Patent application number | Description | Published |
20090018619 | SHIFTING OF ELECTRICAL STIMULATION ELECTRODE COMBINATIONS AMONG DIFFERENTLY SIZED ELECTRODE ARRAYS - The disclosure provides techniques for parameter-directed shifting of electrical stimulation electrode combinations. An external programmer permits a user to shift electrode combinations, e.g., along the length of a lead or leads. The external programmer accepts shift input and causes an electrical stimulator to shift electrode combinations as indicated by the input. Different sets of electrodes may have different electrode counts. For example, an array of electrodes carried by one lead may have a greater number of electrodes than an array of electrodes carried on another lead. The disclosure provides techniques for shifting electrode combinations among leads with different electrode counts. For example, an external programmer may execute shifts in a series of shift operations, where the number of shift operations along the length of a lead having a greater electrode count is greater than the number of shift steps along the length of a lead having a lesser electrode count. | 01-15-2009 |
20090281594 | Peripheral Nerve Field Stimulation Control - Peripheral nerve field stimulation (PNFS) may be controlled based on detected physiological effects of the PNFS, which may be an efferent response to the PNFS. In some examples, a closed-loop therapy system may include a sensing module that senses a physiological parameter of the patient, which may be indicative of the patient's response to the PNFS. Based on a signal generated by the sensing module, the PNFS may be activated, deactivated or modified. Example physiological parameters of the patient include heart rate, respiratory rate, electrodermal activity, muscle activity, blood flow rate, sweat gland activity, pilomotor reflex, or thermal activity of the patient's body. In some examples, a patient pain state may be detected based on a signal generated by the sensing module, and therapy may be controlled based on the detection of the pain state. | 11-12-2009 |
20090281595 | PROGRAMMING TECHNIQUES FOR PERIPHERAL NERVE FIELD STIMULATION - Peripheral nerve field stimulation (PNFS) delivered by a medical device to a patient may be programmed by specifying one or more characteristics of a stimulation field generated by the IMD to provide the PNFS. The characteristics of the stimulation field may include, for example, a direction of stimulation within the field, a breadth of the stimulation field, a focus of stimulation within the stimulation field, a depth of the stimulation field relative to a reference point, such as the epidermis of the patient, or a nerve fiber diameter selection. | 11-12-2009 |
20090281596 | PROGRAMMING TECHNIQUES FOR PERIPHERAL NERVE FIELD STIMULATION - A therapy program for peripheral nerve field stimulation (PNFS) may be selected based on user input indicating a desired therapeutic effect for a user-specified region in which a patient feels pain. In other examples, PNFS may be programmed based on input from a user selecting at least one region from among a plurality of regions in which the patient experiences pain. In addition, the PNFS may be programmed based on user input defining an aspect of PNFS for the selected region, such as a relative intensity of PNFS delivered to at least two selected regions, a balance of PNFS between at least two regions, a desired shift in PNFS from a first region to a second region, or an extent to which a first stimulation field within a first region overlaps with a second stimulation field in a second region. | 11-12-2009 |
20090299438 | INDICATION OF COUPLING BETWEEN MEDICAL DEVICES - Techniques for providing an indication of coupling between medical devices are disclosed. For example, when a programming device and a telemetry module are coupled, the telemetry module provides a first indication, and the programming device provides a second indication substantially similar to the first indication. The indications may be, for example, colors, and different indications may signify communication with different implantable medical devices, programming different therapies, or use of different applications of the programming device. | 12-03-2009 |
20110230940 | SHIFTING BETWEEN ELECTRODE COMBINATIONS IN ELECTRICAL STIMULATION DEVICE - The disclosure is directed to techniques for shifting between two electrode combinations. An amplitude of a first electrode combination is incrementally decreased while an amplitude of a second, or subsequent, electrode combination is concurrently incrementally increased. Alternatively, an amplitude of the first electrode combination is maintained at a target amplitude level while the amplitude of the second electrode combination is incrementally increased. The stimulation pulses of the electrode combinations are delivered to the patient interleaved in time. In this manner, the invention provides for a smooth, gradual shift from a first electrode combination to a second electrode combination, allowing the patient to maintain a continual perception of stimulation. The shifting techniques described herein may be used during programming to shift between different electrode combinations to find an efficacious electrode combination. Additionally, the techniques may be used for shifting between different electrode combinations associated with different stimulation programs or program sets. | 09-22-2011 |
20120022614 | SHIFTING BETWEEN ELECTRODE COMBINATIONS IN ELECTRICAL STIMULATION DEVICE - The disclosure is directed to techniques for shifting between two electrode combinations. An amplitude of a first electrode combination is incrementally decreased while an amplitude of a second, or subsequent, electrode combination is concurrently incrementally increased. Alternatively, an amplitude of the first electrode combination is maintained at a target amplitude level while the amplitude of the second electrode combination is incrementally increased. The stimulation pulses of the electrode combinations are delivered to the patient interleaved in time. In this manner, the invention provides for a smooth, gradual shift from a first electrode combination to a second electrode combination, allowing the patient to maintain a continual perception of stimulation. The shifting techniques described herein may be used during programming to shift between different electrode combinations to find an efficacious electrode combination. Additionally, the techniques may be used for shifting between different electrode combinations associated with different stimulation programs or program sets. | 01-26-2012 |
20120022615 | SHIFTING BETWEEN ELECTRODE COMBINATIONS IN ELECTRICAL STIMULATION DEVICE - The disclosure is directed to techniques for shifting between two electrode combinations. An amplitude of a first electrode combination is incrementally decreased while an amplitude of a second, or subsequent, electrode combination is concurrently incrementally increased. Alternatively, an amplitude of the first electrode combination is maintained at a target amplitude level while the amplitude of the second electrode combination is incrementally increased. The stimulation pulses of the electrode combinations are delivered to the patient interleaved in time. In this manner, the invention provides for a smooth, gradual shift from a first electrode combination to a second electrode combination, allowing the patient to maintain a continual perception of stimulation. The shifting techniques described herein may be used during programming to shift between different electrode combinations to find an efficacious electrode combination. Additionally, the techniques may be used for shifting between different electrode combinations associated with different stimulation programs or program sets. | 01-26-2012 |
20120136409 | RULE-BASED STIMULATION PROGRAM SEARCH - Techniques that involve application of one or more rules to a “parent” program to generate a plurality of different “child” programs are described. Each of the rules may define a respective electrode configuration modification, and each child program may be a variation of the parent based on a modification of the electrode configuration of the parent according to one of the rules. The systems or devices may generate further generations of child programs from a previous generation child program using the same one or more rules. The child programs may be provided to a user, so that the user may test the efficacy of the new programs, assisting the user in identifying desirable programs. The child programs may be relatively minor variations of the parent program, and the user may “fine tune” a generally desirable parent program by testing the child programs. | 05-31-2012 |
20140350636 | PERIPHERAL NERVE FIELD STIMULATION CONTROL - Peripheral nerve field stimulation (PNFS) may be controlled based on detected physiological effects of the PNFS, which may be an efferent response to the PNFS. In some examples, a closed-loop therapy system may include a sensing module that senses a physiological parameter of the patient, which may be indicative of the patient's response to the PNFS. Based on a signal generated by the sensing module, the PNFS may be activated, deactivated or modified. Example physiological parameters of the patient include heart rate, respiratory rate, electrodermal activity, muscle activity, blood flow rate, sweat gland activity, pilomotor reflex, or thermal activity of the patient's body. In some examples, a patient pain state may be detected based on a signal generated by the sensing module, and therapy may be controlled based on the detection of the pain state. | 11-27-2014 |
20140371813 | PROGRAMMING TECHNIQUES FOR PERIPHERAL NERVE FIELD STIMULATION - A therapy program for peripheral nerve field stimulation (PNFS) may be selected based on user input indicating a desired therapeutic effect for a user-specified region in which a patient feels pain. In other examples, PNFS may be programmed based on input from a user selecting at least one region from among a plurality of regions in which the patient experiences pain. In addition, the PNFS may be programmed based on user input defining an aspect of PNFS for the selected region, such as a relative intensity of PNFS delivered to at least two selected regions, a balance of PNFS between at least two regions, a desired shift in PNFS from a first region to a second region, or an extent to which a first stimulation field within a first region overlaps with a second stimulation field in a second region. | 12-18-2014 |
Patent application number | Description | Published |
20090115653 | MULTI-CELL VOLTAGE SECURE DATA ENCODING IN HYBRID VEHICLES - A method of encoding data related to voltages for each of a plurality of battery cells for transmission in a hybrid vehicle includes the steps of generating a plurality of voltage groups, and generating a validity measure for each of the plurality of voltage groups. Each of the plurality of voltage groups comprises the voltages for a different combination of the plurality of battery cells. | 05-07-2009 |
20100100345 | SYSTEM AND METHOD FOR IDENTIFYING ISSUES IN CURRENT AND VOLTAGE MEASUREMENTS - First and second reference voltages are applied to first and second terminals of a processor via voltage divider circuits. First and second signal conditioning circuits are coupled to third and fourth terminals of the processor, respectively, and voltage or current sensors are coupled to the first and second signal conditioning circuits. The processor measures the electrical characteristics at the third and fourth terminals and computes first and second ratiometric values of the electrical characteristics, wherein the first ratiometric value is based upon a measurement obtained from the third terminal and the first reference voltage and the second ratiometric value is based upon a measurement of obtained from the fourth terminal and the second reference voltage. The processor further identifies an issue if a ratio of the first ratiometric value to the second ratiometric value exceeds a ratio of the first reference value to the second reference value. | 04-22-2010 |
20100324846 | METHOD AND SYSTEM FOR ESTIMATING BATTERY LIFE - Methods and systems for estimating remaining life of an automotive propulsion battery are provided. A total usable capacity of the battery is calculated based on cycling the battery. A first component of degradation is calculated based on driving throughput of the battery. A second component of degradation is calculated based on aging of the battery. The total degradation is calculated based on the sum of the first component and the second component of degradation. | 12-23-2010 |
20110089953 | SENSOR ARRANGEMENT AND METHOD OF USING THE SAME - A sensor arrangement and method that may be used with a variety of different energy storage devices, including battery packs found in hybrid vehicles, battery electric vehicles, and other types of vehicles. An exemplary sensor arrangement includes a number of sensor units, a controller, and several connections, wherein two or more sensor units are coupled to each node of the battery pack and are coupled to the controller over different connections. An exemplary method is divided into two aspects: an error detection aspect and an error resolution aspect. Because the sensor arrangement provides multiple sensor readings for each node being evaluated, the method can enable the sensor arrangement to continue operating accurately and with redundancy even if it experiences a loss of one or more sensor units. | 04-21-2011 |
20110274956 | EASY-TO-ASSEMBLE BATTERY PACK WITH PRISMATIC BATTERY CELLS - A weld-free, frameless battery design is provided. The design reduces the number of parts and the weight of the battery pack, simplifies the assembly operation, and keeps the battery pack reparable and remanufacturable with minimal effort and cost. The battery pack includes a stack of battery cells and cooling fins, and a removable restraint is placed around the stack. The positive and negative tabs of the battery cells comprise a pair of sub-tabs which are bent over the faces of the cell. One type of cell can have an extended portion on one of the positive and one the negative sub-tabs which are on opposite faces of the cell. The sub-tabs are used to make the necessary series and parallel connections. | 11-10-2011 |
20120025835 | Sensor Arrangement for an Energy Storage Device and a Method of Using the Same - A sensor arrangement and method that may be used with a variety of different energy storage devices, including battery packs found in hybrid vehicles, battery electric vehicles, and other types of vehicles. Some battery monitoring systems, such as those designed to monitor and/or control lithium-ion battery packs, may require individual voltage readings for each and every cell. If a battery monitoring system component—even one that provides just one of these sensor readings—malfunctions or otherwise experiences a fault condition, then it may be necessary to bring the entire vehicle in for service. The exemplary sensor arrangement and method may be used to control a series of balancing switches in the sensor arrangement in such a way that enables the vehicle to detect fault conditions and to continue operating successfully in the event that such fault conditions occur. | 02-02-2012 |
20120245793 | MULTI-CELL VOLTAGE SECURE DATA ENCODING IN HYBRID VEHICLES - Methods and systems are provided for encoding vehicle data comprising a first voltage pertaining to a first battery cell and a second voltage pertaining to a second battery cell is provided. A determination is made as to whether the first voltage is valid. In addition, a determination is made as to whether the second voltage is valid. One of a plurality of values is assigned to a validity measure based at least in part on whether the first voltage or the second voltage, or both, are valid. The plurality of values, in binary form, are at least two bit errors removed from one another. | 09-27-2012 |
20130141230 | SENSOR ARRANGEMENT AND METHOD OF USING THE SAME - A sensor arrangement and method that may be used with a variety of different energy storage devices, including battery packs found in hybrid vehicles, battery electric vehicles, and other types of vehicles. An exemplary sensor arrangement includes a number of sensor units, a controller, and several connections, wherein two or more sensor units are coupled to each node of the battery pack and are coupled to the controller over different connections. An exemplary method is divided into two aspects: an error detection aspect and an error resolution aspect. Because the sensor arrangement provides multiple sensor readings for each node being evaluated, the method can enable the sensor arrangement to continue operating accurately and with redundancy even if it experiences a loss of one or more sensor units. | 06-06-2013 |
Patent application number | Description | Published |
20110299564 | DYNAMIC ESTIMATION OF CELL CORE TEMPERATURE BY SIMPLE EXTERNAL MEASUREMENTS - Methods and systems for dynamically estimating the core temperature of at least one cell in a battery during an operative period. The method includes receiving by at least one controller the surface temperature, the current, the voltage, the state of charge, and the period of time from the initiation of a rest period to the termination of the rest period, determining an initial value of the lumped internal resistance of the at least one cell, determining subsequent values of the lumped internal resistance recursively in real-time based on the initial value, the current, and the voltage, and determining the core temperature of the at least one cell based on the surface temperature, the current, the obtained time, and the lumped internal resistance. The system for dynamically estimating the core temperature of the cells in a battery includes a plurality of sensors configured to transmit signals related to surface temperature, current, and voltage of the battery, a timing device configured to transmit signals related to the period of time from the initiation of a rest period to the termination of the rest period, and a control system, wherein the control system comprises a memory device and a controller. | 12-08-2011 |
20120040221 | INTEGRATED STACKABLE BATTERY - A reversibly connected battery pack is provided. The reversibly connected battery pack includes a pair of end frames, at least one frame, a plurality of battery cells, and at least one power connector. One end frame has a positive terminal, and the other has a negative terminal. The frame(s) is positioned between the pair of end frames. Each of the plurality of battery cells has a positive tab and a negative tab. The positive tab of one of the plurality of battery cells is electrically connected to the positive terminal in the end frame, and the negative tab of another one of the plurality of battery cells is electrically connected to the negative terminal in the end frame. The plurality of battery cells are positioned in the frame(s) and the end frames. The plurality of battery cells and the positive and negative tabs are supported by the frame and the pair of end frames. There is at least one power connector electrically connecting the negative tab of one battery cell with the positive tab of an adjacent battery cell. | 02-16-2012 |
20120091963 | BATTERY FAULT TOLERANT ARCHITECTURE FOR CELL FAILURE MODES PARALLEL BYPASS CIRCUIT - A by-pass circuit for a battery system that disconnects parallel connected cells or modules from a battery circuit or controls the current through the parallel connected cells or modules. If a cell has failed or is potentially failing in the system, then the by-pass circuit can disconnect the cell or module from other cells or modules electrically coupled in parallel. If a cell or module has a lower capability than another cell or module, then the by-pass circuit can control the current to the cell or module to maximize the performance of the system and prevent the system from creating a walk-home condition. | 04-19-2012 |
20120091964 | BATTERY FAULT TOLERANT ARCHITECTURE FOR CELL FAILURE MODES SERIES BYPASS CIRCUIT - A battery cell by-pass circuit that has particular application for by-passing cells in a high voltage battery for a vehicle. The battery includes a plurality of battery cells electrically coupled in series. The by-pass circuit includes a first switch electrically coupled in series with one or more of the battery cells, a by-pass line electrically coupled around the one or more battery cells and a second switch electrically coupled in the by-pass line and in parallel with the one or more battery cells. During normal cell operation, the first switch is closed and the second switch is open so that current flows through the one or more battery cells. If the one or more battery cells fail or are failing, the first switch is opened and the second switch is closed so that current by-passes the one or more cells and they are removed from the battery circuit. | 04-19-2012 |
20120091971 | EXCESSIVE CURRENT DETECTION CONTROLS METHOD - A method for controlling charging and discharging of a battery pack for an electric or hybrid vehicle to prevent overheating damage. Current flowing into or out of the battery pack is monitored, and root mean square (RMS) current is integrated over a time window and compared to a threshold to determine if power needs to be regulated in order to prevent damage to the cells in the battery pack. If the time-integrated RMS current exceeds the threshold, a closed-loop proportional-integral (PI) controller is activated to regulate power input or output. The controller will continue to regulate power until the time-integrated RMS current drops below the threshold. Various thresholds can be defined for different time windows. The gains used in the PI controller can also be adjusted to scale the amount of power regulation. | 04-19-2012 |
20120128026 | REAL-TIME ESTIMATION OF CELL CORE TEMPERATURE DURING PERIOD OF REST - Methods and systems for estimating the core temperature of at least one cell in a battery at the termination of a rest period. The method for estimating the core temperature of the cells in a battery includes measuring the surface temperature of the cells, obtaining the estimated core temperature of the cells, obtaining the time required for the surface temperature and the estimated core temperature of the cells to converge, and estimating the core temperature of the cells based on the measured surface temperatures, the obtained estimated core temperature, and the obtained time. The system for estimating the core temperature of the cells in a battery includes at least one sensor configured to receive temperature information and a control system in signal communication with the sensor, wherein the control system comprises a memory device and a controller. | 05-24-2012 |
Patent application number | Description | Published |
20110060738 | MEDIA ITEM CLUSTERING BASED ON SIMILARITY DATA - Methods and arrangements for facilitating generation of media mixes for a program participant based at least in part on media library inventory information provided by a number of program participants. Those individuals that decide to be program participants are interested in organizing, maintaining and playing their music, based at least in part, on data derived from a population of other participants in the program. A program participant must send, and the system, receive, data representative of that program participant's media inventory. The system or program determines a relative similarity of each item from the collection of program participants as compared to each other item and from the similarity information clusters of similar items are identified. The clusters can be used to identify clusters of similar items in an individual program participant's media library and therefrom mixes of similar media items can be created. | 03-10-2011 |
20110250909 | REGISTERING CLIENT COMPUTING DEVICES FOR ONLINE COMMUNICATION SESSIONS - Registering a client computing device for online communication sessions. A registration server receives a message that has a push token that is unique to the client computing device and a phone number of the client computing device from an SMS (Short Message Service) transit device, which received an SMS message having the push token from the client computing device and determined the phone number of the client computing device from that SMS message. The registration server associates the push token and the phone number and stores it in a registration data store, which is used for inviting users for online communication sessions. | 10-13-2011 |
20110252079 | Apparatus and Method For Inviting Users To Online Sessions - An apparatus, method, and machine-readable medium are described for establishing peer-to-peer (“P2P”) communication channels. In particular, in one embodiment, an invitation service performs a series of transactions to enable P2P communication between two or more mobile data processing devices. Prior to attempting to establish a P2P network communication channel, the invitation service may first collect network information for each of the mobile devices and use the network information to determine if a direct P2P network communication channel is feasible. If a direct connection is feasible, then the invitation service provides for direct P2P communication, pushing the necessary network information to each of the mobile devices. If, however, a direct connection is infeasible or if a direct connection is attempted and fails, then the invitation service may identify network information associated with a relay service. The network information may then be used by any pair of mobile devices to establish a connection through the relay service. In addition, in one embodiment, the invitation service can perform its functions without maintaining any per-connection state information for any of the mobile devices. | 10-13-2011 |
20110252146 | ESTABLISHING ONLINE COMMUNICATION SESSIONS BETWEEN CLIENT COMPUTING DEVICES - A method and apparatus for assisting in establishing an online communication session between client computing devices. An online communication session invite request message is received from an initiating client computing device, the message includes connection data of the initiating computing device and an online communication session endpoint identifier for an intended recipient. A set of one or more push tokens that are associated with the identifier is determined, where each of the push tokens identifies a client computing device. An online communication session invite message that includes the connection data of the initiating client computing device is transmitted to a set of intended recipient client computing devices that correspond with the set of push tokens. An invite accepted message is received from at least one of the set of intended recipient client computing devices that includes connection data of that computing device. An invite accepted message is transmitted to the initiating computing device that includes the connection data of each accepting computing device to allow the initiating computing device and each accepting computing device to establish a direct peer-to-peer online communication session. | 10-13-2011 |
20120011189 | Apparatus and Method For Matching Users For Online Sessions - An apparatus, method, and machine-readable medium are described for establishing peer-to-peer (“P2P”) communication channels. In particular, in one embodiment, a matchmaker service performs a series of operations to service match requests received from a group of mobile devices. In one embodiment, the matchmaker service groups the match requests into matchable sets based on the application for which the requests are received and one or more variables associated with the application. Match requests within each match set can then be matched based on variables such as the NAT type, connection type and language associated with each of the mobile devices. Other variables such as geographical location, experience level, and age of the match requests may also be used to render match decisions. | 01-12-2012 |
20120117250 | MULTIPLE CLIENT COMPUTING DEVICE INVITATIONS FOR ONLINE COMMUNICATION SESSIONS - An online communication session invitation request message for an online communication session is received from an initiating client computing device. The invitation request message includes connection data of the initiating client computing device and an online communication session endpoint identifier of an intended participant of the online communication session. The session endpoint identifier is associated with a plurality of push tokens that correspond to a plurality of recipient client computing devices respectively. An invitation request message is sent in the form of a push notification message to each of the plurality of recipient client computing devices using the corresponding push tokens. Each invitation request message includes the connection data of the initiating client computing device. | 05-10-2012 |
20120185542 | REGISTERING EMAIL ADDRESSES FOR ONLINE COMMUNICATION SESSIONS - A client computing device registers an email address as an identifier for online communication sessions. An email validation request message is received from the client computing device to validate an email address that includes the email address and an online communication session profile identifier that identifies an online communication session profile of a user of the client computing device. Responsive to determining that the email address has been validated, an email validated success message is sent to the client computing device. An activated email address request message is received from the client computing device that includes the email address and the online communication session profile identifier. The email address is then activated as an identifier associated with the online communication session profile to be used for online communication sessions. | 07-19-2012 |
20120233167 | MEDIA ITEM CLUSTERING BASED ON SIMILARITY DATA - Methods and arrangements for facilitating generation of media mixes for a program participant based at least in part on media library inventory information provided by a number of program participants. Those individuals that decide to be program participants are interested in organizing, maintaining and playing their music, based at least in part, on data derived from a population of other participants in the program. A program participant must send, and the system, receive, data representative of that program participant's media inventory. The system or program determines a relative similarity of each item from the collection of program participants as compared to each other item and from the similarity information clusters of similar items are identified. The clusters can be used to identify clusters of similar items in an individual program participant's media library and therefrom mixes of similar media items can be created. | 09-13-2012 |
20120246301 | APPARATUS AND METHOD FOR MANAGING PEER-TO-PEER CONNECTIONS BETWEEN DIFFERENT SERVICE PROVIDERS - In one embodiment of the invention, service providers generate bloom filters with the user ID codes of registered users and exchange the bloom filters with one another. In response to a request to locate a first user, a first service provider will query its own registration database to determine if the first user is registered with the first service provider. If the first user is not registered with the first service provider, then the first service provider will query its bloom filters to identify other service providers with which the first user may be registered. A positive response from a bloom filter indicates that the first user may or may not be registered with the service provider associated with that bloom filter, and a negative response indicates with certainty that the first user is not registered with the service provider associated with that bloom filter. | 09-27-2012 |
20120307655 | SYSTEM AND METHOD FOR TWO WAY PUSH NOTIFICATIONS - A system and method are described for establishing two-way push communication between a provider and a mobile device. Providers (like mobile devices) register to listen for push notifications from a specified set of users. The presence of the provider is then continually monitored to determine whether the provider is currently listening over a pre-specified port. If so, in response to receiving a push notification for the first provider from the set of one or more users, a current network location over which the provider is listening for push notifications is identified and the push notification is forwarded to the first provider. | 12-06-2012 |
20120307656 | SYSTEM AND METHOD FOR DYNAMIC ROUTING FOR PUSH NOTIFICATIONS - A system and method are described for dynamically routing push notifications to users over the most efficient network path. For example, in one embodiment, presence information associated with a device of a user is monitored. The presence information indicates whether the first device is currently connected to a wireless network and a current network location of the device. The channel quality for packets transmitted between the first device and a first gateway and between the first device and a second gateway is also monitored and is used to select between the first and second gateways when transmitting push notifications. | 12-06-2012 |
20120311329 | SYSTEM AND METHOD FOR SECURE INSTANT MESSAGING - A system and method for secure instant messaging are described. For example, in one embodiment, a first user identifies a second user for an instant messaging session with the ID code of the second user. The first user is provided with network information for the second user and a public key associated with the second user. The first user encrypts an instant message using the public key of the second user and a private key. In one embodiment, the first user encrypts the content of the instant message (e.g., any text and/or attachments) using the public key of the second user and signs the content using the private key of the first user. The encrypted message is transmitted from the first user to the second user. The second user decrypts the instant message using the second user's private key and verifies the signature with the first user's public key. | 12-06-2012 |
20120311686 | SYSTEM AND METHOD FOR SECURE IDENTITY SERVICE - A system and method for securely processing identity information. For example, in one embodiment of the invention, a first user is registered on an identity service with one or more identification (ID) codes and a token. In response to a query from a second user to connect with the first user, a query signature is generated using the one or more ID codes and token of the first and second users, and a timestamp. The query signature is usable by network services to authenticate communication between the first and second users on the network over a specified period of time. In another embodiment, user ID codes and tokens are cached on mobile devices and/or a system cache to improve performance. The validity of the cached data is determined by calculating a fingerprint which, in one embodiment, is a hash of the ID code, token and a timestamp. | 12-06-2012 |
20130110938 | APPARATUS AND METHOD FOR MATCHING USERS FOR ONLINE SESSIONS | 05-02-2013 |
20130227019 | APPARATUS AND METHOD FOR INVITING USERS TO ONLINE SESSIONS - An apparatus, method, and machine-readable medium are described for establishing peer-to-peer (“P2P”) communication channels. In particular, in one embodiment, an invitation service performs a series of transactions to enable P2P communication between two or more mobile data processing devices. Prior to attempting to establish a P2P network communication channel, the invitation service may first collect network information for each of the mobile devices and use the network information to determine if a direct P2P network communication channel is feasible. If a direct connection is feasible, then the invitation service provides for direct P2P communication, pushing the necessary network information to each of the mobile devices. If, however, a direct connection is infeasible or if a direct connection is attempted and fails, then the invitation service may identify network information associated with a relay service. The network information may then be used by any pair of mobile devices to establish a connection through the relay service. In addition, in one embodiment, the invitation service can perform its functions without maintaining any per-connection state information for any of the mobile devices. | 08-29-2013 |
20130231146 | REGISTERING CLIENT COMPUTING DEVICES FOR ONLINE COMMUNICATION SESSIONS - Registering a client computing device for online communication sessions. A registration server receives a message that has a push token that is unique to the client computing device and a phone number of the client computing device from an SMS (Short Message Service) transit device, which received an SMS message having the push token from the client computing device and determined the phone number of the client computing device from that SMS message. The registration server associates the push token and the phone number and stores it in a registration data store, which is used for inviting users for online communication sessions. | 09-05-2013 |
20130244614 | EMBODIMENTS OF A SYSTEM AND METHOD FOR SECURELY MANAGING MULTIPLE USER HANDLES ACROSS MULTIPLE DATA PROCESSING DEVICES - A system and method for are described for securely linking a phone number and user identification code in a directory database. A computer-implemented method comprising: receiving a first request from a first user device to register with a first service, the request identifying a phone number of the user device and including a fingerprint code uniquely identifying the first user device; registering the phone number in a directory service; receiving a second request from the first user device to register with a second service, the request including a user identification code which is not a phone number and the fingerprint code; registering the user identification code in the directory service; detecting that the first request and second request are from the same mobile device using the fingerprint code; and responsively linking the phone number and the user identification code in the directory database. | 09-19-2013 |
20130332607 | Synchronizing Handles For User Accounts Across Multiple Electronic Devices - The disclosed embodiments provide a system that manages access to a user account from an electronic device. The system includes an identity service that provides a device token for the electronic device and a set of handles associated with the user account to the electronic device. Next, the identity service receives, from the electronic device, a handle registration containing one or more selected handles from the set of handles. Finally, the identity service transmits an identity certificate comprising an association between the selected handles and the electronic device to the electronic device, wherein the identity certificate and the association are used to route data associated with the selected handles to and from the electronic device. | 12-12-2013 |
20140362768 | Non-Waking Push Notifications - In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience. | 12-11-2014 |
20140364104 | Push Notification Initiated Background Updates - In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience. | 12-11-2014 |
20140365569 | MANAGING NOTIFICATIONS ACROSS MULTIPLE DEVICES - Modifying a notification on one client device can trigger the generation and transmission of a silent notification to another client device that is associated with the same user account. The silent notification can include instructions to query for and modify a similar notification, if present, on the other client device. Silent notifications that are undeliverable can be stored in offline storage and delivery can be reattempted at a later point in time. | 12-11-2014 |
20150074407 | FEDERATED AUTHENTICATION OF CLIENT COMPUTERS IN NETWORKED DATA COMMUNICATIONS SERVICES CALLABLE BY APPLICATIONS - A data processing method providing improved and efficient authentication of client computers by server computers, the method comprising: using authentication logic of a server computer, establishing a secure socket connection with a client computer; receiving, from the client computer, a request to use a communications service that is implemented at the server computer, and in response to the request, determining that the client computer is unauthenticated; providing a nonce value to the client computer; receiving from the client computer an encrypted identity token that includes the nonce and a user identifier, wherein the identity token has been encrypted using a provider computer and an encryption key of the provider computer, wherein the encryption key is known at the server computer; validating the identity token and obtaining the user identifier therein; creating and storing a session token that is uniquely associated with the client computer and that includes a session identifier, the user identifier, and a binding to the secure socket connection. | 03-12-2015 |
20150180822 | REGISTERING CLIENT COMPUTING DEVICES FOR ONLINE COMMUNICATION SESSIONS - Registering a client computing device for online communication sessions. A registration server receives a message that has a push token that is unique to the client computing device and a phone number of the client computing device from an SMS (Short Message Service) transit device, which received an SMS message having the push token from the client computing device and determined the phone number of the client computing device from that SMS message. The registration server associates the push token and the phone number and stores it in a registration data store, which is used for inviting users for online communication sessions. | 06-25-2015 |