Patent application number | Description | Published |
20130297493 | METHOD FOR ENABLING GIFT PREPAY - A variation of the invention is a method that: based on an action of a recipient stored in a social networking system, identifies recipient interest in a product; based on an association between the recipient and a sender stored in the social networking system, prompts the sender to supply a fund to be applied to a purchase of the product by the recipient; requests a financial account identifier from the recipient; identifies recipient initiation of a purchase of the product from the merchant based on a financial account identifier collected, by the merchant, from the recipient; adjusts a purchase price of the product for the recipient, prior to completion of purchase, to reflect the fund supplied by the sender; generates a notification indicating purchase of the product by the recipient; and initiates transfer of the fund to the merchant in response to recipient purchase of the product. | 11-07-2013 |
20140278896 | METHODS FOR CALCULATING ADVERTISEMENT EFFECTIVENESS - One variation of a method for calculating advertisement effectiveness includes: posting an advertisement for a product to a social feed within a social networking system; tracking a view of the advertisement by a user; determining a proximity of the user to a store of a merchant; in accordance with a privacy setting of the user, selecting personal data of the user from data stored in the social networking system, the personal data including an identity of the user and an interest of the user; in response to the determined proximity of the user to the store, transmitting the selected personal data to the store; and, in response to a transaction between the user and the store, assessing an effectiveness of the advertisement according to a determined correlation between the transaction and the view of the advertisement by the user. | 09-18-2014 |
Patent application number | Description | Published |
20130171930 | ULTRASONIC NEAR-FIELD COMMUNICATION - Systems and methods for near-field communications with a mobile device are disclosed. In one embodiment, a computer-implemented method for near-field communication may comprise: detecting, by a source device located at a point-of-sale, the proximity of a receiving device; encoding purchase data on an audio signal with one or more ultrasonic frequencies; and transmitting the encoded purchase data to the receiving device, wherein the encoded purchase data is transmitted using a speaker of the source device. | 07-04-2013 |
20140040014 | TRANSACTION DATA CAPTURE SYSTEM FOR A POINT OF SALE SYSTEM - A method of operation of a transaction collection system includes: initializing a sniff daemon on the POS terminal; determining a sales transaction on the POS terminal; recording a transaction document of the sales transaction on a memory of the POS terminal; collecting the transaction document from the memory with the sniff daemon; and providing the transaction document for interpretation on an external system. | 02-06-2014 |
20140189530 | IMPLICIT SOCIAL GRAPH CONNECTIONS - A method includes: determining a first user interaction on a social network system; identifying a social network object in the social network system associated with the first user interaction by traversing a social graph of the social network system; identifying a user account based on the first user interaction; generating an implicit social graph connection between the user account and the social network object; and selecting a content entry for displaying to a user device signed-in under the user account or a friend account based on the implicit social graph connection, the friend account socially connected to the user account via the social graph of the social network system. | 07-03-2014 |
20140344165 | ULTRASONIC NEAR-FIELD COMMUNICATION - Systems and methods for near-field communications with a mobile device are disclosed. In one embodiment, a computer-implemented method for near-field communication may comprise: detecting, by a source device located at a point-of-sale, the proximity of a receiving device; encoding purchase data on an audio signal with one or more ultrasonic frequencies; and transmitting the encoded purchase data to the receiving device, wherein the encoded purchase data is transmitted using a speaker of the source device. | 11-20-2014 |
20150106192 | IDENTIFYING POSTS IN A SOCIAL NETWORKING SYSTEM FOR PRESENTATION TO ONE OR MORE USER DEMOGRAPHIC GROUPS - To promote an object maintained by a social networking system, an advertiser identifies the object to the social networking system. Based on the user interaction with one or more posts associated with the object, the social networking system selects one or more candidate posts from the one or more posts. Promotion efficacies of each candidate post for a group of users having one or more common demographic characteristics are determined and a candidate post is selected based at least in part on the promotion efficacies. The selected candidate post may be identified to the advertiser or presented to additional users having the common demographic characteristic by the social networking system. | 04-16-2015 |
Patent application number | Description | Published |
20110099294 | DYNAMICALLY REHOSTING WEB CONTENT - Dynamically rehosting at least one or more elements of a first resource originally hosted at an origin server. A dynamic web content transformation server receives a first HTTP request from an Internet client for the first resource that includes a value in a host header field that refers to the dynamic web content transformation server. The content transformation server transforms the first HTTP request including changing the value in the host header field to refer to the origin server, and transmits the transformed HTTP request to the origin server. The content transformation server receives an HTTP response from the origin server that includes the first resource that includes a client-side script that, when executed by the Internet client, makes a second HTTP request for a second resource hosted at the origin server. The content transformation server automatically transforms the HTTP response such that the client-side script, when executed by the Internet client, makes the second HTTP request for the second resource at the dynamic web content transformation server, and the content transformation server transmits the transformed HTTP response to the Internet client. | 04-28-2011 |
20110099467 | CONFIGURABLE AND DYNAMIC TRANSFORMATION OF WEB CONTENT - Dynamically transforming web content is described. An HTTP request is received from an Internet client. The web resource identified in the HTTP request is accessed. The content of the web resource is analyzed. A set of transformation instructions are applied on a set of identified portions of the content of the web resource. Each applied transformation instruction includes logic to locate and manipulate at least an identified portion of the content, and at least one of the applied transformation instructions is a client-side script transformation instruction that performs one or more of: modify a client-side script included in the content, remove a client-side script included in the content, and add a client-side script to the content. An HTTP response is rendered that includes the results of the applied transformation instructions and further includes those portions of the content that were not manipulated by a transformation instruction. The response is then transmitted to the Internet client. | 04-28-2011 |
20130232234 | DYNAMICALLY REHOSTING WEB CONTENT - Dynamically rehosting at least one or more elements of a first resource originally hosted at an origin server. A dynamic web content transformation server receives a first HTTP request from an Internet client for the first resource that includes a value in a host header field that refers to the dynamic web content transformation server. The content transformation server transforms the first HTTP request including changing the value in the host header field to refer to the origin server, and transmits the transformed HTTP request to the origin server. The content transformation server receives an HTTP response from the origin server that includes the first resource that includes a client-side script that, when executed by the Internet client, makes a second HTTP request for a second resource hosted at the origin server. The content transformation server automatically transforms the HTTP response such that the client-side script, when executed by the Internet client, makes the second HTTP request for the second resource at the dynamic web content transformation server, and the content transformation server transmits the transformed HTTP response to the Internet client. | 09-05-2013 |
20140149883 | METHOD AND SYSTEM FOR COMPUTER-AIDED CONSUMPTION OF INFORMATION FROM APPLICATION DATA FILES - The present invention provides a system and method for collecting and aggregating user-generated data based on user provided parameters and measures of relevance of underlying content. A user's data is combined with already existing collective data to generate relevant mark-ups for a document or other consumable data file, such as audio or video. The marked-up version of the document or data file is then displayed to users to, inter alia, help increase efficiency and assist in comprehension. | 05-29-2014 |
20140274244 | ENHANCING TECHNIQUES AND SYSTEMS FOR LOGICAL GAMES, ACTIVITIES AND PUZZLES - The present invention pertains to a class of games and activities of skill and logic, particularly to puzzles based on reason and logic. Disclosed are a method and a system for comparing solutions to the puzzles based on the paths to solution and for completion of the activities based on the order of carrying out the steps of the activity. A number of applications of the method are disclosed for development of further puzzles and activities from the initial puzzle or activity, as well as for other enriching experiences and expressions, particularly the method of providing a priori or real time hints to a participant to solve the puzzle or advance in the activity. | 09-18-2014 |
Patent application number | Description | Published |
20140283033 | SYSTEMS AND METHODS FOR TOKENIZING USER-GENERATED CONTENT TO ENABLE THE PREVENTION OF ATTACKS - The present invention relates to systems and methods for the tokenization of user-generated content in order to prevent attacks on the user-generated content. The systems and methods initially pre-process the user-generated content string utilizing a secondary input of target language. Pre-processing may also include initialization of finite state machines, token markers and string buffers (text, HTML tag name, HTML attribute name, HTML attribute value, CSS selector, CSS property name, and CSS property value). The user-generated content string is scanned by rune, and the system sends each rune to a specific buffer based upon signaling by individual finite state machine states. Buffers are then converted to token stream nodes to be inserted into the token stream. The tokens represent a string of characters and are symbolically categorized according to activated finite state machine states. | 09-18-2014 |
20140283139 | SYSTEMS AND METHODS FOR PARSING USER-GENERATED CONTENT TO PREVENT ATTACKS - The present invention relates to systems and methods for parsing of a token stream for user generated content in order to prevent attacks on the user generated content. The systems and methods include a database which stores one or more whitelists, and a parser. The parser removes tokens from the token stream by comparing the tokens against the whitelist. Next, the parser validates CSS property values, encodes data within attribute values and text nodes, reconciles closing HTML tags, and coerces media tags into safe variants. The tokens removed may be any of HTML tags, HTML attributes, HTML protocols, CSS selectors and CSS properties. | 09-18-2014 |
20150205951 | SYSTEMS AND METHODS FOR SQL QUERY CONSTRAINT SOLVING - The present invention relates to systems and methods for analyzing SQL queries for constraint violations, which may indicate injection attacks. The systems and methods tokenize a SQL query to generate a token stream. Next, lexical nodes are generated by iterating over the token stream. Then, a parse tree can be constructed by iterating over the lexical nodes. The parse tree may be compared to a SQL schema and access configuration for a database in order to analyze the SQL query for constraint violations, including determining the number of queries in the parse tree, identifying invalid fields and table access, identifying invalid field type comparisons and pattern matches, and identifying early statement termination. | 07-23-2015 |
20150207898 | SYSTEMS AND METHODS FOR STATISTICAL CACHING - The present invention relates to systems and methods for statistical caching. Inputs are captured via an appropriate network protocol. The input includes statistical data and a corresponding cache key. The values for each cache key within a cache are compacted using the input. The compacting involves determining if the corresponding cache key is already set within the cache, and if the cache key is present, aggregating the statistical data with the value stored within the cache to generate an updated value. The updated cache may be periodically synchronized with a final data store. Additionally, each operation performed by the statistical cache may be recorded in a transaction log for fault tolerance. | 07-23-2015 |
Patent application number | Description | Published |
20140269407 | Technique to Minimize Traffic Loss on a Router Reload/Restart - A link state information correction scheme is implemented by the present disclosure. In one embodiment, the correction scheme is implemented by a reload logic module that cooperates with link state protocol logic configured on a reload routing element (or routing element that has reloaded or hard restarted). The reload logic module is configured to receive a database descriptor message at a reload routing element, where the database descriptor message is received from a neighbor routing element during an adjacency formation. The reload logic module is also configured to determine whether the database descriptor message identifies a stale version of a link state advertisement (LSA), where the LSA is self-originated by the reload routing element. The reload logic module is also configured to generate a new version of the LSA during the adjacency formation. | 09-18-2014 |
20150092609 | METHOD AND SYSTEM TO CALCULATE MULTIPLE SHORTEST PATH FIRST TREES - An example method is provided in accordance with one embodiment and includes identifying distances for a sub-tree of a leaf node of a plurality of leaf nodes in a network. The method can also include applying the distances for the sub-tree of the leaf node to a plurality of root nodes connected to the leaf node. Additionally, the method can include establishing a plurality of shortest path distances for the plurality of root nodes using the distances for the sub-tree. | 04-02-2015 |
20150213079 | Systems and Methods for Verifiable, Private, and Secure Omic Analysis - Systems and methods for verifiable, private and secure omic analysis are provided. Secure multiparty computation techniques can be utilized to enable two parties to perform an omic transaction, such as determining genetic compatibility with one another, by jointly computing a result without either party disclosing their genetic information to the other. Privacy-preserving techniques to ensure authenticity of each party's omic data and metadata are also provided. Personalized matching scores can be computed, in which each party's score is weighted to reflect user preferences associated with the matching analysis. | 07-30-2015 |
Patent application number | Description | Published |
20090318373 | Receptor-type kinase modulators and methods of use - The present invention provides compounds for modulating receptor kinase activity, particularly ephrin and EGFR, and methods of treating diseases mediated by receptor kinase activity utilizing the compounds and pharmaceutical compositions thereof. Diseases mediated by receptor kinase activity include, but are not limited to, diseases characterized in part by abnormal levels of cell proliferation (i.e. tumor growth), programmed cell death (apoptosis), cell migration and invasion and angiogenesis associated with tumor growth. Compounds of the invention include “spectrum selective” kinase modulators, compounds that inhibit, regulate and/or modulate signal transduction across subfamilies of receptor-type tyrosine kinases, including ephrin and EGFR. | 12-24-2009 |
20140155418 | Receptor-Type Kinase Modulators and Methods of Use - The present invention provides compounds for modulating receptor kinase activity, particularly ephrin and EGFR, and methods of treating diseases mediated by receptor kinase activity utilizing the compounds and pharmaceutical compositions thereof. Diseases mediated by receptor kinase activity include, but are not limited to, diseases characterized in part by abnormal levels of cell proliferation (i.e. tumor growth), programmed cell death (apoptosis), cell migration and invasion and angiogenesis associated with tumor growth. Compounds of the invention include “spectrum selective” kinase modulators, compounds that inhibit, regulate and/or modulate signal transduction across subfamilies of receptor-type tyrosine kinases, including ephrin and EGFR. | 06-05-2014 |
Patent application number | Description | Published |
20090156576 | Azetidines as MEK Inhibitors for the Treatment of Proliferative Diseases - Disclosed are compounds of Formula (I) and pharmaceutically acceptable salts and solvates thereof. Such compounds are MEK inhibitors and are useful in the treatment of proliferative diseases, such as cancer. Also disclosed are pharmaceutical compositions containing such compounds as well as methods of using the compounds and compositions of the invention in the treatment of cancer. | 06-18-2009 |
20090163471 | Tropane compounds - A compound according to Formula I or II: | 06-25-2009 |
20090215803 | Pyrimidinones as Casein Kinase II (CK2) Modulators - A compound having Formula (I) or a pharmaceutically acceptable salt thereof, wherein X, R | 08-27-2009 |
20100249096 | Azetidines as MEK Inhibitors for the Treatment of Proliferative Diseases - Disclosed are compounds of Formula (I) and pharmaceutically acceptable salts and solvates thereof. Such compounds are MEK inhibitors and are useful in the treatment of proliferative diseases, such as cancer. Also disclosed are pharmaceutical compositions containing such compounds as well as methods of using the compounds and compositions of the invention in the treatment of cancer. | 09-30-2010 |
20100298290 | Benzoxazepines as Inhibitors of PI3K/mTOR and Methods of Their Use and Manufacture - The invention is directed to Compounds of Formula I: | 11-25-2010 |
20100305093 | Inhibitors of mTOR and Methods of Making and Using - The invention is directed to Compounds of Formula I: | 12-02-2010 |
20110071145 | Raf Modulators And Methods Of Use - The present invention relates to compounds of the Formula I, wherein G, A, X1, X2, X3, Z, E, Y, and X are defined herein. The compounds modulate protein kinase enzymatic activity to modulate cellular activities such as proliferation, differentiation, programmed cell death, migration and chemoinvasion. Compounds of the invention inhibit, regulate and/or modulate kinases, particularly Raf. Methods of using and preparing the compounds, and pharmaceutical compositions thereof, to treat kinase-dependent diseases and conditions are also an aspect of the invention. | 03-24-2011 |
20110263558 | Azetidines as MEK Inhibitors for the Treatment of Proliferative Diseases - Disclosed are compounds of Formula (I) and pharmaceutically acceptable salts and solvates thereof. Such compounds are MEK inhibitors and are useful in the treatment of proliferative diseases, such as cancer. Also disclosed are pharmaceutical compositions containing such compounds as well as methods of using the compounds and compositions of the invention in the treatment of cancer. | 10-27-2011 |
20130165440 | JAK1 Inhibitors - JAK1 inhibitors of structural formula (I), wherein Ar | 06-27-2013 |
20140275527 | Azetidines as MEK Inhibitors for the Treatment of Proliferative Diseases - Disclosed are compounds of Formula (I) and pharmaceutically acceptable salts and solvates thereof. Such compounds are MEK inhibitors and are useful in the treatment of proliferative diseases, such as cancer. Also disclosed are pharmaceutical compositions containing such compounds as well as methods of using the compounds and compositions of the invention in the treatment of cancer. | 09-18-2014 |
Patent application number | Description | Published |
20120078906 | AUTOMATED GENERATION AND DISCOVERY OF USER PROFILES - A robust knowledge-based management and sharing system organized by context for expertise-based or context-based searching and retrieval of relevant information is disclosed. The various embodiments and techniques described herein are used to organize a user's data and communications around the user's expertise or one or more contexts the user is associated with such as the user's projects, products, and customers. The organization of user data is derived from the user's competencies and interactions with others and is used to build and index user profiles in a manner that facilitates retrieval in search results for relevant search criteria. A linguistic processing pipeline is used to parse and index the user's data to generate the complete and partial profiles organized by context. Complete and partial profiles are generated, indexed, ranked, and stored by the system. Once a profile is built and indexed into the proper expertise or context(s), it can yield highly relevant results in searches for persons with a desired set of competencies, knowledge, experience, or connections in a particular context. | 03-29-2012 |
20130086079 | GRAPHICAL USER INTERFACE FOR INTERACTING WITH AUTOMATICALLY GENERATED USER PROFILES - A robust knowledge-based management and sharing system organized by context for context-based searching and retrieval of relevant information is disclosed. The described embodiments and techniques are used to automatically generate user profile data and organize it around one or more contexts associated with users such as their projects, products, or customers; or around users' expertise such as their competencies, knowledge, and experience. At least certain embodiments include a graphical user interface that is configured to display the automatically generated user profiles categorized based on a given expertise or context associated with the end-user. | 04-04-2013 |
20140059041 | Graphical User Interface for Interacting with Automatically Generated User Profiles - A robust knowledge-based management and sharing system organized by context for context-based searching and retrieval of relevant information is disclosed. The described embodiments and techniques are used to automatically generate user profile data and organize it around one or more contexts associated with users such as their projects, products, or customers; or around users' expertise such as their competencies, knowledge, and experience. At least certain embodiments include a graphical user interface that is configured to display the automatically generated user profiles categorized based on a given expertise or context associated with the end-user. | 02-27-2014 |
Patent application number | Description | Published |
20110279635 | Systems and methods for scalable composition of media streams for real-time multimedia communication - A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of participants at different geographic locations a variety of video conferencing feeds from video conference endpoints that can be either proprietary or standards-based and enable a multi-party video conferencing session among the plurality of participants by composing one composite audio and video stream for each of the participants. Each single VMR can be implemented across an infrastructure of globally distributed set of servers/media processing nodes co-located in Points of Presence (POPs) for Internet access. Each VMR also gives its users a rich set of conferencing and collaboration interaction hitherto not experienced by video conferencing users. | 11-17-2011 |
20110279636 | Systems and methods for scalable distributed global infrastructure for real-time multimedia communication - A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of participants at different geographic locations a variety of video conferencing feeds of audio and video streams from video conference endpoints. A globally distributed infrastructure that supports operations of the VMR through a plurality of MCUs (Multipoint Control Unit) built from off-the-shelf components instead of custom hardware as media processing nodes, each configured to process the plurality of audio and video streams from the plurality of video conference endpoints in real time. Each single VMR can be implemented and supported across the infrastructure of globally distributed set of servers/media processing nodes co-located in Points of Presence (POPs) for Internet access, wherein such massively distributed architecture can support thousands of simultaneously active VMRs and yet is transparent to the users of the VMRs. | 11-17-2011 |
20110279637 | Systems and methods for security and privacy controls for videoconferencing - A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of participants at different geographic locations a variety of video conferencing feeds of audio and video streams from video conference endpoints and enables a multi-party video conferencing session in real time among the plurality of participants. Each of the participants is offered a rich set of conferencing and collaboration interaction hitherto not experienced by video conferencing participants and a moderator of the video conference is further offered with in-meeting management and control over a plurality of security and privacy settings during the video conference. These interactions encompass controlling of a video conferencing session, its configuration, privacy, security, the visual layout of the participants, customization of the VMR and adaptation of the room to different vertical applications. | 11-17-2011 |
20110279638 | Systems and methods for novel interactions with participants in videoconference meetings - A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of participants at different geographic locations a variety of video conferencing feeds of audio and video streams from video conference endpoints. The approach provides various ways for the participants to the video conference to access, control, and interact with each other during the conference for a customized personal experience. A globally distributed infrastructure supports the sharing of the event among the participants at geographically distributed locations through a plurality of MCUs (Multipoint Control Unit), each configured to process the plurality of audio and video streams from the plurality of video conference endpoints in real time. | 11-17-2011 |
20110279639 | Systems and methods for real-time virtual-reality immersive multimedia communications - A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of participants at different geographic locations a variety of video conferencing feeds of audio and video streams from video conference endpoints. The approach further utilizes virtual reality and augmented-reality techniques to transform the video and audio streams from the participants in various customizable ways to achieve a rich set of user experiences. A globally distributed infrastructure supports the sharing of the event among the participants at geographically distributed locations through a plurality of MCUs (Multipoint Control Unit), each configured to process the plurality of audio and video streams from the plurality of video conference endpoints in real time. | 11-17-2011 |
20110283203 | Systems and methods for shared multimedia experiences in virtual videoconference rooms - A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of participants at different geographic locations a variety of video conferencing feeds of audio and video streams from video conference endpoints. The approach provides collaborative viewing of an event through the VMR so that the participants at geographically distributed locations are able to simultaneously participate and share the experience of the event together. An initiating participant of the event sharing is further offered with in-meeting management and control over the content to be shared at the event. A globally distributed infrastructure supports the sharing of the event among the participants at geographically distributed locations through a plurality of MCUs (Multipoint Control Unit), each configured to process the plurality of audio and video streams from the plurality of video conference endpoints in real time. | 11-17-2011 |
20140092203 | Systems and Methods for Scalable Composition of Media Streams for Real-Time Multimedia Communication - A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of participants at different geographic locations a variety of video conferencing feeds from video conference endpoints that can be either proprietary or standards-based and enable a multi-party video conferencing session among the plurality of participants by composing one composite audio and video stream for each of the participants. Each single VMR can be implemented across an infrastructure of globally distributed set of servers/media processing nodes co-located in Points of Presence (POPs) for Internet access. Each VMR also gives its users a rich set of conferencing and collaboration interaction hitherto not experienced by video conferencing users. | 04-03-2014 |
20140098180 | SYSTEMS AND METHODS FOR SCALABLE DISTRIBUTED GLOBAL INFRASTRUCTURE FOR REAL-TIME MULTIMEDIA COMMUNICATION - A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of participants at different geographic locations a variety of video conferencing feeds of audio and video streams from video conference endpoints. A globally distributed infrastructure that supports operations of the VMR through a plurality of MCUs (Multipoint Control Unit) built from off-the-shelf components instead of custom hardware as media processing nodes, each configured to process the plurality of audio and video streams from the plurality of video conference endpoints in real time. Each single VMR can be implemented and supported across the infrastructure of globally distributed set of servers/media processing nodes co-located in Points of Presence (POPs) for Internet access, wherein such massively distributed architecture can support thousands of simultaneously active VMRs and yet is transparent to the users of the VMRs. | 04-10-2014 |
Patent application number | Description | Published |
20110051625 | METHOD AND APPARATUS FOR THE DISCOVERY OF RADIO ACCESS NETWORK ELEMENTS AND EXCHANGE OF CAPABILITY AND DATA ATTRIBUTES BETWEEN THOSE ELEMENTS - The present apparatus comprises a radio access network element having at least one processor, and at least one memory operably connected to the at least one processor, whereby the radio access network element is adapted to execute instructions stored in the memory comprising discovery of at least one other element in a radio access network. The radio access element further comprises instructions for removal or addition of network elements, instructions for determining a paging area and instructions for forwarding messages from a mobile to a controller in another domain. | 03-03-2011 |
20130102253 | DISTRIBUTED CONTROL OF MEDICAL DEVICES TO AVOID EFFECTS OF INTERFERENCE - Certain aspects of the present disclosure provide techniques and apparatus for transmitting relatively more critical information between devices using a first wireless technology and transmitting relatively less critical information using a second wireless technology more susceptible to interference than the first wireless technology. One example method generally includes performing an association with a second apparatus via a first wireless technology, wherein the first wireless technology requires proximity between the first and second apparatuses; communicating first information with the second apparatus via the first wireless technology, a second wireless technology, or a combination of both the first and second wireless technologies, while the first and second apparatuses are still in proximity; and communicating second information with the second apparatus via the second wireless technology. | 04-25-2013 |
20130102963 | SECURE AUTOMATIC CONFIGURATION OF EQUIPMENT THROUGH REPLICATION - Certain aspects of the present disclosure provide techniques and apparatus for secure automatic configuration of equipment through replication. One example method generally includes receiving a request for configuration information used to configure at least a first device to be replicated in at least a second device; and communicating the configuration information to the second device, in response to the request. At least one of the first and second wireless devices may be a medical device, and/or the configuration information may include patient treatment information. In this manner, the amount of configuration data entry by a caregiver and the number of errors in this configuration data are most likely considerably reduced. Furthermore, in an emergency, a common medical treatment may be easily configured for many patients at once (i.e., the configuration information may be easily replicated from patient device to patient device). | 04-25-2013 |
20130322348 | CHANNEL SWITCHING SCHEME FOR WIRELESS COMMUNICATION - In a channel switching scheme for wireless communication, when a wireless device transmitting and/or receiving user data of a first type via a first channel needs to switch to transmitting and/or receiving user data of a second type, a second channel is established for the second type of user data. To reduce latency and interference that may otherwise be associated with such a switch, at least one parameter for communicating on the second channel is sent over the first channel. The wireless device that receives the parameters(s) may immediately commence taking action to switch to the second channel. In addition, the wireless device that sent the parameter(s) may concurrently tear down the first channel while establishing the second channel. | 12-05-2013 |
Patent application number | Description | Published |
20140337150 | AUTOMATIC RECEIPT LOGGING AND NOTIFICATIONS FOR TRANSACTIONS - Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, and include a method for managing and processing receipt information including identifying a user associated with a transaction; receiving a receipt for the transaction from a merchant system or a payment source used to fund the transaction; logging the receipt in a database associated with the user; providing an acknowledgement to an entity associated with the transaction and providing a notification of the transaction to a device associated with the user. | 11-13-2014 |
20140337216 | FRAUD PREVENTION FOR TRANSACTIONS - Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, and include a method for fraud prevention. A method includes receiving registration information for a user, including identities of the user and an authenticating device and a payment source identifier, and storing the registration information. A payment authorization request relating to a transaction purported to be by the user and including the payment source identifier is received. Using the payment source identifier, the identity of the user and the authenticating device is retrieved. A communication is provided to the user including transaction information. The message is delivered to the user at the authenticating device. The method also includes receiving (and subsequently forwarding) either a payment authorization or a payment repudiation responsive to the communication from the user by way of the authenticating device. | 11-13-2014 |
20140337218 | FRAUD PREVENTION FOR TRANSACTIONS - Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, and include a method for fraud prevention. A method includes receiving registration information for a user, including identities of the user and an authenticating device and a payment source identifier, and storing the registration information. A payment authorization request relating to a transaction purported to be by the user and including the payment source identifier is received. Using the payment source identifier, the identity of the user and the authenticating device is retrieved. A communication is provided to the user including transaction information. The message is delivered to the user at the authenticating device. The method also includes receiving (and subsequently forwarding) either a payment authorization or a payment repudiation responsive to the communication from the user by way of the authenticating device. | 11-13-2014 |
20150227929 | FRAUD PREVENTION FOR TRANSACTIONS - Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, and include a method for fraud prevention. A method includes receiving registration information for a user, including identities of the user and an authenticating device and a payment source identifier, and storing the registration information. A payment authorization request relating to a transaction purported to be by the user and including the payment source identifier is received. Using the payment source identifier, the identity of the user and the authenticating device is retrieved. A communication is provided to the user including transaction information. The message is delivered to the user at the authenticating device. The method also includes receiving (and subsequently forwarding) either a payment authorization or a payment repudiation responsive to the communication from the user by way of the authenticating device. | 08-13-2015 |
Patent application number | Description | Published |
20120319774 | MULTI-STAGE GAIN CONTROL IN RECEIVERS AND OTHER CIRCUITS - Techniques and devices are disclosed to provide multi-stage gain control in circuits or devices having two or more stages of signal amplification. A circuit with multi-stage gain control can include amplification stages coupled to receive an input signal and to produce an amplified output signal. Each amplification stage includes an amplifier that is adjustable in gain and a signal detector that is coupled to measure an output signal of the amplifier and to produce a detector signal indicative of a signal strength of the output signal of the amplifier. A gain control circuit is coupled to receive detector signals from the signal detectors in the amplification stages, respectively, and to control gains of the amplifiers of the amplification stages based on respective received detector signals, respectively. | 12-20-2012 |
20120326904 | MULTI-MODE ANALOG-TO-DIGITAL CONVERTER - Techniques and devices provide analog-to-digital conversion at two or more signal frequencies or frequency bands and can be used to construct multi-mode analog-to-digital converters in various circuits, including receivers and transceivers for wireless communications and radio broadcast environments. Adjustable analog-to-digital converters based on the described techniques can be configured to adjust circuit parameters to adapt the technical specifications of different input signals at different signal frequencies or frequency bands, such as FM, HD-radio, and DAB radio signals in radio receiver applications. | 12-27-2012 |
20130331052 | Multi-Mode Analog-to-Digital Converter - Techniques and devices provide analog-to-digital conversion at two or more signal frequencies or frequency hands and can be used to construct multi-mode analog-to-digital converters in various circuits, including receivers and transceivers for wireless communications and radio broadcast environments. Adjustable analog-to-digital converters based on the described techniques can be configured to adjust circuit parameters to adapt the technical specifications of different input signals at different signal frequencies or frequency bands, such as FM, HD-radio, and DAB radio signals in radio receiver applications. | 12-12-2013 |
Patent application number | Description | Published |
20090012807 | System and Method for Generating Graphical Advertisements Based on Text Offers - Systems and methods for generating a graphical advertisement based on a text offer are disclosed. Generally, an ad provider receives a request for a graphical ad. The ad provider sends a script to a browser comprising a call to a keyword extraction module. The ad provider receives a keyword from the keyword extraction module and determines a text offer associated with the keyword. The ad provider sends the text offer to the browser and sends an ad template for creating graphical advertisements based on the text offer to the browser. | 01-08-2009 |
20090017804 | System for Serving Targeted Advertisements Over Mobile Messaging Services - A system is described for serving targeted advertisements over mobile messaging services. The system may include a processor, a memory and an interface. The memory may store a request for an advertisement and an advertisement. The interface may be operatively connected to the memory and the processor and may communicate with mobile network operators. The mobile network operators may be capable of providing mobile services users. The processor may be operatively connected to the interface and the memory and may receive a request for an advertisement from a mobile network operator via the interface. The request for an advertisement may be related to a mobile message sent from a first user to a second user via the mobile network operator. The processor may retrieve an advertisement based on the request for an advertisement. The processor may communicate the advertisement to the mobile network operator via the interface. | 01-15-2009 |
20090017805 | System for Targeting Data to Users on Mobile Devices - A system is described for targeting data to users on mobile devices. The system may include a processor, a memory and an interface. The memory may be operatively connected to the processor and the interface and may store a request, a mobile identifier, a session identifier, a user behavior dataset and a data. The interface may be operatively connected to the memory and the processor and may communicate with the mobile device. The processor may be operatively connected to the interface and the memory and may receive a request from a user on a mobile device via the interface. The processor may extract a mobile identifier from the request and map the mobile identifier to a session identifier. The processor may use the session identifier to collect a user behavior dataset and may communicate data to the user based on the user behavior dataset via the interface. | 01-15-2009 |
20090018913 | SYSTEM FOR SERVING TARGETED ADVERTISEMENTS OVER MOBILE MESSAGING SERVICES - A system is described for serving targeted advertisements over mobile messaging services. The system may include a processor, a memory and an interface. The memory may store a content related to a mobile alert service and an advertisement. The content may be provided to a user when an alert condition is met. The interface may be operatively connected to the memory and may communicate with the user. The processor may be operatively connected to the memory and the interface. The processor may receive a request from the user, via the interface, to subscribe to the mobile alert service. The processor may detect when the alert condition is met and generate a mobile message containing the content. The processor may retrieve an advertisement related to the content and may attach the advertisement to the mobile message. The processor may provide the mobile message to the user via the interface. | 01-15-2009 |
20100106604 | Multi-Stage Bidding System for Guaranteed Advertising Contracts in a Network of Networks - This patent discloses a system to host a multi-stage competition for an online advertisement opportunity in a network of networks. The online advertisement opportunity may be received in a second network from a first network as a result of a process where a first bid from a first software agent representing a guaranteed contract may be compared with a second bid from a second software agent representing one of a nonguaranteed contract and a guaranteed contract. A third bid for the online advertisement opportunity may be received in the second network from a third software agent representing a guaranteed contract. In addition, a fourth bid for that same online advertisement opportunity may be received in the second network from a fourth software agent representing one of a nonguaranteed contract and a guaranteed contract. | 04-29-2010 |
20100106613 | Bidding System for Guaranteed Advertising Contracts in an Online Spot Market - This patent discloses a system to host a competition for an online advertisement opportunity. Notice of the online advertisement opportunity may be sent to software agents, one of which may represent a guaranteed contract. On receipt of the notice, the software agents may prepare and submit bids. An ad server may receive bids, including a first bid from a first software agent representing a guaranteed contract and a second bid from a second software agent representing a nonguaranteed contract. The ad server may screen out bids and arbitrate the remaining bids to determine a highest bidder for the online advertisement opportunity. | 04-29-2010 |
Patent application number | Description | Published |
20130079798 | DELIVERY SYSTEM ASSEMBLIES FOR IMPLANTABLE MEDICAL DEVICES - A delivery system assembly includes an elongate inner member that extends distally through a lumen of an elongate outer tube of the assembly; the outer tube is moveable relative to the inner member between first and second positions to deploy an implantable medical device that is held within the outer tube lumen. The inner member may include a flared distal end that abuts, and preferably conforms to, the proximal end of the device, when the device is held within the outer tube lumen. The assembly further includes a stability sheath that surrounds a limited length of the outer tube, in proximity to the handle, to provide an interface for both an operator, who handles the assembly, and for an introducer sheath that provides passage for the assembly into the venous system, so that movement of the outer tube is not hindered by either during device deployment. | 03-28-2013 |
20130253344 | INTRAVASCULAR IMPLANTABLE MEDICAL DEVICE INTRODUCTION - In one example, this disclosure is directed to a kit for intravascular implantation of an implantable medical device within a patient, the kit comprising an elongated outer sheath forming an inner lumen with a distal opening, the outer sheath sized to traverse a vasculature of the patient, and an elongated inner sheath with an inflatable member at its distal portion. The inflatable member is inflatable from a proximal end of the inner sheath to close-off the distal opening of the outer sheath when inflated. The inner sheath further includes a stopper proximally located relative to the inflatable member. The inflatable member is remotely controllable from a proximal end of the inner sheath to retract in a proximal direction towards the stopper. The inflatable member can be retracted in a proximal direction towards the stopper and past an implantable medical device positioned within a distal portion of the outer sheath. | 09-26-2013 |
20130253345 | IMPLANTABLE MEDICAL DEVICE DELIVERY CATHETER WITH TETHER - In one example, this disclosure is directed to a kit for intravascular implantation of an implantable medical device within a patient, the kit comprising an elongated outer sheath forming an inner lumen with a distal opening, the outer sheath sized to traverse a vasculature of the patient, and an elongated inner sheath with an enlarged distal portion, wherein the enlarged distal portion is configured to substantially fill the inner lumen and close-off the distal opening of the outer sheath. The enlarged distal portion is slidable relative to the outer sheath. The inner sheath further includes a tether with a helical element that is remotely controllable from a proximal end of the inner sheath to release the implantable medical device from a distal portion of the outer sheath. | 09-26-2013 |
20130253347 | TETHERED IMPLANTABLE MEDICAL DEVICE DEPLOYMENT - In one example, this disclosure is directed to a kit for intravascular implantation of an implantable medical device within a patient comprising an elongated outer sheath forming an inner lumen with a distal opening, the outer sheath sized to traverse a vasculature of the patient, and an elongated inner sheath with a stopper. The inner sheath further includes a tether configured to form a loop on a distal side of the stopper, the loop being configured to engage a looped element of the implantable medical device to couple the implantable medical device to the inner sheath. The stopper is slidable relative to the outer sheath. The tether is configured to release the looped element of the implantable medical device from the inner sheath by opening the tether loop when a portion of the stopper is located distally relative to the distal opening of the outer sheath. | 09-26-2013 |
Patent application number | Description | Published |
20130073743 | Services controlled session based flow interceptor - In one embodiment, a method includes receiving session information at a traffic interceptor in communication with a plurality of service devices, the session information transmitted from one of the service devices and identifying flows associated with a session and the service device associated with the session, storing the session information at the traffic interceptor, and transmitting traffic received at the traffic interceptor to the service device selected based on the session information. An apparatus is also disclosed. | 03-21-2013 |
20140237137 | SYSTEM FOR DISTRIBUTING FLOW TO DISTRIBUTED SERVICE NODES USING A UNIFIED APPLICATION IDENTIFIER - In one embodiment, a method includes obtaining a flow, identifying an application associated with the flow, and identifying a first unique application identifier (UAID) for the application. The first UAID uniquely identifies the application. The method also includes adding the first UAID to the flow, and routing the flow through a network after adding the first UAID to the flow. | 08-21-2014 |
20160080195 | METHODS AND SYSTEMS FOR SERIAL DEVICE REPLACEMENT WITHIN A BRANCH ROUTING ARCHITECTURE - A method includes deploying in series a plurality of configurable devices in a network configured to communicate with one another via a protocol for exchanging state information wherein at least one of the plurality of configurable devices is in an active state and at least one of the plurality of devices is in a standby state, detecting, by the at least one of the plurality of configurable devices in a standby state, a failure of a configurable device in an active state via a protocol and switching the at least one configurable device in a standby state to an active state. | 03-17-2016 |
20160080211 | METHODS AND SYSTEMS FOR CONTROLLER-BASED DATA FORWARDING RULES WITHOUT ROUTING PROTOCOLS - A method includes determining a plurality of network segments comprising a network, determining a manner in which the plurality of segments are connected, determining network segments and how segments are connected, at least in part, without a routing protocol, discovering a plurality of external network segments via a hub device associated with the network and utilizing the plurality of network segments comprising the network, the manner in which the plurality of segments are connected and the plurality of external network segments. | 03-17-2016 |
20160080212 | METHODS AND SYSTEMS FOR MULTI-TENANT CONTROLLER BASED MAPPING OF DEVICE IDENTITY TO NETWORK LEVEL IDENTITY - A method includes executing at a controller a horizontally scalable service Identity Definitions Manager (IDM) Service, mapping active directory (AD) domains to WAN network elements DNS ROLE and LDAP ROLE, instructing a plurality of network elements associated with a tenant to discover a plurality of AD domains and AD servers in an enterprise using the DNS ROLE, receiving from the plurality of network elements running DNS ROLE information indicative of changes to network attributes selected from the group consisting of AD domains, additions and subtractions of AD servers and changes in an IP address of AD servers and transmitting the received AD domains and AD servers to a tenant administrator and requesting credentials to communicate with added AD servers using LDAP. | 03-17-2016 |
20160080221 | METHODS AND SYSTEMS FOR CONTROLLER-BASED NETWORK TOPOLOGY IDENTIFICATION, SIMULATION AND LOAD TESTING - A method includes receiving information describing an addition of a first site comprising at least one application to an existing network wherein the information is selected from the group consisting of type of site, planned connectivity to the site and planned policies for the site and estimating an impact on the operation of the at least one application and associated network traffic using statistical analysis of monitored data collected from a second site similar to the first site. | 03-17-2016 |
20160080230 | METHODS AND SYSTEMS FOR DETECTION OF ASYMMETRIC NETWORK DATA TRAFFIC AND ASSOCIATED NETWORK DEVICES - A method includes monitoring a plurality of network devices to collect network performance data comprising data flow records of each device on the network and to create a network topology database, accessing the network topology database comprising information on an entry and exit point of each device, the manner in which the devices are connected and a plurality of data flow records on a single data flow from multiple devices on the network and utilizing the network topology database to perform an asymmetric detection algorithm to identify one or more data flows that exited a device via a first path and returned to the device via a different second path. | 03-17-2016 |
20160080250 | METHODS AND SYSTEMS FOR BUSINESS INTENT DRIVEN POLICY BASED NETWORK TRAFFIC CHARACTERIZATION, MONITORING AND CONTROL - A method includes determining a network requirement for at least one application, dynamically determining a link suitable for data transmission in accordance with a policy based at least in part on a current network condition to meet the network requirement and routing one or more application network data flows associated with the at least one application over the link. | 03-17-2016 |
20160080251 | METHODS AND SYSTEMS FOR DYNAMIC PATH SELECTION AND DATA FLOW FORWARDING - A method includes detecting a data flow and an associated originating interface on a network, determining a first link over which to forward the data flow, transmitting the data flow over the determined link, receiving a return data flow and moving a forward direction of the return data flow to a new path if the return data flow arrived via a link other than the first link, wherein all packets following a first packet on the flow are forwarded on the same path as the first packet. | 03-17-2016 |
20160080252 | METHODS AND SYSTEMS FOR APPLICATION SESSION MODELING AND PREDICTION OF GRANULAR BANDWIDTH REQUIREMENTS - A method includes receiving from a networked spoke device information describing network flows to and from an application, analyzing the information to characterize the application in at least one dimension selected from the group consisting of bi-directional bandwidth usage, network response times, application response times, a number of idle and active application sessions and a maximum number of concurrent application sessions and transmitting the dimensions to at least one networked spoke device as traffic profile information. | 03-17-2016 |
20160080268 | METHODS AND SYSTEMS FOR HUB HIGH AVAILABILITY AND NETWORK LOAD AND SCALING - A method includes receiving at a branch device an assigned first hub device and an assigned second hub device associated with a data center, establishing a VPN data tunnel to the assigned first and second hub devices, designating the first hub device as a primary device, designating the second hub device as a secondary device and switching traffic destined for the primary device to the secondary device based, at least in part, on a cost of a link. | 03-17-2016 |
20160080280 | METHODS AND SYSTEMS FOR APPLICATION PERFORMANCE PROFILES, LINK CAPACITY MEASUREMENT, TRAFFIC QUARANTINE AND PERFORMANCE CONTROLS - A method includes issuing a tuned request on a specified active link having an ingress shaper and an egress shaper to a server utilizing a link capacity to an extent in both a forward path and a return path, determining a link capacity for the active link, monitoring the active link and dropping any traffic traveling via the active link when a limit of at least one of the ingress shaper and the egress shaper is exceeded. | 03-17-2016 |
20160080285 | METHODS AND SYSTEMS FOR APPLICATION AND POLICY BASED NETWORK TRAFFIC ISOLATION AND DATA TRANSFER - A method includes allocating an identifier to each of a plurality of policies each comprising a network-isolation identifier associated with a VXWAN directive and transmitting each of the plurality of policies to one or more devices in a network. | 03-17-2016 |