not to their meaning The system combines the tokenization with a data-driven classification scheme, followed by class-determined actions to convert text to normalized form. The classification labels are based on pronunciation, unlike alternative approaches that typically employ Named Entity-based categories. Thus, this approach is relatively simple to adapt to new languages. Non-experts can easily annotate training data because the tokens are based on pronunciation alone. | 05-05-2016 |
20160124781 | Creating and Using Service Control Functions - Concepts and technologies are disclosed herein for creating and using service control functions. The service control functions can detect a message via an adapter function. The message can relate to a service controlled by the service control functions. Service policies can be accessed. The service policies can include message handling policies and can be accessed to determine if a policy relating to the message exists. If a determination is made that the policy exists, the message and the policy can be analyzed to determine an action to take with respect the message, and the action can be initiated. | 05-05-2016 |
20160124706 | SYSTEM AND METHOD FOR INITIATING MULTI-MODAL SPEECH RECOGNITION USING A LONG-TOUCH GESTURE - A system, method and computer-readable storage devices are disclosed for multi-modal interactions with a system via a long-touch gesture on a touch-sensitive display. A system operating per this disclosure can receive a multi-modal input comprising speech and a touch on a display, wherein the speech comprises a pronoun. When the touch on the display has a duration longer than a threshold duration, the system can identify an object within a threshold distance of the touch, associate the object with the pronoun in the speech, to yield an association, and perform an action based on the speech and the association. | 05-05-2016 |
20160121222 | Adaptation of Gaming Applications to Participants - Methods, systems, and products adapt gaming applications to participants. Should one of the participants be a minor, for example, the gaming application may adapt to scenarios that are appropriate for minors. Similarly, the gaming application may adapt to customs associated with a country of a participant. | 05-05-2016 |
20160119476 | PERSONALIZING COMMUNICATIONS SERVICES USING ENVIRONMENTAL DATA - A method for personalizing communication services includes setting a series of selectable options as a default for a system that provides personalized communication services. When a communication from an initiating party is received, a computer of the system automatically determines, based on environmental data provided for the communication independent of information provided by the initiating party during the communication, predictive information that predicts potential objectives potentially sought by the initiating party in initiating the communication. Probabilities are assigned, based on the predictive information, that selectable options will address the potential objectives. The default series of selectable options are dynamically updated based on the assigned probabilities. Communications with the initiating party are in accordance with a script that includes the dynamically updated series of selectable options. | 04-28-2016 |
20160119474 | Dynamically Changing IVR Trees - Methods, systems, and products dynamically change an interactive response system. Responses to a menu of prompts are monitored. A presentation order of the menu of prompts is automatically updated according to a set of rules. The set of rules describe qualifications for membership in a tier. | 04-28-2016 |
20160117607 | Learning Device Interaction Rules - Devices and methods are disclosed for establishing interaction among electronic devices of an environment. The device has a transmitter, receiver, memory for storing interaction rules, and a processor for learning the interaction rules in association with the transmitter, receiver, and other devices of the environment. The device also includes components for performing the device specific functions and a state sensor for determining the logical or physical state of the device. Methods involve observing at one or more devices change of state activity among the plurality of devices through receiving a change of state message that is transmitted to the one or more devices. A set of rules are learned at the one or more devices based upon observing the change of state activity. The learned set of rules are then applied at the one or more devices to automatically control changes of state of devices within the plurality of devices. | 04-28-2016 |
20160117599 | User-Powered Recommendation System - Recommendation systems are widely used in Internet applications. In current recommendation systems, users only play a passive role and have limited control over the recommendation generation process. As a result, there is often considerable mismatch between the recommendations made by these systems and the actual user interests, which are fine-grained and constantly evolving. With a user-powered distributed recommendation architecture, individual users can flexibly define fine-grained communities of interest in a declarative fashion and obtain recommendations accurately tailored to their interests by aggregating opinions of users in such communities. By combining a progressive sampling technique with data perturbation methods, the recommendation system is both scalable and privacy-preserving. | 04-28-2016 |
20160113030 | Dynamic Bundling of Uplink Data Sessions Based Upon Network Signaling Conditions and Application Interactivity States - Concepts and technologies are described herein for dynamic bundling of uplink data sessions based upon network signaling conditions and application interactivity states. According to one aspect disclosed herein, a mobile device can receive signaling load information from a base station. The mobile device can determine a characteristic of an uplink data flow request. The mobile device can determine whether the uplink data flow request should be bundled based, at least in part, upon the signaling load information and the characteristic of the uplink data flow request. | 04-21-2016 |
20160112985 | Adaptive and Selective Bundling of Downlink Paging Messages - Concepts and technologies are described herein for adaptive and selective bundling of downlink paging messages. According to one aspect disclosed herein, a mobility management entity (“MME”) can determine whether to delay a paging procedure to deliver a downlink paging message to a mobile device served by the MME. If the MME determines that the paging procedure to deliver the downlink paging message to the mobile device should be delayed, then the MME can store the downlink paging message in a bundling cache. If the MME determines that the paging procedure to deliver the downlink paging message to the mobile device should not be delayed, then the MME can initiate the paging procedure. | 04-21-2016 |
20160112931 | Cell Broadcast for Signaling Resource Load from Radio Access Networks - Concepts and technologies are described herein for cell broadcast for signaling resource load from one or more radio access networks (“RANs”). According to one aspect disclosed herein, a base station can collect signaling load information of the base station. The base station can also generate a cell broadcast message that includes the signaling load information. The base station can also send the cell broadcast message to a target mobile device. The target mobile device can be configured to determine, based at least in part upon the signaling load information, to which radio access network of a plurality of radio access networks to connect. | 04-21-2016 |
20160112927 | Network Based Speed Dependent Load Balancing - A mobile device mobility state is included in device reporting to a radio access network for mobility event and load balancing purposes. Respective load conditions and respective coverage areas of a first set of devices of a first network and a second set of devices of a second network are analyzed. In addition, a mobility state of a mobile device, a first signal strength associated with the first set of devices, and a second signal strength associated with the second set of devices are also analyzed. The mobility state is a function of a movement pattern of the mobile device and a speed at which the mobile device is being moved. Network traffic of the mobile device is routed to a set of network devices selected from the first set of devices and the second set of devices, as a result of the analysis. | 04-21-2016 |
20160112826 | USER EQUIPMENT NEAR-FIELD COMMUNICATIONS GATING ACCORDING TO KINETIC SPEED DETECTION AND CELL VISITATION HISTORY - Concepts and technologies are described herein for user equipment (“UE”) near-field communications (“NFC”) gating according to kinetic speed detection and cell visitation history. According to one aspect disclosed herein, a mobile initiator device, such as a UE that includes an NFC hardware component, can determine a mobility state of the mobile initiator device. The mobile initiator device can control, based upon the mobility state, activation of a radio frequency field that is used to activate a passive NFC device. In this manner, detection of the passive NFC device and battery efficiency can each be maximized when appropriate. | 04-21-2016 |
20160110771 | Internet Protocol Multi-Media System Value Voucher Distribution With Network Storage and Redemption - A system and method may comprise providing, via a computing device, a connection link to an end user device having a network connectivity access network element; extracting, via an advertisement server, an offer of a value voucher unique to the end user from a database connected to the advertisement server and presenting, through the end user device, an offer of the value voucher to the end user; receiving, via the computing device, from the end user an acceptance of the value voucher; and storing the value voucher in a coupon database in an Internet accessible coupon storage locker unique to the end user. | 04-21-2016 |
20160110429 | Systems and Methods for Social Media Data Mining - Systems and methods are provided to collect, analyze and report social media aggregated from a plurality of social media websites. Social media is retrieved from social media websites, analyzed for sentiment, and categorized by topic and user demographics. The data is then archived in a data warehouse and various interfaces are provided to query and generate reports on the archived data. In some embodiments, the system further recognizes alert conditions and sends alerts to interested users. In some embodiments, the system further recognizes situations where users can be influenced to view a company or its products in a more favorable light, and automatically posts responsive social media to one or more social media websites. | 04-21-2016 |
20160109951 | Surface Determination Via Bone Conduction - Concepts and technologies are disclosed herein for surface determination via bone conduction. According to one aspect, a user device can identify a surface via bone conduction. The user device can identify one or more controllable devices to control using the surface. The user device can detect a user interaction, such as a gesture, performed by a user on the surface. The user device can provide an instruction to the controllable device(s) to cause the controllable device(s) to perform one or more operations in response to the user interaction with the surface. | 04-21-2016 |
20160105462 | Systems and Methods for Rule-Based Anomaly Detection on IP Network Flow - A system to detect anomalies in internet protocol (IP) flows uses a set of machine-learning (ML) rules that can be applied in real time at the IP flow level. A communication network has a large number of routers equipped with flow monitoring capability. A flow collector collects flow data from the routers throughout the communication network and provides them to a flow classifier. At the same time, a limited number of locations in the network monitor data packets and generate alerts based on packet data properties. The packet alerts and the flow data are provided to a machine learning system that detects correlations between the packet-based alerts and the flow data to thereby generate a series of flow-level alerts. These rules are provided to the flow time classifier. Over time, the new packet alerts and flow data are used to provide updated rules generated by the machine learning system. | 04-14-2016 |
20160105452 | Filtering Network Traffic Using Protected Filtering Mechanisms - Concepts and technologies are disclosed herein for filtering network traffic using protected filtering mechanisms. An indication that traffic is to be filtered can be received, and a hash key, a signature representation, and an obfuscated signature can be identified or generated. The hash key and the signature representation can be provided to a first device without exposing the contents of the signature to the second device, and the obfuscated signature can be provided to a second device without exposing the contents of the signature to the second device. The first device and the second device can execute independent operations to collectively determine if the traffic is to be filtered. | 04-14-2016 |
20160105373 | Relocation of Applications to Optimize Resource Utilization - Concepts and technologies are disclosed herein for relocation of applications to optimize resource utilization. A processor executing a relocation management application can receive a request to relocate an application. The processor can identify a utilization associated with the application, identify prospective host resources capable of hosting the application, determine utilizations associated with the prospective host resources, and project prospective host resource utilizations based upon the utilization associated with the application and the utilizations associated with the prospective host resources. The processor can select a prospective host resource from the prospective host resources by selecting a resource that offers a most consistent projected utilization. | 04-14-2016 |
20160104365 | Detecting Presence Using a Presence Sensor Network - Concepts and technologies are disclosed herein for detecting presence using a presence sensor network. In some embodiments, a computer executing a presence service generates a user interface for display at a user device. The user interface can include a control that, when selected, generates room data defining a monitored location. The computer can obtain sensor identifier data that identifies a presence sensor located at the monitored location and a location of the presence sensor at the monitored location. The computer can provide the user interface to the user device to obtain the room data and obtain the room data. The computer also can store the room data and the sensor identifier data. | 04-14-2016 |
20160104123 | Predictive Maintenance - Vehicular maintenance is predicted using real time telematics data and historical maintenance data. Different statistical models are used, and an intersecting set of results is generated. Environmental weather may also be used to further refine predictions. | 04-14-2016 |
20160104104 | Asset Management Service for Distributed Computing Environments - Concepts and technologies are disclosed herein for an asset management service. The asset management service can receive asset record creation requests and can store asset records at an asset data repository. The asset records can identify assets and associated information such as, for example, asset identifiers, personnel, organizations, users, geographic locations, time and date information, status information, or the like. A user device can execute an asset management application to generate asset tags including the asset identifiers and to scan existing asset tags. When asset tags are scanned, the user device also can capture device and/or user information that can be used to set a status or provide available status choices. Status updates can be provided to the asset management service for updating of the asset records. | 04-14-2016 |
20160103993 | Contextual Alert of an Invasion of a Computer System - Methods, systems, and computer-readable media for providing contextual feedback to a user of a computer system upon detection of an invasion of the computer system are provided herein. An invasion of the computer system is detected and a contextually appropriate alert is selected from a set of alerts. The alert is played immediately upon detection of the invasion so that the user is alerted to the invasion within close temporal proximity to the user's action that resulted in the invasion of the computer system. In addition, details of the invasion are logged to a diagnostic log file for later use by support personnel in repairing the computer system. | 04-14-2016 |
20160103698 | Network Virtualization Policy Management System - Concepts and technologies are disclosed herein for providing a network virtualization policy management system. An event relating to a service can be detected, and virtual machines and virtual network functions that provide the service can be identified. A first policy that defines allocation of hardware resources to host the virtual machines and the virtual network functions can be obtained, as can a second policy that defines deployment of the virtual machines and the virtual network functions to the hardware resources. The hardware resources can be allocated based upon the first policy and the virtual machines and the virtual network functions can be deployed to the hardware resources based upon the second policy. | 04-14-2016 |
20160100357 | Access Network Discovery and Selection Function Enhancement With Cell-Type Management Object - Concepts and technologies described herein relate to an enhancement to an access network discovery and selection function (“ANDSF”) with a cell-type management object (“MO”) within an ANDSF MO tree. According to one aspect disclosed herein, a system including an ANDSF can generate a policy for network selection. The policy can include network selection criteria based upon a cell-type. The cell-type may be a small cell cell-type, a macro cell cell-type, or a multi-standard metro cell (“MSMC”) cell-type. The network selection criteria can be further based upon WI-FI availability. The system can send the policy to a mobile device. The mobile device can utilize the policy to select a network. In some embodiments, the network selection criteria includes network load information, local device information, user profile information, or some combination thereof. | 04-07-2016 |
20160100143 | Gestural Control of Visual Projectors - Hand gestures may be performed to control a visual projector. When a human hand is placed into a projection field of the visual projector, the visual projector responds to hand gestures performed by the human hand. The human hand, for example, may gesture to rotate a projected image or to correct the projected image. The visual projector may thus manipulate and/or correct the projected image in response to the gesture performed by the human hand. | 04-07-2016 |
20160099896 | System and Method for Attaching a Remotely Stored Attachment to an Email - An electronic mail message sent from a sender device is received by an email server. The electronic mail message includes an attachment holder block including an authentication token and an address of an attachment stored at a remote server. The authentication token is transmitted to the remote server to login to the remote server to access the attachment. The attachment is retrieved from the remote server using the address of the attachment. The attachment is attached to the electronic mail message by replacing the attachment holder block with the attachment. The electronic mail message including the attachment is transmitted to a recipient. | 04-07-2016 |
20160099894 | Aggregated Presence Over User Federated Devices - One embodiment of a system for aggregating and distributing presence information comprises a hosted presence aggregator server. The hosted presence aggregator server receives an update of presence information from a user device and relays the presence information update to another user device, wherein the user devices are part of a federation of user devices controlled by a single user which relay updates in presence status of the single user to one another via the hosted presence aggregator server. | 04-07-2016 |
20160098691 | Wireless Transactions for Enhancing Customer Experience - Devices, systems, and methods are disclosed for facilitating a wireless transaction by coupling or associating an identifier to a location. The identifier is read, retrieved, or received by a customer's wireless communication device to connect to a POS terminal. Once connected, the wireless communication device sends a location identifier to the POS terminal, so that the POS terminal can associate the wireless communication device with the location. Once an association is established, the POS terminal then presents options. The POS terminal receives selections, and alerts a staff member of selections and the location. In many instances, the POS terminal also adds the selection to a bill or an invoice. | 04-07-2016 |
20160098457 | Generating and Using Temporal Metadata Partitions - Concepts and technologies are disclosed herein for generating and using temporal metadata partitions. Metadata can be stored in temporal metadata partitions based upon a time range included in the metadata. Furthermore, metadata can be stored in multiple temporal metadata partitions to which the metadata is relevant. As such, metadata can be stored in manner that allows event data to be understood in the context of temporally accurate and/or relevant metadata. Functionality for executing queries of event data and providing results in view of metadata, as well as the merging of multiple temporal metadata partitions also are disclosed. | 04-07-2016 |
20160098386 | SYSTEM AND METHOD FOR UNSUPERVISED TEXT NORMALIZATION USING DISTRIBUTED REPRESENTATION OF WORDS - A system, method and computer-readable storage devices for providing unsupervised normalization of noisy text using distributed representation of words. The system receives, from a social media forum, a word having a non-canonical spelling in a first language. The system determines a context of the word in the social media forum, identifies the word in a vector space model, and selects an “n-best” vector paths in the vector space model, where the n-best vector paths are neighbors to the vector space path based on the context and the non-canonical spelling. The system can then select, based on a similarity cost, a best path from the n-best vector paths and identify a word associated with the best path as the canonical version. | 04-07-2016 |
20160098106 | Stylus Keyboard - A combination of a stylus and a keyboard. A collapsible keyboard portion is coupled to a stylus tip. When in a collapsed state, the apparatus may be used as a stylus, or stored in a receptacle or a user's pocket. When a keyboard is needed, the stylus keyboard may be unrolled or unfolded, and used to control an electronic device via a wireless connection between a transceiver on the stylus keyboard and the electronic device. | 04-07-2016 |
20160094965 | ACCESS TO WIRELESS EMERGENCY ALERT INFORMATION VIA THE SPECTRUM ACCESS SYSTEM - The Spectrum Access System (SAS) may be utilized wireless emergency alert (WEA) information. The SAS may be utilized to retrieve additional WEA information, beyond that which was provided in a WEA message. Spectrum assigned for government purpose use (e.g., radar systems, department of defense use, homeland security use, etc.) may be dynamically allocated to commercial use. | 03-31-2016 |
20160094937 | Local Peer-to-Peer Network for Providing Recommendations and Enforcing Security Policies - A recommendation for a user is generated in response to a user request. The recommendation can pertain to whether a user should download and install a mobile device application and is based on a number of responses received from other mobile devices within a specified distance from the mobile device at which the recommendation was requested. Recommendations can also be requested and generated by various other devices in machine-to-machine networks. Recommendations can pertain to policy enforcement and device component performance or operation. | 03-31-2016 |
20160094592 | Creating and Using Groups for Task Collaboration - Concepts and technologies are disclosed herein for creating and using groups for task collaboration. A computing device can include a processor. The computing device can detect an opportunity to initiate collaboration on a task by a group of devices that includes a collaborating device. The computing device can create the group of devices, provide collaboration data to the collaborating device, and obtain input generated by the collaborating device based upon the collaboration data. The computing device can terminate the group. | 03-31-2016 |
20160094579 | Local Applications and Local Application Distribution - Concepts and technologies are disclosed herein for local applications and local application distribution. According to one aspect of the concepts and technologies disclosed herein, an application authority system can receive a local application for distribution to a local router. The application authority system can perform an application approval process to approve the local application for distribution to the local router. The application authority system can cause the local application to be distributed to the local router. The local router can receive the local application and can distribute the local application to one or more devices via a local network. | 03-31-2016 |
20160094472 | Methods, Systems, and Products for Providing Communications Services - Service providers may subcontract some services to subcontractors. Electronic packets of data may be outsourced for a subcontracted processing service provided by a server or other element. A result of the subcontracted processing service may then be received and incorporated. | 03-31-2016 |
20160092939 | Enhanced Shared Media Experiences - Enhanced shared media experiences allow viewer's personal devices to receive targeted content. Targeting advertisements and other content to personal devices is cheaper and more effective than broadcast delivery. Advertisers may still target their advertisements during popular programming with purchasing expensive broadcast advertising slots. | 03-31-2016 |
20160092600 | Contextual Management of Client Devices - Centralized contextual awareness is used to resolve conflicts. When two or more client devices interact, a current context of each client device is evaluated for rule-based decisions. Conflicts in rules may be arbitrated based on policies and goals to generate a resolution. | 03-31-2016 |
20160087988 | Detection and Management of Unauthorized Use of Cloud Computing Services - Concepts and technologies disclosed herein are for detecting and managing unauthorized use of cloud computing services from within an internal network of a business or other organization. A computer system may be configured to identify a plurality of Web resources that have been accessed by computing devices from within the internal network. The computer system may also be configured to obtain Internet protocol (“IP”) information from a network component of the internal network. The IP information may be used to determine whether each of the plurality of Web resources is a cloud computing service resource. The computer system may also be configured to block access to a cloud computing service resource of the plurality of Web resources upon determining that the IP information identifies the cloud computing service resource as being unauthorized. | 03-24-2016 |
20160087979 | Devices, Systems and Methods for Security Using Magnetic Field Based Identification - Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location. | 03-24-2016 |
20160087835 | Methods and Apparatus to Provision Cloud Computing Network Elements - Methods and apparatus to provision cloud computing network elements are disclosed. A disclosed example method includes receiving a selection of a cloud networking template from a client, wherein the cloud networking template includes a data center connector type and a wide area network connector type, configuring a virtual machine on a host server based on the cloud networking template, configuring a data center connector based on the data center connector type, configuring a wide area network connector based on the wide area network connector type, and coupling the wide area network connector to the data center connector and coupling the data center connector to the virtual machine within the host server to enable the client to access the virtual machine. | 03-24-2016 |
20160085858 | AUTOMATED DETECTION AND FILTERING OF AUDIO ADVERTISEMENTS - Apparatuses, systems, methods, and media for filtering a data stream are provided. The data stream is analyzed based on an acoustic parameter to determine extraneous portions in which a first predetermined condition is satisfied. When a first extraneous portion is separated from a second extraneous portion by a non-extraneous portion in which the first predetermined condition is not satisfied, it is determined whether the first extraneous portion being separated from the second extraneous portion by the non-extraneous portion satisfies a second predetermined condition. At least one of the first extraneous portion and the second extraneous portion is deleted from the data stream to produce a filtered data stream in response to determining the second predetermined condition is satisfied. | 03-24-2016 |
20160085576 | Service Creation and Management - Concepts and technologies are disclosed herein for service creation and management. A processor can detect an event relating to a service, and access a service creation database to identify a recipe associated with the service. The recipe can define a resource to be used to provide the service. The processor can access an inventory to determine if the resource is available, identify a service control to control the service, instruct an infrastructure control to allocate virtual machines to host components of the service, and issue instructions to the service control. The instructions can instruct the service control to load service functions to the virtual machines. | 03-24-2016 |
20160085566 | Accessory Setting Service - Concepts and technologies are disclosed herein for providing and using an accessory setting service. Accessory data can be received from a computing device in communication with an accessory. The accessory data can include a unique identifier associated with the accessory. Based upon the unique identifier, a determination can be made as to whether or not the accessory data relates to a new accessory. If the accessory data does not relate to a new accessory, settings data associated with the accessory can be generated and transmitted to a recipient. If the accessory data relates to the new accessory, accessory settings associated with the accessory can be identified and stored with the unique identifier as accessory settings data. | 03-24-2016 |
20160080568 | VOICE OVER IP METHOD FOR DEVELOPING INTERACTIVE VOICE RESPONSE SYSTEM - A process performed by a personal interactive voice communication system includes accepting settings of interactive voice communication system prompts for a communication address to which communications are received by the personal interactive voice communication system. The process includes mapping, in response to instructions specific to the network communication address, actions to correspond to selections of set interactive voice communication system prompts. The process also includes identifying a selection of an interactive voice communication system prompt and executing a mapped action corresponding to the selection identified. Voice communications to and from the personal interactive voice communication system are transmitted as packets over the internet via a network server that coordinates communications for personal interactive voice communication systems. | 03-17-2016 |
20160073296 | Data Session Handoff Using Bone Conduction - Concepts and technologies are disclosed herein for data session handoff using bone conduction. According to one aspect, a first user device can receive a handoff request from a second user device. The handoff request can instruct the first user device to handoff an active data session to the second user device. The handoff request can be received by the first user device via a bone conduction signal that propagated through a bone of a user that is in physical contact with the first user device and the second user device. The first user device also can initiate handoff of the active data session to the second user device in response to the handoff request. | 03-10-2016 |
20160072964 | Methods, Systems, and Products for Sharing Usage Plans - Shared usage plans are popular with families, friends, and small businesses. These shared usage plans share some cumulative utilization of resources, such as communications services. Even though multiple devices may share a monthly allotment of resources, an individual threshold is established for each device. The multiple individual thresholds may then be dynamically regulated to maintain the monthly allotment of resources. | 03-10-2016 |
20160071383 | Device Hold Determination Using Bone Conduction - Concepts and technologies are disclosed herein for device hold determination using bone conduction. According to one aspect, a device side transducer of a user device can receive a bone conduction signal from a user side transducer. The bone conduction signal can propagate through one or more bones of a user, such as one or more finger bones. An application can be executed by a processor of the user device to analyze the bone conduction signal to determine how the device is being held. In some embodiments, data regarding how the user device is being held by the user can be exposed to an application that is executable by the processor of the user device, an application external to the user device, an operating system that is executable by the user device, and/or a website. | 03-10-2016 |
20160071382 | Bone Conduction Tags - Concepts and technologies are disclosed herein for bone conduction tags. According to one aspect of the concepts and technologies disclosed herein, a device can receive, via a transducer, a vibration signal from a body of a user. The vibration signal can be generated in response to the user interacting with a bone conduction tag. For example, the vibration signal can be generated in response to the user moving one or more fingers across the bone conduction tag. The device can analyze the vibration signal to determine an action that is to be performed. The device can perform the action or can instruct a further device to perform the action. | 03-10-2016 |
20160066834 | Measuring Muscle Exertion Using Bone Conduction - Concepts and technologies are disclosed herein for measuring user exertion via bone conduction. According to one aspect, a device can generate a measurement signal. The device can cause a transducer to transmit the measurement signal through a body of a user. The device can receive, via the transducer, a modified measurement signal. The modified measurement signal can include the measurement signal as modified by the body of the user. The device can compare the modified measurement signal to a modified baseline signal. The device can determine, based on a result of comparing the modified measurement signal to the modified baseline signal, a level of exertion experienced by the user while the measurement signal was transmitted through the body of the user. | 03-10-2016 |
20160066166 | Devices, Systems and Methods for Mobile Custom Response - Devices, systems and methods are disclosed for selecting and sending one of a plurality of responses to a call on a communications device. A user may select a default response or a custom response. When the user receives a call to a communications device, a set of responses is displayed on the communications device to facilitate selection by the user. A response includes a message and a call processing command. A message is in the form of an audio clip, text message, webpage, picture, video, etc. A call processing command is performed along with the message. This plurality of responses can be organized by the user in groups associated with classes of callers, such as friends, family, co-workers, etc. In this manner, the responses available to the user when a call is received changes depending on the caller. | 03-03-2016 |
20160063992 | SYSTEM AND METHOD FOR MULTI-AGENT ARCHITECTURE FOR INTERACTIVE MACHINES - Systems, methods, and computer-readable storage devices are for an event-driven multi-agent architecture improves via a semi-hierarchical multi-agent reinforcement learning approach. A system receives a user input during a speech dialog between a user and the system. The system then processes the user input, identifying an importance of the user input to the speech dialog based on a user classification and identifying a variable strength turn-taking signal inferred from the user input. An utterance selection agent selects an utterance for replying to the user input based on the importance of the user input, and a turn-taking agent determines whether to output the utterance based on the utterance, and the variable strength turn-taking signal. When the turn-taking agent indicates the utterance should be output, the system selects when to output the utterance. | 03-03-2016 |
20160063028 | METHODS, COMPUTER PROGRAM PRODUCTS, AND SYSTEMS FOR AUTOMATICALLY SYNCHRONIZING DIRECTORY STRUCTURES ACROSS DIFFERENT APPLICATIONS - Directory structures of a messaging application and a personal file manager application are synchronized. A designated layer in the directory structure of the messaging application is associated with the designated layer in the directory structure of the personal file manager application. Each time a folder is created or an existing folder is modified or deleted in the designated layer in the directory structure of the messaging application, a corresponding folder is created, modified, or deleted in the designated layer in the directory structure of the personal file manager application and vice versa. Files or links to files are created in the folders of the messaging application to correspond to files or links to files within folders in the personal file manager application, and vice versa. A folder (and its contents) is deleted in the messaging application to correspond to deletions in the personal file manager application, and vice versa. | 03-03-2016 |
20160062746 | Software Defined Network Controller - Concepts and technologies are disclosed herein for providing and using a software defined network controller. A software defined network controller can be provided by a computing system that includes a processor. A service model that represents a service can be obtained. A network model that represents network resources that support the service can be obtained. Resources that support the service can be determined. Templates can be accessed to identify templates that relate to the resources. The templates identified can be assembled to obtain a template-based representation of the service. The template-based representation can be executed to determine if the service is ready for deployment. | 03-03-2016 |
20160062324 | Methods, Systems, and Products for Control of Electrical Loads - A single input to a lighting system may control several different light fixtures. Multiple light fixtures may be connected to a switch or controller of the lighting system. A user makes an input to the lighting system, and individual light fixtures are activated as the user continues making the input. | 03-03-2016 |
20160057234 | Service Compiler Component and Service Controller for Open Systems Interconnection Layer 4 Through Layer 7 Services in a Cloud Computing System - Concepts and technologies disclosed herein are directed to a service compiler component and service controller for Open Systems Interconnection (“OSI”) communication model layer 4 through layer 7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, the service compiler component can receive compiler data associated with a new service. The service compiler component also can analyze the compiler data at least to determine at least one virtual network function (“VNF”) to be used to instantiate the new service. The service compiler also can generate a template for the new service. | 02-25-2016 |
20160057231 | Avoiding Registration Storms for Open Systems Interconnection Layer 4 Through Layer 7 Services in a Cloud Computing System - Concepts and technologies disclosed herein are directed to avoiding registration storms for Open Systems Interconnection (“OSI”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a traffic distribution system can receive a connection request from a device. The traffic distribution system also can send the connection request to a site. The site can include a virtual call session control function (“V-CSCF”). The site also can include a state persistence database. The V-CSCF can cause a registration state associated with the device to be stored in the state persistence database. The registration state can be replicated to one or more further persistence databases that operate within one or more further sites. | 02-25-2016 |
20160057216 | Social Networking and Network Connectivity - Social networking is used to enhance content delivery to mobile devices. Sometimes a mobile device lacks network connectivity, such as when the mobile device is off or offline. Content cannot be sent to the mobile device when lacking network connectivity. A social network, however, may be retrieved for interim storage of the content. When the mobile device lacks network connectivity, the content may be routed to a member device of the social network. The member device stores the content until the mobile device resumes network connectivity. The member device may then send or forward the content to the mobile device. | 02-25-2016 |
20160057209 | Service Centric Virtual Network Function Architecture for Development and Deployment of Open Systems Interconnection Communication Model Layer 4 Through Layer 7 Services in a Cloud Computing System - According to one aspect disclosed herein, a service centric virtual network function architecture can be used for development and deployment of services in a cloud computing system. The cloud computing system can include a plurality of compute resources and a plurality of memory resources. A portion of the plurality of memory resources can include virtual machine monitor instructions. The virtual machine monitor instructions can be executed by a first portion of the plurality of compute resources to perform operations. In particular, the virtual machine monitor instructions can be executed by the first portion of the plurality of compute resources to instantiate a virtual network function to be executed by a second portion of the plurality of compute resources. The virtual network function can include at least a portion of a decomposition of a physical network function that supports at least a portion of a telecommunications service. | 02-25-2016 |
20160057208 | Virtual Zones for Open Systems Interconnection Layer 4 Through Layer 7 Services in a Cloud Computing System - Concepts and technologies disclosed herein are directed to virtual zones for Open Systems Interconnection (“OSI”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a virtual zone. The virtual zone can include a virtual network function (“VNF”) that is executable by the hardware resource. The VNF can support a service that operates within one of layers 4-7 of the OSI communication model. A computing system can detect new subscribers to the service within the virtual zone. The computing system also can determine that a capacity constraint exists within the virtual zone as a result of the new subscribers. The computing system also can home the new subscribers to the further virtual zone so that the further VNF can provide the service to the new subscribers. | 02-25-2016 |
20160057202 | Sharing Asserted Media - Concepts and technologies are disclosed herein for sharing asserted media. An assertion application can be executed by a device to generate asserted media. The assertion application can receive a request or other input for specifying information to be included in the asserted media. The assertion application also can be executed to obtain media captured with a media capture device and to obtain the information to be included in the asserted media. The assertion application also can associate the information with the media content to generate the asserted media and share the asserted media with one or more recipients. An assertion service remote from the user device can be configured to generate the asserted media and/or to share the asserted media with the recipients. | 02-25-2016 |
20160057149 | Device-Based Authentication For Secure Online Access - Methods, systems, and computer-readable media for providing device-based authentication for secure online access are provided. An authentication request is received from an online service. The authentication request may be associated with a login request received by the online service from a user. The authentication request may further indicate a list of device identifiers for computing devices connected to a provider network and previously designated by the user as authorized to access the online service. Communication logs collected from the provider network are analyzed to determine whether the login request originated from one of the authorized computing devices based on the list of device identifiers. If it is determined that the login request originated from one of the authorized computing devices, an indication is returned to the online service that the login request was received from an authorized computing device. | 02-25-2016 |
20160057075 | Load Adaptation Architecture Framework for Orchestrating and Managing Services in a Cloud Computing System - According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a load adaptation architecture framework that performs operations for orchestrating and managing one or more services that may operate within at least one of layers 4 through 7 of the Open Systems Interconnection (“OSI”) communication model. The cloud computing system also can include a virtual resource layer. The virtual resource layer can include a virtual network function that provides, at least in part, a service. The cloud computing system also can include a hardware resource layer. The hardware resource layer can include a hardware resource that is controlled by a virtualization layer. The virtualization layer can cause the virtual network function to be instantiated on the hardware resource so that the virtual network function can be used to support the service. | 02-25-2016 |
20160057071 | Network Platform as a Service Layer for Open Systems Interconnection Communication Model Layer 4 Through Layer 7 Services - According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a Network Platform as a Service (“NPaaS”) layer. The NPaaS layer can expose a cloud service for use by a service that operates within at least one of layer 4 through layer 7 of the Open Systems Interconnection (“OSI”) communication model. The cloud service can include a database service, an application container service, a resource broker service, a load balancer service, a domain name system (“DNS”) service, a state persistence service, a probe service, or a combination thereof. The NPaaS also can receive a request for the cloud service, and in response to the request, can provide the cloud service. | 02-25-2016 |
20160055725 | Methods, Systems, and Products for Power Management in Cable Assemblies - Cable assemblies react to electrical power. A visual indicator in a cable assembly changes color in response to the electrical power. The visual indicator, for example, may respond to heat or electromagnetic field in the cable assembly. In smart cables, a controller may activate the visual indicator in response to the electrical power applied to the cable. | 02-25-2016 |
20160053699 | Methods, Systems, and Products for Detection of Environmental Conditions - Methods, systems, and products monitor the environmental conditions in an enclosed environment, such as a garage or storage shed. If a dangerous environmental condition is determined, such as elevated carbon monoxide, an entry door may be opened. If further remedial measures are required, ignition of an internal combustion engine may be prohibited. | 02-25-2016 |
20160050574 | DETECTION AND MITIGATION OF DENIAL-OF-SERVICE ATTACKS IN WIRELESS COMMUNICATION NETWORKS - A method that incorporates teachings of the subject disclosure may include, for example, obtaining data relating to a set of collision events on a shared channel on a wireless network according to a contention-based access protocol in which a plurality of terminals attempt to access the channel contemporaneously. A probability of collision in the channel is estimated and a probability distribution of time intervals between access attempts is generated based on the estimated probability of collision. Empirical and theoretical cumulative distribution functions for the time intervals are calculated, and compared to identify a malfunctioning terminal not operating in accordance with the protocol. Other embodiments are disclosed. | 02-18-2016 |
20160050158 | Workflow-Based Resource Management - Concepts and technologies are disclosed herein for workflow-based resource management. A process can execute a resource management application. The process can obtain load data that describes a resource load associated with resources. The processor can analyze the load data to detect a change in resource load associated with one of the resources and identify workflows that includes the resource. The workflows can include a description of how the resources are utilized during execution of a process by the resources. The processor can identify a relevant workflow that is associated with the process and issue commands to resources associated with the relevant workflow to proactively adjust capacity of the resources associated with the relevant workflow. | 02-18-2016 |
20160049144 | SYSTEM AND METHOD FOR UNIFIED NORMALIZATION IN TEXT-TO-SPEECH AND AUTOMATIC SPEECH RECOGNITION - A system, method and computer-readable storage devices are for using a single set of normalization protocols and a single language lexica (or dictionary) for both TTS and ASR. The system receives input (which is either text to be converted to speech or ASR training text), then normalizes the input. The system produces, using the normalized input and a dictionary configured for both automatic speech recognition and text-to-speech processing, output which is either phonemes corresponding to the input or text corresponding to the input for training the ASR system. When the output is phonemes corresponding to the input, the system generates speech by performing prosody generation and unit selection synthesis using the phonemes. When the output is text corresponding to the input, the system trains both an acoustic model and a language model for use in future speech recognition. | 02-18-2016 |
20160048549 | Profile Verification Service - Concepts and technologies are disclosed herein for providing and/or interacting with a profile verification service. A processor executing a profile verification service can receive a request to verify a user profile associated with a user of a social networking application. The processor can identify a computing device associated with the user profile, obtain location data that relates to the user profile and the computing device, and identify an activity associated with the computing device based upon the location data. The processor can determine if the user profile is accurate based upon the activity identified. If a determination is made that the user profile is accurate, the processor can verify the user profile. If a determination is made that the user profile is not accurate, the processor can update the user profile. | 02-18-2016 |
20160044477 | VISUAL IVR USING CALL REDIRECT - A method is provided for redirecting a call initiated from a portable communication device. The method includes screening calls initiated from the portable communication device, and on the portable communication device, automatically redirecting the call initiated from the portable communication device from a normal communication network to a specified service provider communication network when the screening determines that the call matches predetermined criteria. The method also includes authenticating a user account, executing a visual IVR application that visually interacts with a user of the portable communication device upon authentication of the account, and forwarding the redirected call via a communication network to an alternate system when the authentication of the account fails. The method further includes retrieving personalized account information from the service provider for use by the visual IVR application upon authentication of the account, and displaying selected retrieved personalized account information. | 02-11-2016 |
20160044162 | Methods, Systems, and Products for Providing Ring Backs - Ring backs are provided for calls. When a call is placed to a called address, a ring back may be provided to a calling address. However, the ring back may be personalized to appeal to the calling address and/or to the called address. | 02-11-2016 |
20160044050 | Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation - Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network. | 02-11-2016 |
20160044016 | Pre-Delivery Authentication - Pre-delivery authentication may be required prior to routing and delivery of electronic content. A sender of the electronic content, for example, may require that a recipient authenticate to ensure legitimate use or identity. Should pre-delivery authentication be required, the electronic content is held at any networked device while the recipient authenticates. If the recipient correctly authenticates, then the electronic content is released for delivery. | 02-11-2016 |
20160043881 | Personal Virtual Core Networks - Concepts and technologies are disclosed herein for personal virtual core networks. A processor executing a network access service can determine if the user device should be isolated from a core network that provides devices at a location with connectivity. If the processor determines that the user device should be isolated, the processor can identify resources supporting the connectivity. The resources can include network resources and the core network. The processor can create a virtual core network to support the connectivity, and activate the virtual core network. | 02-11-2016 |
20160043826 | DISTRIBUTED SPATIAL MODE PROCESSING FOR SPATIAL-MODE MULTIPLEXED COMMUNICATION SYSTEMS - A method and system for distributed spatial mode processing is disclosed where a plurality of optical signals is received via a plurality of spatial modes on a first optical link, spatial mode conversion is performed on the plurality of optical signals to switch the plurality of optical signals to different ones of the plurality of spatial modes and the plurality of optical signals is transmitted via the different ones of the plurality of spatial modes on a second optical link where spatial mode filtering may occur. | 02-11-2016 |
20160042029 | Managing a Distributed Database - Concepts and technologies are disclosed herein for managing a distributed database. A data management application can obtain a query. The data management application can analyze the query to determine a number of data structures relevant to the query. The data management application also can analyze data stores storing the data structures and move or assign data structures to other data stores within a distributed database. The movement of the data structures within the distributed database can be based upon greedy algorithms for moving data and/or executing queries. | 02-11-2016 |
20160041261 | Electromagnetic Reflection Profiles - Methods, systems, and products determine electromagnetic reflective characteristics of ambient environments. A wireless communications device sends a cellular impulse and receives reflections of the cellular impulse. The cellular impulse and the reflections of the cellular impulse may be compared to determine the electromagnetic reflective characteristics of an ambient environment. | 02-11-2016 |
20160039291 | Vehicle Battery Data Analysis Service - Concepts and technologies are disclosed herein for a vehicle battery data analysis service. A processor can execute a vehicle battery data analysis service. The processor can generate a request to execute a load test at a vehicle and transmit the load request to a vehicle diagnostic system located at the vehicle. The processor can obtain diagnostic data generated by the vehicle diagnostic system. The diagnostic data can include test data that indicates a load of a battery of the vehicle and vehicle data that identifies the vehicle. The processor can update fleet data based upon the diagnostic data. | 02-11-2016 |
20160036761 | FORWARDING SELECTED DOCUMENT PASSAGES FROM AN ELECTRONIC READER - A method of forwarding selected passages from an electronic document being displayed on an electronic reader to a designated recipient. The method includes electronically selecting a passage from the electronic document, and automatically associating metadata with a selected passage upon selection by the user. The method also includes storing the selected passage together with the associated metadata in a file in the memory of the electronic reader. The method further includes electronically checking the selected passage for compliance with special requirements, the special requirements including a designated size of the selected passage, the special requirement of the designated size of the selected passage being of a variable size designated by the user based on user preference. The method also includes electronically transmitting the stored selected passage and associated metadata from the electronic reader to a designated recipient after completion of the electronic checking by the electronic reader. | 02-04-2016 |
20160036527 | Method and System for Optical Impairment Mitigation for High-Speed Optical Communication Systems - A method and system for simultaneous mitigation of optical impairment from both equalizer-phase noise interaction (EPNI) and fiber nonlinear effects (FNE) is disclosed. In one embodiment, the method is directed to simultaneous mitigation of optical impairment from both equalizer-phase noise interaction (EPNI) and fiber nonlinear effects (FNE) using a fast-adaptive multi-tap digital filter. | 02-04-2016 |
20160035346 | SYSTEM AND METHOD FOR PERSONALIZATION IN SPEECH RECOGNITON - Systems, methods, and computer-readable storage devices are for identifying a user profile for speech recognition. The user profile is selected from one of several user profiles which are all associated with a speaker, and can be selected based on the identity of the speaker, the location of the speaker, the device the speaker is using, or other relevant parameters. Such parameters can be hierarchical, having multiple layers, and can also be dependent or independent from one another. Using the parameters identified, the user profile is selected and used to recognize speech. | 02-04-2016 |
20160034449 | Message Translations - Systems for translating text messages in an instant messaging system comprise a translation engine for translating text messages into a preferred language of a recipient of the text messages. The systems are preferably configured to send and receive the text messages and to determine whether the text messages that are received in a source language are in the preferred language of the recipients so that the text messages are displayed in the preferred language of the recipients of the text messages. Other systems and methods are also provided. | 02-04-2016 |
20160029183 | Closed User Groups - An arrangement for providing, on an ad hoc basis, a closed user group (CUG) among a collection of pre-defined IP network users. A set of intelligent access devices, dispersed through the IP network, constantly transmit a set of pings associated with the defines CUGs to discover those devices within its communication range. The discovered IP addresses for each device is thus constantly updated, allowing group members to remain in constant contact (emulating an “always on” connection). The users feels they are always connected with group members and thus have instant access to voice/data/video sessions—much like hot lines or “always on” connections. | 01-28-2016 |
20160028774 | Data Access Policies - To verify compliance with a data access policy, a query result including data specified by a requesting entity and a representation of a data access policy is received from a database. Based on the representation of the data access policy included in the query result, it is verified whether the requesting entity is permitted to access the data included in the query result. Transmission of the data included in the query result to the requesting entity is controlled responsive to the verification. Related methods, systems, and computer program products are also discussed. | 01-28-2016 |
20160028648 | Resource Management Service - Concepts and technologies are disclosed herein for a resource management service. A content usage report can be received at a processor executing a resource management service. The processor can generate a model that indicates content used by a computing device and geographic locations at which the content is used. The processor can determine anticipated content that is expected to be received by the computing device and an anticipated location at which the anticipated content is expected to be received. The processor can identify a resource available to support storage of the anticipated content and generate a command to allocate the resource to support storage of the anticipated content. The processor can instruct the resource to download the anticipated content and to store the anticipated content. | 01-28-2016 |
20160027090 | Content Recommendations Based on Personal Preferences - Electronic multimedia content is recommended based on personal preferences. Consumption information may be collected to generate recommended multimedia content. Electronic storefronts may also be selected based on the consumption information. Different portals and access points may be used based on IPTV assets, mobile assets, and mobile assets. | 01-28-2016 |
20160026802 | Tailored Protection of Personally Identifiable Information - Methods, systems, and products protect personally identifiable information. Many websites acquire the personally identifiable information without a user's knowledge or permission. Here, though, the user may control what personally identifiable information is shared with any website. | 01-28-2016 |
20160026682 | Securing Database Content - Content is secured in a database. One or more columns in challenge tables are identified, and values from the challenge tables are retrieved. A database query may execute in response to a match between the values from the challenge tables and query data. However, if the query data fails to match the values from the challenge tables, execution of the database query may be disallowed. | 01-28-2016 |
20160026543 | Distributed Storage of Data - Multi-reliability regenerating (MRR) codes are introduced regenerate stored data. An individual regenerating code is used for each message to satisfy a respective reliability requirement for the data. With repair consideration, mixing may be used to improve upon the performance of a coding solution. | 01-28-2016 |
20160021553 | METHOD AND APPARATUS FOR RELATING TO QUALITY OF SERVICE IN WIRELESS NETWORKS - A method for adapting quality of service to dynamics of a wireless telecommunications network is provided. The method includes collecting data relating to operation of an element in the network, wherein the collected data comprises radio-frequency (RF) data relating to operation of the network. The method also includes pre-calculating, from the collected data, a dynamic operational characteristic of the network, wherein the pre-calculating includes pre-calculating from the collected data to obtain a geometrical determination based on a geographical location of a wireless communications device within the network. The method further includes making available the pre-calculated characteristic of the network to an application of the device using the network, including storing the characteristic at a pre-calculation server accessible by the device so the device can selectively retrieve the characteristic, and updating the characteristic at a frequency based on a trigger related to volatility of the RF data being collected. | 01-21-2016 |
20160005138 | Potential Realization System With Electronic Communication Processing for Conditional Resource Incrementation - Selected embodiments of the present disclosure provide methods, systems and media for systematically processing electronic communications for conditionally incrementing resources. In certain embodiments, electronic communications are received and processed in order to evaluate potential realization assistance functions by potential realization assistants according to processes that include resource incrementations that are conditioned on satisfactory potential realization function processing. Other methods, systems and media are also provided. | 01-07-2016 |
20160004870 | Personal Security Agent - Concepts and technologies disclosed herein are directed to a personal security agent. According to one aspect disclosed herein, a compute resource includes a processor that can execute the personal security agent to perform operations. The compute resource can receive data from a data source. The compute resource can receive a job request to provide security for an entity. The job request can include a job requirement. The compute resource can analyze the job requirement and the data to determine an action. The compute resource can provide instructions for executing the action to a controller domain. The controller domain can execute the action in at least partial fulfillment of the job requirement. | 01-07-2016 |
20160004689 | Methods, Systems, and Products for Language Preferences - Methods, systems, and computer program products provide personalized feedback in a cloud-based environment. A client device routes image data to a server for analysis. The server analyzes the image data to recognize people of interest. Because the server performs image recognition, the client device is relieved of these intensive operations. | 01-07-2016 |
20150381706 | Collaborative Media Playback - Concepts and technologies disclosed herein are directed to collaborative media playback. According to one aspect disclosed herein, a media playback node can receive information for use in determining a start time for playback of media content so that playback of the media content is in sync with playback of the media content by a further playback node. The media playback node also can determine, based at least in part upon the information, the start time for playback of the media content. The media playback node also can initiate playback of the media content at the start time. | 12-31-2015 |
20150381446 | Detecting and Measuring Network Route Reconvergence Using In-Band Data Probes - The present disclosure is directed to systems and methods for detecting and measuring network route reconvergence using in-band data probes. The probes are generated and inserted into the network. The probes are routed to an insertion point, corresponding to a beginning of a measurement line, via an in-band connection such as a virtual private network. The in-band connection is configured such that the time-to-live field of the probes is not affected by network path changes occurring in the in-band connection. The probes are routed through the measurement line to measure network route reconvergence. The measurement line is configured to affect the time-to-live field of the probes to reflect network path changes occurring along the measurement line. The probes are extracted from an extraction point corresponding to an end of the measurement line and routed back to the measurement device for analysis. | 12-31-2015 |
20150379613 | Enhancing a User's Shopping Experience - The subject disclosure provides systems and methods for enhancing a purchasing experience by enabling a purchaser to receive a variety of real-time updates or recommendations regarding products that the purchaser, such as a user, may need or intend to purchase. A recommendation provided by the system may be based upon comparing the product with a plurality of sources. The recommendation may include a recommendation that a product may near depletion and thus may need to be replaced, a recommendation that the user may already have a sufficient amount or number of the product, a recommendation that the product may or may not match an existing item owned by the user, or a recommendation not to purchase a product. A virtual closet may also be created according the systems and methods of the subject disclosure, allowing users and contacts selected by the user to collaborate on products. | 12-31-2015 |
20150378544 | Automated Content Detection, Analysis, Visual Synthesis and Repurposing - A content summary is generated by determining a relevance of each of a plurality of scenes, removing at least one of the plurality of scenes based on the determined relevance, and creating a scene summary based on the plurality of scenes. The scene summary is output to a graphical user interface, which may be a three-dimensional interface. The plurality of scenes is automatically detected in a source video and a scene summary is created with user input to modify the scene summary. A synthetic frame representation is formed by determining a sentiment of at least one frame object in a plurality of frame objects and creating a synthetic representation of the at least one frame object based at least in part on the determined sentiment. The relevance of the frame object may be determined and the synthetic representation is then created based on the determined relevance and the determined sentiment. | 12-31-2015 |
20150373052 | Management of Privacy Policies - Master privacy policies for different users are stored to a cloud-based central server. When a user interacts with a third-party service (such as FACEBOOK® or AMAZON®), the third party service may require acceptance of privacy policies before services are rendered. Here the cloud-based central server may automatically configure a privacy policy of the third-party service to the user's master privacy policy. The cloud-based central server thus relives the user of managing many different privacy policies required by many different third party service providers. | 12-24-2015 |
20150369624 | INTERACTIVE VOICE RESPONSE WITH USER DESIGNATED DELIVERY - Directions are provided over a network to a mobile terminal. Destination entries are stored in a memory. A server receives a voice-based request for directions to a target destination from the mobile terminal. A current location of the mobile terminal is determined. A processor compares the destination entries with the target destination to determine a matching entry. Directional instructions to the matching entry are obtained for the target destination based on the current location of the mobile terminal. The obtained directional instructions are transmitted to the mobile terminal for display on the mobile terminal. | 12-24-2015 |
20150365536 | Methods, Systems and Products for Providing Modem Functions - A network interface device to an access network has a modulator-demodulator. The modulator-demodulator receives a modulated carrier signal from an input connection. A power circuit connected to the input connection receives electrical power from the access network and provides the electrical power to the modulator-demodulator. | 12-17-2015 |
20150365524 | Methods, Systems, and Products for Suppression of Alerts - Audible alerts are suppressed for subsequent calls from a calling address. An initial audible alert is processed for an initial call from the calling address. Subsequent audible alerts from the same calling address are suppressed, such that subsequent calls from the calling address may fail to alert. Visual alerts may still be processed. | 12-17-2015 |
20150365510 | Command Prefix For Voice Commands - Methods, systems, and products describe hands-free operation of automotive features. A user defines a command prefix that is recognized as preceding one or more voice commands. When the user speaks the command prefix, a processor identifies the spoken command prefix and treats a next spoken word as one of the voice commands. The voice command may then be executed for control. | 12-17-2015 |
20150364029 | Methods, Systems, and Products for Security Services - Methods, systems, and products notify of alarms in security systems. Sensor data is received from an alarm sensor, and an alarm controller determines an alarm condition. Video data associated with the alarm sensor is retrieved. An alarm message may be sent over a wireless network connection, while the video data may be sent over a wireline broadband connection. | 12-17-2015 |
20150363579 | Life Cycle Management Of User-Selected Applications On Wireless Communications Devices - Tools and techniques for performing life cycle management of user-selected applications on wireless communications devices are described herein. In part, the tools provide machine-readable media for presenting to the subscriber a list of available applications for installation on the device, and for receiving selections from the subscriber of one or more of the applications. Additionally, the tools provide methods for selling advertising space on the devices. | 12-17-2015 |
20150363507 | Guest Browser - One embodiment of a guest browser system, among others, includes a guest browser interface configured to provide an address bar interface for accepting a network address for retrieving a first web page. The guest browser interface is rendered from code of a second web page, where content of the second web page is rendered by an installed web browser. The system further includes a guest browser engine configured to retrieve contents of web pages. The guest browser engine is built from code provided by the second web page and is used to update content of the second web page with content from the first web page. Other systems and methods are also provided. | 12-17-2015 |
20150362346 | Sensor Calibration - Sensory outputs are corrected to reflect true values. One or more correction factors may be determined and applied to sensory outputs to ensure a true value is obtained. A reconstruction algorithm maps the sensory outputs to a quantity of interest, such that the true value of the quantity of interest is within error bounds of a reconstructed value. | 12-17-2015 |
20150358788 | Apparatus and Method for Providing Messaging Services - A system that incorporates teachings of the present disclosure may include, for example, a voicemail device having a controller to detect a recording of a voicemail message, generate a Session Initiation Protocol (SIP) message, wherein the SIP message contains visual voicemail data associated with the recorded voicemail message, and transmit the SIP message to a cordless phone system, wherein the SIP message is received by the cordless phone system over a data port of the cordless phone system, wherein the cordless phone system comprises a base station and at least one cordless communications device, wherein the visual voicemail data is retrieved by the base station, and wherein the visual voicemail data is transmitted by the based station to the at least one cordless communications device by utilizing a cordless wireless access protocol. Other embodiments are disclosed. | 12-10-2015 |
20150350419 | Methods, Systems, and Products for Providing Ring TOnes - Ring tones and other alerts are processed based on social networks. A person's contact information, as an example, may be associated with a social network. Each different social network may also have its own custom ringtone or other alert. Calls, texts, and other electronic messages may thus processed with the alert of the social network. | 12-03-2015 |
20150350417 | DETECTION OF WIRING DEFECTS - A method for detecting a defect in wiring in a DSL system. The method includes collecting data including instantaneous values, a history of values, and/or parameters relating to a central office or customer premises equipment, analyzing a line for a wiring defect based on the collected data, and reporting whether or not a wiring defect was detected responsive to the analyzing step. | 12-03-2015 |
20150350274 | PROGRAM RECOMMENDATIONS FOR GROUP VIEWING - A group viewing application includes a host application performed by a host device and a client application performed by a plurality of mobile devices to present program recommendations to mobile device users who have linked with a group maintained by the host application. The host device may be a set top box or smart television programmed with host application software. The host application may perform linking operations to define the group of mobile device users, recommendation operations to identify programs recommended for the group based at least in part on multimedia profile information including content preferences and viewing history information, and election operations to select one of the recommended programs for group viewing. | 12-03-2015 |
20150349905 | LOCAL CHANNELS ANYWHERE - A mobile viewing method includes accessing location information indicative of a current location of a mobile device associated with a home market. A current market corresponding to the current location of the mobile device is identified. If the current market differs from the home market, the mobile device is granted access to a retransmission of at least one local channel of the current market. The location information may include GPS information indicative of GPS coordinates of the mobile device. The mobile device may include a mobile viewing application that displays a channel guide indicating local channels available in the current market and national channels. The mobile viewing application may include a summary of the current market and the summary may include weather, news headline, and local advertisement information. | 12-03-2015 |
20150348540 | System and Method for Optimizing Speech Recognition and Natural Language Parameters with User Feedback - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for assigning saliency weights to words of an ASR model. The saliency values assigned to words within an ASR model are based on human perception judgments of previous transcripts. These saliency values are applied as weights to modify an ASR model such that the results of the weighted ASR model in converting a spoken document to a transcript provide a more accurate and useful transcription to the user. | 12-03-2015 |
20150341395 | Method And System For Location-Based Communication - A method and system for location-based communication. A selection of a source transceiver from a plurality of available transceivers associated with a source may be received. A telephony session may be initiated with the selected source transceiver. A mobile target transceiver may be geographically located. A result of the geographic location regarding the located mobile target transceiver may be provided. The located mobile target transceiver may be connected to the telephony session. | 11-26-2015 |
20150341188 | Grade of Service Control Closed Loop - Systems and methods for managing network traffic receives, at a grade of service device, network traffic information for a plurality of network traffic channels from a network device separate from the grade of service device. The network traffic information is compared to a threshold to determine a behavior value for each network traffic channel. Each network traffic channel is mapped to a grade of service according to the behavior value. | 11-26-2015 |
20150339517 | Method and Apparatus for Automated Analysis and Identification of a Person in Image and Video Content - A method, apparatus, and computer readable medium for identifying a person in an image includes an image analyzer. The image analyzer determines the content of an image such as a person, location, and object shown in the image. A person in the image may be identified based on the content and event data stored in a database. Event data includes information concerning events and related people, locations, and objects determined from other images and information. Identification metadata is generated and linked to each analyzed image and comprises information determined during image analysis. Tags for images are generated based on identification metadata. The event database can be queried to identify particular people, locations, objects, and events depending on a user's request. | 11-26-2015 |
20150334542 | Apparatus, System and Method for Forwarding Data Sent to a Wireless Device to Another Address - An apparatus for forwarding data sent to a wireless device having a first address to a second address. The apparatus includes a server in communication with a wireless network and an external network. The server includes a processor. The processor includes a data forwarding module for forwarding the data to the second address via the external network when the wireless device is not in communication with the wireless network. | 11-19-2015 |
20150334229 | Devices, Systems, and Methods for Presence Determination - Devices, systems, and methods are disclosed which aggregate presence detections, and use the diversity of presence detections to resolve presence ambiguities and increase the correctness of information. Presence confidence levels and reliability values increase the effectiveness of services based on presence. A variety of methods enable presence detection and reporting. Each of these methods has advantages and disadvantages. The limitations of each of the individual methods are overcome with exemplary embodiments of the subject disclosure. | 11-19-2015 |
20150333986 | PREDICTING VIDEO ENGAGEMENT FROM WIRELESS NETWORK MEASUREMENTS - A mechanism is provided for predicting video engagement from network measurements for a user device connected to a wireless network. Wireless network measurements are retrieved from a wireless network device in the wireless network. The wireless network measurements are related to the user device of a user. It is determined that the user device is engaged in a video streaming session. A computer classifies the video streaming session as one of a plurality of classes, in which the plurality of classes predict an outcome of the video streaming session for the user device. | 11-19-2015 |
20150332665 | SYSTEM AND METHOD FOR DATA-DRIVEN SOCIALLY CUSTOMIZED MODELS FOR LANGUAGE GENERATION - Systems, methods, and computer-readable storage devices for generating speech using a presentation style specific to a user, and in particular the user's social group. Systems configured according to this disclosure can then use the resulting, personalized, text and/or speech in a spoken dialogue or presentation system to communicate with the user. For example, a system practicing the disclosed method can receive speech from a user, identify the user, and respond to the received speech by applying a personalized natural language generation model. The personalized natural language generation model provides communications which can be specific to the identified user. | 11-19-2015 |
20150332123 | IMAGE QUALITY ESTIMATION USING A REFERENCE IMAGE PORTION - A particular method includes receiving a set of images, where each image of the set of images is related to a common scene. The method also includes determining a first subset of pixels of a first image of the set, where the first subset of pixels corresponds to a second subset of pixels of a second image of the set. The method further includes generating a first image quality estimate of the first image based on a comparison of the first subset of pixels and the second subset of pixels | 11-19-2015 |
20150327057 | BUNDLING DATA TRANSFERS AND EMPLOYING TAIL OPTIMIZATION PROTOCOL TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION - To facilitate increasing power and resource efficiency of a mobile device, in the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device. | 11-12-2015 |
20150327016 | Methods, Devices, and Computer Readable Storage Devices for Tracking the Locations of Mobile Target Communication Devices with Respect to the Location of a Host Communication Device over Time - A distance between a host communication device and a mobile target communication device at multiple times over a time period based on a received signal emitted by the mobile target communication device. An amount of time that the distance between the host communication device and the mobile target communication device is within a distance threshold is also determined. A determination is further made whether the amount of time the distance between the host communication device and the mobile target communication device is within the distance threshold is less than a predetermined amount of time. If the amount of time that the distance between the host communication device and the mobile target communication device is within the distance threshold is less than the predetermined amount of time, transmission of a notification to a third party is initiated via a gateway. | 11-12-2015 |
20150326925 | Embedding Interactive Objects into a Video Session - A method includes receiving, at a media device, overlay data associated with media content. The overlay data includes information indicating a time and a position at which a particular object is represented within the media content, and the overlay data includes information associating the particular object with supplemental information. The method further includes, during playback of the media content, receiving user input at the media device, and, responsive to the user input, generating an overlay display based on the overlay data, where the overlay display causes the particular object to be highlighted in a display of the media content. | 11-12-2015 |
20150326903 | DELIVERY OF MEDIA CONTENT TO A USER DEVICE AT A PARTICULAR QUALITY BASED ON A PERSONAL QUALITY PROFILE - A method includes receiving, at a server computing device, a request to stream media content to a user device. The request is associated with data identifying a personal quality profile. The method includes retrieving, via the server computing device, the personal quality profile associated with the data. The personal quality profile indicates media quality preferences. The method includes determining, via a processor of the server computing device, a version of the media content to send to the user device based on the media quality preferences of the personal quality profile and based on a delivery bit rate. The method also includes sending the version from the server computing device to the user device in response to the request. | 11-12-2015 |
20150326721 | VISUAL INTERACTIVE VOICE RESPONSE - An interactive voice response system receives a communication initiated by a remote requesting party. Based upon receipt at the interactive voice response system of the communication, visual data to provide to the remote requesting party as part of an integrated interactive script is determined. The visual data is provided to the remote requesting party as part of the integrated interactive script. Depending upon a selection of the remote requesting party, individual elements of the integrated interactive script are sent to the remote requesting party iteratively based upon interaction between the remote requesting party and the interactive voice response system, or multiple individual elements of the integrated interactive script are sent together to the remote requesting party, and individually presented to the remote requesting party based upon interaction between the remote requesting party and the interactive voice response system. | 11-12-2015 |
20150326660 | Devices, Methods, and Computer Readable Storage Devices for Collecting Information and Sharing Information Associated with Session Flows Between Communication Devices and Servers - Information associated with session flows between communication devices and servers is collected and shared. A request is generated for data having predefined attributes within session flows occurring between multiple communication devices and a server over a communication network. The request is sent to a controller having access to information indicating network elements within the communication network traversed by the session flows. The controller selects a network element from among the network elements traversed by the session flows and retrieves the data from the selected network element. | 11-12-2015 |
20150326532 | METHODS AND APPARATUS TO PROVIDE A DISTRIBUTED FIREWALL IN A NETWORK - Methods and apparatus to provide a distributed firewall in a network are disclosed. An example method includes identifying, at a control plane, a network traffic rule to implement in a network; determining, at the control plane, a distributed firewall for a first firewall in the network to enforce the network traffic rule; instructing, using the control plane, a first software-defined networking node to instantiate the first firewall of the distributed firewall; configuring a second software-defined networking node to route network traffic through the first firewall; and instructing the first software-defined networking node to enforce the network traffic rule. | 11-12-2015 |
20150325904 | REMOTE CONTROL OF SHAKING MACHINE FOR A SIGNAL ACQUISITION DEVICE - A multimedia delivery platform includes a platform manager configured to monitor status of platform resources including content acquisition resources and a managed element, visible to the platform manager, including an externally accessible contact closure. A state of the contact closure is specified by user input provided by a platform manager user. The platform includes a shaking device configured to shake a signal acquisition device such as a dish antenna. A power relay in the platform includes a control terminal coupled to the contact closure of the managed element and output terminals configured to deliver power to the shaking machine upon activation of the power relay. | 11-12-2015 |
20150325255 | METHOD OF PROVIDING DYNAMIC SPEECH PROCESSING SERVICES DURING VARIABLE NETWORK CONNECTIVITY - A user device provides dynamic speech processing services during variable network connectivity with a network server. The user device includes a monitor that monitors a level of network connectivity between the user device and the network server. A user device speech processor processes speech data and is initiated based on a determination that the level of network connectivity between the user device and the network server is impaired. The monitor determines when the level of network connectivity between the user device and the network server is no longer impaired. | 11-12-2015 |
20150325248 | SYSTEM AND METHOD FOR PROSODICALLY MODIFIED UNIT SELECTION DATABASES - Systems, methods, and computer-readable storage devices to improve the quality of synthetic speech generation. A system selects speech units from a speech unit database, the speech units corresponding to text to be converted to speech. The system identifies a desired prosodic curve of speech produced from the selected speech units, and also identifies an actual prosodic curve of the speech units. The selected speech units are modified such that a new prosodic curve of the modified speech units matches the desired prosodic curve. The system stores the modified speech units into the speech unit database for use in generating future speech, thereby increasing the prosodic coverage of the database with the expectation of improving the output quality. | 11-12-2015 |
20150324187 | RUN-TIME DETERMINATION OF APPLICATION DELIVERY - Each of a first and second component version for each of a first and second component of a software application are stored. A profile of the client device is determined. The profile includes a programming language requirement for the client device, a processing capability of the client device and a display capability of the client device. Component versions are selected based on the profile of the client device. One of the selected component version for the first component and the second component of the software application is executed by an application server. | 11-12-2015 |
20150324094 | DYNAMIC ACCESS TO EXTERNAL MEDIA CONTENT BASED ON SPEAKER CONTENT - An interactive conference is supplemented based on terminology content. Terminology content from a plurality of devices connected to the interactive conference is monitored. A set of words from the terminology content is selected. Supplemental media content at an external source is identified based on the selected set of words, and selectively made available to a device connected to the interactive conference. | 11-12-2015 |
20150321100 | Methods and Systems for Establishing Games With Automation Using Verbal Communication - A thick-game client device includes all of the game data processing on-board while a thin-game client device includes only a small portion of game data processing such as to render visual displays while the majority of the game data processing is network based. A thick-voice client devices includes all of the voice processing on-board while a thin-voice client device includes only a small portion of the voice processing such as to generate acoustic parameter data discussed below while the remainder of the voice processing occurs at a voice services node. It will be appreciated that a client device may be thick with respect to both game processing and voice processing, may be thick with respect to one type of processing and thin with respect to the other, or may be thin with respect to both types of processing. | 11-12-2015 |
20150319804 | Devices, Systems, and Methods for Sponsored Tethered Connectivity - Devices, systems, and methods are disclosed which relate to establishing a sponsored tethered connectivity (STC) connection by tethering a special purpose connected device (SPCD) through a tethering mobile device having network access. The SPCD accesses an application server on the network and is authenticated before service to the SPCD begins. Once authenticated, the service provider is billed for the STC connection instead of a user of the tethering mobile device. | 11-05-2015 |
20150319586 | System and Method for Fast and Accurate Detection of SMS Spam Numbers Via Monitoring Grey Phone Space - A method and system for identifying short message service (SMS) spammers identifies senders as spammers by determining that the senders are sending SMS messages to devices included in a grey phone space. Devices in the grey phone space are identified using various methods including an analysis of call detail records. A grey ratio for a sender is determined as a ratio of messages sent to grey phone numbers by the sender to messages sent to all phone numbers by the sender. A sender is identified based on a difference between the grey ratio for the sender and a second grey ratio being above a threshold. | 11-05-2015 |
20150319503 | SMART INTERACTIVE MEDIA CONTENT GUIDE - Television content is provided upon request. A search request for television content is received from a user on a user device. Listings for television content that meet the search request are determined based on the search request. Text describing the listings is converted to corresponding speech describing the listings. Speech describing the listings is provided audibly. | 11-05-2015 |
20150319152 | APPARATUS AND METHOD FOR MANAGING SECURITY DOMAINS FOR A UNIVERSAL INTEGRATED CIRCUIT CARD - A device that incorporates the subject disclosure may perform, for example, generating a security domain root structure for a universal integrated circuit card of an end user device, where the security domain root structure includes a hierarchy of a link provider operator security domain above a mobile network operator trusted security domain, where the link provider operator security domain enables transport management by a link provider operator, and where the mobile network operator trusted security domain enables card content management and subscription eligibility verification by a mobile network operator trusted service manager. Other embodiments are disclosed. | 11-05-2015 |
20150319151 | APPARATUS AND METHOD FOR SECURE DELIVERY OF DATA UTILIZING ENCRYPTION KEY MANAGEMENT - A device that incorporates the subject disclosure may perform, for example, receiving a derived encryption key from a remote management server without receiving a master key from which the derived encryption key was generated, applying a one-way function to the derived encryption key and a nonce to generate a temporary encryption key, obtaining data for transmission to a recipient device, encrypting the data using the temporary encryption key to generate encrypted data, and providing the encrypted data over a network to the recipient device. Other embodiments are disclosed. | 11-05-2015 |
20150317974 | SYSTEM AND METHOD FOR CREATING VOICE PROFILES FOR SPECIFIC DEMOGRAPHICS - Systems, methods, and computer-readable storage devices for receiving an utterance from a user and analyzing the utterance to identify the demographics of the user. The system then analyzes the utterance to determine the prosody of the utterance, and retrieves from the Internet data associated with the determined demographics. Using the retrieved data, the system retrieves, also from the Internet, recorded speech matching the identified prosody. The recorded speech, which is based on the demographic data of the utterance and has a prosody matching the utterance, is then saved to a database for future use in generating speech specific to the user. | 11-05-2015 |
20150317914 | Acoustic Representations of Environments - Concepts and technologies are disclosed herein for acoustic representations of environments. A processor can execute an acoustic representation service. The processor can receive a request to provide acoustic representation data to a device. The processor can obtain input data from the device. The input data can include captured data. The processor can analyze the input data to recognize an object represented in or by the input data and a path associated with the object. The processor can generate acoustic representation data representing the object and the path, and provide the acoustic representation data to the device. | 11-05-2015 |
20150317843 | Payment of Highway Tolls via a Mobile Telecommunications Network - Disclosed are method and apparatus for processing of highway toll payments by a mobile telecommunications service provider. A mobile telecommunications device communicates with a mobile telecommunications service provider. The mobile telecommunications service provider receives a request to calculate a route to a destination. The mobile telecommunications service provider determines the location of the mobile telecommunications device from a global navigation satellite system or from a mobile telecommunications network and calculates a route. The mobile telecommunications service provider then identifies toll booths along the calculated route. The mobile telecommunications service provider pre-pays the tolls. The mobile telecommunications service provider sends turn-by-turn instructions to the mobile telecommunications device and tracks the location of the mobile telecommunications device and records the date and time at which the mobile telecommunications device passes through a toll booth. | 11-05-2015 |
20150317370 | Removal of Invisible Data Packages in Data Warehouses - In accordance with one embodiment of the disclosed technology, inconsistencies are detected between various records relating to data that has been associated with an identification tag. Data packages associated with the inconsistencies may then be removed. In accordance with another aspect of the disclosed technology, requests relating to data packages associated with inconsistencies in the various stored records are identified and removed. The disclosed technology may be implemented in data warehouses. | 11-05-2015 |
20150317353 | CONTEXT AND ACTIVITY-DRIVEN PLAYLIST MODIFICATION - A method of dynamically modifying a playlist includes obtaining, at a device, context data including information indicating a context associated with a user and obtaining, at the device, activity data including information indicating an activity of the user. The method also includes adding a media content item to a playlist, wherein the content item is added to the playlist based on information descriptive of the media content item, the context data, and the activity data. The method further includes setting, at the device, a playback parameter of the media content item based on the context data, the activity data, or any combination thereof. | 11-05-2015 |
20150317200 | Methods, Systems, Devices, and Products for Error Correction in Computer Programs - Access to personal information is restricted when analyzing errors in computer programs. Variables are named with prefixes to identify data that must be transformed before disclosure. If a variable has a name that requires transformation, the associated data must be transformed before resolving an error. | 11-05-2015 |
20150312837 | FACILITATING MESH NETWORKS OF CONNECTED MOVABLE OBJECTS - Wireless communication via a mesh network of connected movable objects is described. A method includes determining, by a device including a processor, a value of a characteristic of a first movable object of movable objects communicatively coupled to a wireless network, wherein the movable objects are automated vehicles, and wherein the determining the value is based on a likelihood of receipt of a message transmitted from the first movable object to a second movable object of the movable objects. The method also includes generating information usable to move the first movable object in a manner that satisfies a defined condition associated with the value. The information can be strength of a wireless communication channel between the first movable object and a second movable object of the movable objects. | 10-29-2015 |
20150312805 | ENHANCEMENT OF A CELL RESELECTION PARAMETER IN HETEROGENEOUS NETWORKS - A cell reselection procedure in heterogeneous networks is enhanced based on utilization of per category cell reselection parameters. In one aspect, a serving access point can categorize a set of neighbor access points based on cell-type and/or cell-profile data of a set of neighbor access points. Further, the serving access point can determine cell reselection parameters for the different categories. As an example, offset data (Qoffset) can be determined for the different categories. The per category cell reselection parameters can be transmitted to user equipment coupled to the serving access point to facilitate cell reselection. In one example, the per category cell reselection parameters reduce operational costs associated with processing and transmission of system parameters. | 10-29-2015 |
20150312776 | ENHANCEMENT OF ACCESS POINTS TO SUPPORT HETEROGENEOUS NETWORKS - An interface between access points is enhanced by enabling an exchange of a cell characteristic information element (IE). The cell characteristic information can provide an access point with information about the characteristics/features/capabilities of its neighbor cells. Automatic neighbor relations are also enhanced to store and/or manage the cell characteristic information. Moreover, the cell characteristic information can be utilized by the access point to significantly improve handover (HO) decisions, increase load balancing performance, and/or decrease inter cell interference. The cell characteristic information can also improve network efficiency and avoid bottlenecks during cell reselection in Heterogeneous Networks (HetNets). | 10-29-2015 |
20150312714 | SYSTEM AND METHOD FOR PERMISSION TO ACCESS MOBILE LOCATION INFORMATION - A location query service is disclosed. The service provides requestors with a location of a device. The service receives a location query from a requestor, retrieves location information associated with the network user, and returns the location information to the requestor. Before returning the location information to the requestor, the service is configured, in some embodiments, to authenticate that the requestor is authorized by the network user to receive the network user's location information. Methods for providing a location query service also are disclosed. | 10-29-2015 |
20150312649 | METHOD AND APPARATUS FOR AUGMENTING MEDIA CONTENT - Aspects of the subject disclosure may include, for example, generating narrative descriptions corresponding to visual features, visual events, and interactions there between for media content, where the narrative descriptions are associated with time stamps of the media content, and presenting the media content and an audio reproduction of the narrative descriptions, wherein the audio reproduction is synchronized to video of the media content according to the time stamps. Other embodiments are disclosed. | 10-29-2015 |
20150312186 | METHODS OF GENERATING SIGNATURES FROM GROUPS OF ELECTRONIC MESSAGES AND RELATED METHODS AND SYSTEMS FOR IDENTIFYING SPAM MESSAGES - A method of generating a signature for a group of electronic messages that each include a plurality of characters comprises extracting a plurality of blocks of characters from each of the electronic messages, mathematically processing each of the blocks of characters from each electronic message, and generating a signature for the group of electronic messages based at least in part on the mathematically processed blocks of characters. In some embodiments a counting Bloom filter may be used to generate the signature. The signatures generated by these methods may be used to identify spam. | 10-29-2015 |
20150310682 | Access Control System - An access control system provides authentication and notification. A visitor to a facility, for example, authenticates to the access control system. Once an identity of the visitor is confirmed, the access control system sends a notification to a host, such as an employee. The notification informs the host of the arrival of the visitor. | 10-29-2015 |
20150310514 | Systems And Methods For Purchasing Electronic Transmissions - Provided are methods, apparatus and systems for the sale of digital content over a network. The disclosure herein discusses the recording of a broadcast of a digital data stream by a broadcast receiving device. A listener may select a particular digital data stream to purchase by selecting a content identifier associated with the digital data stream of interest at the recording device. Upon obtaining the selection, a purchase request message is transmitted to an intermediary communication device. The purchase request message includes at least the content identifier. After the transaction is completed at a transaction server, a purchase confirmation message including at least a digital rights management key associated with the digital data stream is returned to and received by the broadcast receiving device. Upon receipt, of the digital rights management key, the recorded digital data stream is released for reproduction. | 10-29-2015 |
20150310490 | MOBILE COUPON DISCOUNTS AND VALUATION BASED ON PROBABILITY OF A GEOFENCE COLLISION - To provide mobile device coupons and discounts, a mobile device couponing system is provided to generate and send coupons to mobile devices based on a probability that the mobile device is within a defined region. The value of the coupons can be inversely proportional to the probability that the mobile device is within the defined region. The probabilities can be precomputed by calculating the probability that each cell in grid in or around the defined region is in the defined region using a set of standardized location resolutions. When location information is received from the mobile device, the probability that the mobile device is within the defined region can be retrieved based on the closest cell that matches the location indicated in the location information and the standardized location resolution closest to the location resolution indicated by the mobile device. | 10-29-2015 |
20150310340 | Digital Rights Management Using a Digital Agent - A method for digital rights management includes a digital agent for contacting a media host. Media content is compared to a user profile and an identification confidence level is assigned to the media based on the comparison. A digital agent contacts a host of the media based on the identification confidence level, the type of media, and the context of the media. The digital agent requests one or more actions of a media host based on user designations concerning information related to the media. The identification confidence level is generated based on a plurality of user characteristic confidence levels which are generated based on media being analyzed. | 10-29-2015 |
20150310309 | METHOD AND APPARATUS FOR ORGANIZING MEDIA CONTENT - A method that incorporates teachings of the subject disclosure may include, for example, determining, by a system comprising a processor, more common features of a plurality of images according to similarity matrices indicating relative similarities between instances of common features occurring within multiple images of the plurality of images, defining, by the system, cluster groups associated with the more common features, where each cluster group comprises cluster images of the plurality of images, and where the more common features are present in each the cluster images, and performing, by the system, quality-based filtering on the cluster images to identify a target cluster image to represent the cluster images for each of the cluster groups. Other embodiments are disclosed. | 10-29-2015 |
20150310307 | METHOD AND APPARATUS FOR ANALYZING MEDIA CONTENT - Aspects of the subject disclosure may include, for example, a method for determining a first set of features in first images of first media content, generating a similarity score by processing the first set of features with a favorability model derived by identifying generative features and discriminative features of second media content that is favored by a viewer, and providing the similarity score to a network for predicting a response by the viewer to the first media content. Other embodiments are disclosed. | 10-29-2015 |
20150309820 | Mobile Device With Virtual Interfaces - Mobile devices, systems and methods are described with a plurality of virtual machines, wherein each virtual machine executes a separate virtual interface, or guest operating system. Each guest operating system corresponds to a different virtual device having its own contact list, applications, and so on. A virtual “device” can be controlled by an employer or service provider, and is a secure space that provides authenticated applications that are walled off from another virtual device. A host operating system provides a hardware abstraction layer. A proxy server on the host operating system receives an incoming signal from a remote device on the external network, and routes the incoming signal to one of the first and second virtual machines based on a call context. A method and computer program product for providing a plurality of virtual interfaces on a mobile device are also disclosed. | 10-29-2015 |
20150304595 | Relational Display of Images - A method and apparatus for displaying a plurality of secondary images based on image data of a primary image include displaying a primary image and a plurality of secondary images based on the image data of the primary image. Each of the plurality of secondary images is displayed having a size based on a relevance of each respective one of the plurality of secondary images to the primary image. The primary image can be selected from a plurality of images or a frame of a video. Subsets of secondary images can be displayed in clusters including images having content similar to particular content of the primary image. | 10-22-2015 |
20150304507 | Methods, Systems, and Products for Monitoring Service Usage - Usage information is received that describes usage of communication services by a communications device. The usage information is compared to monitoring criteria. When the monitoring criteria are satisfied, an electronic notification message is sent to the communications device before an additional charge is incurred. | 10-22-2015 |
20150302500 | In-Store Field-of-View Merchandising and Analytics - Concepts and technologies disclosed herein are directed to aspects of in-store field-of-view merchandising and analytics. According to one aspect disclosed herein, a system receives a message from a user device. The message can include an orientation of the user device and a location of the user device within an environment, such as a store. The system can obtain a potential field-of-view of a user associated with the user device. The system can determine, based upon the orientation, the location of the user device and the potential field-of-view of the user, an estimated field-of-view of the user. The system can query a database to look-up items located within the estimated field-of-view. The system can receive, in response to the query, a query response identifying an item located within the estimated field-of-view of the user within the environment. | 10-22-2015 |
20150301788 | PROVIDING AUDIO AND ALTERNATE AUDIO SIMULTANEOUSLY DURING A SHARED MULTIMEDIA PRESENTATION - Aspects of the subject disclosure may include, for example, decoding first and second encoded audio portions extracted from a digitally encoded data stream to obtain first and second decoded audio portions. The digitally encoded data stream includes an encoded video portion, multiple encoded audio portions including the first and second audio portions and a reference marker. The first and second decoded audio portions are synchronized to a decoded video portion based on the reference marker. The first decoded audio portion is forwarded to equipment of a first user and the second decoded audio portion is forwarded to equipment of a second user. Presentations of the first decoded audio portion by the equipment of the first user and the second decoded audio portion by the equipment of the second user are synchronized to a presentation of the decoded video portion. Other embodiments are disclosed. | 10-22-2015 |
20150301671 | Pressure-Based Input Method for User Devices - Concepts and technologies disclosed herein are directed to a pressure-based input method for user devices. According to one aspect disclosed herein, a user device can receive an output from a pressure sensor. The output can include parameters associated with a pressure applied to the pressure sensor by a user. The user device can analyze the output to determine a command to be executed by the user device. The user device can execute the command. | 10-22-2015 |
20150301114 | Devices and Methods for Power Transmission Level Indication - Devices and methods are disclosed which relate to a wireless communications device comprising a wireless power transmission detector and a wireless power transmission indicator for displaying to a user the current level of wireless power transmission. A voltmeter and ammeter take readings from the wireless transceiver circuit while the wireless communications device is on. A power logic stored on a memory within the wireless communications device converts the readings into a wireless power transmission level. The wireless power transmission level is output to an indicator on the wireless communications device where a user can view it. Exemplary embodiments include a true battery life indicator on the wireless communications device. The true battery life indicator gives an amount of time a battery powering the wireless communications device will last at the current wireless power transmission level. | 10-22-2015 |
20150295902 | Instant Messaging Private Tags - Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided. | 10-15-2015 |
20150289111 | Determining Indoor Location of Devices Using Reference Points and Sensors - Concepts and technologies are disclosed herein for determining the indoor location of devices such as smartphones and tablet computers using reference points and sensors. According to one aspect disclosed herein, an environment analytics system can retrieve a layout of an environment and determines an absolute reference point for the layout. The environment analytics system also can determine a coordinate pair for a point associated with an area of the layout. The coordinate pair can be determined relative to the absolute reference point. The environment analytics system also can determine a coordinate pair for a beacon deployed within the area. The coordinate pair can be associated with a unique address of the beacon. The environment analytics system can update beacon data in an environment database to include the coordinate pair for the beacon and the unique address of the beacon. | 10-08-2015 |
20150288991 | CREATION OF A MARKED MEDIA MODULE - Disclosed herein are systems and methods for the presentation and marking of media modules. In different aspects, the systems and methods may allow a user to present and consume a media module, particularly a media module containing data that is typically presented in a serial manner such as audio, visual, or video media, and to create a marked media module for quickly and easily returning to a marked point of interest in the media module at a later time or on a different device. | 10-08-2015 |
20150281797 | Suggestive Content Based on Habit - Suggestions for content are based on a habit of a user. Favored genres of content are determined at different times of day. Should content be requested at a particular time of day for which no favored genre of content is determined, then one of the known favored genres of content is suggested. | 10-01-2015 |
20150281447 | AUTOMATED ASSISTANCE FOR CUSTOMER CARE CHATS - A system for providing automated assistance to an agent includes a database that stores an automated assistance session in association with a client terminal. The automated assistance session comprises communications between the client terminal and an agent terminal during a communication session. The automated assistance session is restored in response to a connection being reestablished with the client terminal after the client terminal disconnects during the communication session. A client communication is received from the client terminal, and a plurality of statements is determined based on the client communication and the communications of the automated assistance session stored in the database. The statements are configured to be manually selected by an agent or automatically selected by an automated agent. The automated agent is engaged for automatically selecting one of the statements in response to a predetermined condition. | 10-01-2015 |
20150281270 | SECURITY NETWORK BUFFER DEVICE - A secure connection is facilitated between a device and a network. A security buffer device is used to determine an available network and connect to the network. The security buffer device can then allow the device to connect to the network via the security buffer device. The security buffer device can monitor any security breaches from the network and perform an action based on the indication of a security breach. | 10-01-2015 |
20150281209 | Methods, Systems, and Products for Authentication of Users - Methods, systems, and products authenticate users for access to devices, applications, and services. Skills of a user are learned over time, such that an electronic model of random subject matter may be generated. The user is prompted to interpret the random subject matter, such as with an electronic drawing. The user's interpretation is then compared to the electronic model of the random subject matter. If the user's interpretation matches the electronic model, the user may be authenticated. | 10-01-2015 |
20150281181 | METHOD AND SYSTEM TO ENABLE A VIRTUAL PRIVATE NETWORK CLIENT - Aspects of the subject disclosure may include, for example, a method comprising transmitting, by a controller comprising a processor, a request to a server to enable initiation of a virtual private network session on behalf of devices other than the controller. The controller transmits authentication information to enable the server to validate the request, and receives a first list of computing devices. The controller transmits a first selection of a target device from the first list to cause the server to initiate the virtual private network session between the target device and a service node providing services to the target device via the virtual private network session. The controller receives a second list of applications executable on each of the computing devices, and transmits to the server a second selection of an application from the second list that is executable by the target device. Other embodiments are disclosed. | 10-01-2015 |
20150276425 | METHODS, DEVICES, AND COMPUTER PROGRAM PRODUCTS FOR GEO-TAGGED PHOTOGRAPHIC IMAGE AUGMENTED FILES - A method of providing augmented Global Positioning System (GPS) navigation can include detecting movement of a GPS enabled mobile device along a navigational route and displaying a photographic image on a display of the GPS enabled mobile device responsive to detecting movement of the GPS enabled mobile device along the navigational route provided by the GPS enabled mobile device. Related devices and computer program products are also disclosed. | 10-01-2015 |
20150271210 | Monitoring and Controlling Electronic Activity Using Third Party Rule Submission and Validation - Concepts and technologies are disclosed herein for monitoring and controlling electronic activity. A policy service can be called for policies for controlling electronic activity occurring at one or more managed devices. The policies can include a number of rules, each of which can include a number of variables. The rules can be defined by a manager device and/or received from third parties. Third party rule submissions can be validated. If electronic activity at the managed device deviates from a rule, the manager device can be notified and the electronic activity can be blocked. The manager device can update the policy and/or issue exceptions, if desired. | 09-24-2015 |
20150269210 | PERSONAL CUSTOMER CARE AGENT - Information is aggregated and made available to users. A system monitors over the internet a first set of external information sources for a first user based on instructions from a first user profile that specifies information to aggregate for the first user. The system detects, based on the monitoring, new data at one of the first set of information sources. The system obtains the new data at the one of the first set of information sources, independent of preferences of the one of the first set of information sources. The system updates aggregated information for the first user with the new data from the one of the first set of information sources. The updated aggregated information for the first user is made available to the first user. | 09-24-2015 |
20150267912 | Task-Lit Cabinet - Methods, apparatuses, and products passively generate electrical energy from waste heat. Electronic components in cabinets generate waste heat that is used to illuminate an interior of a cabinet. A thermovoltaic semiconductor detects a temperature differential between a pair of terminals installed in the cabinet. The thermovoltaic semiconductor generates a low voltage output in response to the temperature differential. A power supply receives the low voltage output and produces a higher voltage for low-wattage light sources installed in the cabinet. | 09-24-2015 |
20150263805 | Management System for GPON Based Services - A computerized system and method for managing a passive optical network (PON) is disclosed. The system includes a detection and analysis module adapted for receiving uploaded measurement data from an optical line terminal (OLT) and at least one optical network terminal (ONT), and at least one of technical tools data, service failure data, and outside plant data. The detection and analysis module is adapted for determining a source of failure or potential failure in the PON by correlating the uploaded measurement data and the at least one of technical tools data and service failure data with information stored in a memory medium for the OLT and each ONT. | 09-17-2015 |
20150262582 | Mobile Devices, Methods, and Computer Program Products for Enhancing Social Interactions With Relevant Social Networking Information - Devices, methods, and computer program products are for facilitating enhanced social interactions using a mobile device. A method for facilitating an enhanced social interaction using a mobile device includes receiving an audio input at the mobile device, determining a salient portion of the audio input, receiving relevant information associated with the salient portion, and presenting the relevant information via the mobile device. | 09-17-2015 |
20150253187 | Characterization of Single-Photon Detectors Using a Continuous Wave Laser Source - Operational parameters of a single-photon detector are determined with a continuous wave laser source. At a fixed trigger, a dark count probability and a series of count probabilities at different optical powers are determined. A particular optical power is selected by using a wide-range variable attenuator to attenuate the optical power of the continuous wave laser. The dark count probability and the count probabilities are determined for different trigger rates. The operational parameters include efficiency, afterpulsing constant, and detrap time. The operational parameters are computed by fitting the computed dark count probabilities and count probabilities to a user-defined relationship. | 09-10-2015 |
20150249863 | Method and Apparatus for Distributed Display Monitoring - A method for monitoring a monitored display monitors data to be output from a monitored display. The monitored data is analyzed to generate one or more content identifiers. The content identifiers are compared to a set of rules to determine if the monitored data should be blocked from being output or if an alert should be transmitted to a supervisor device. One or more supervisor devices may be used to respond to alerts and may also be used to control the output of the monitored display. | 09-03-2015 |
20150244790 | Opportunistic Crowd-Based Service Platform - A method and apparatus for providing an opportunistic crowd based service platform is disclosed. A mobile sensor device is identified based on a current location and/or other qualities, such as intrinsic properties, previous sensor data, or demographic data of an associated user of the mobile sensor device. Data is collected from the mobile sensor device. The data collected from the mobile sensor device is aggregated with data collected from other sensor devices, and content generated based on the aggregated data is delivered to a user device. | 08-27-2015 |