Patent application number | Description | Published |
20100239053 | Apparatus and Method for Tracking Symbol Timing of OFDM Modulation in a Multi-Path Channel - Methods and Systems for tracking symbol timing of an OFDM signal are disclosed. In one embodiment, a wireless receiver includes signal tracking and timing logic to facilitate the timing of a demodulation operation such that the demodulation operation occurs on the proper symbol boundary, particularly when the OFDM signal has multipath components and the second component has greater power than the first. | 09-23-2010 |
20110051783 | Phase-Optimized Constant Envelope Transmission (POCET) Method, Apparatus And System - An apparatus and method for generating a composite signal includes electronics configured to modulate a carrier utilizing a finite set of composite signal phases to generate a composite signal, the finite set of composite signal phases being determined through an optimization process that minimizes a constant envelope for the phase modulated carrier, subject to constraints on desired signal power levels of the signals to be combined and either zero or one or more relative phase relationships between the signals. The apparatus and method can be extended to generating an optimized composite signal of different frequencies. | 03-03-2011 |
20150063427 | Phase-Optimized Constant Envelope Transmission (POCET) Method, Apparatus And System - An apparatus and method for generating a composite signal includes electronics configured to modulate a carrier utilizing a finite set of composite signal phases to generate a composite signal, the finite set of composite signal phases being determined through an optimization process that minimizes a constant envelope for the phase modulated carrier, subject to constraints on desired signal power levels of the signals to be combined and either zero or one or more relative phase relationships between the signals. The apparatus and method can be extended to generating an optimized composite signal of different frequencies. | 03-05-2015 |
20160036487 | Phase-Optimized Constant Envelope Transmission (POCET) Method, Apparatus And System - An apparatus and method for generating a composite signal includes electronics configured to modulate a carrier utilizing a finite set of composite signal phases to generate a composite signal, the finite set of composite signal phases being determined through an optimization process that minimizes a constant envelope for the phase modulated carrier, subject to constraints on desired signal power levels of the signals to be combined and either zero or one or more relative phase relationships between the signals. The apparatus and method can be extended to generating an optimized composite signal of different frequencies. | 02-04-2016 |
Patent application number | Description | Published |
20120177081 | VALIDATION OF CRYOGENICALLY TREATED ARTICLES - Embodiments validate cryogenic processing of metal-matrix validation articles according to destructive and/or non-destructive testing of witness articles. For example, validation can certify that the validation article has undergone a particular cryogenic treatment protocol, resulting in validated and/or certified enhancements in wear characteristics, resistance to corrosion, increases in electrochemical bonding of surface treatments, increases in theoretical useable lifespan, etc. According to some embodiments, processing results are validated by generating witness results from destructive and/or non-destructive testing of the witness articles subsequent to deep-cryogenic treatment. The processing (e.g., including witness results and/or analysis thereof) may then be entered into a computer-controlled, parametric analysis system that generates absolute and comparative validation and/or certification of the validation articles. | 07-12-2012 |
20120179613 | CERTIFICATION OF CRYOGENICALLY TREATED ARTICLES - Embodiments validate cryogenic processing of metal-matrix validation articles according to destructive and/or non-destructive testing of witness articles. For example, validation can certify that the validation article has undergone a particular cryogenic treatment protocol, resulting in validated and/or certified enhancements in wear characteristics, resistance to corrosion, increases in electrochemical bonding of surface treatments, increases in theoretical useable lifespan, etc. According to some embodiments, processing results are validated by generating witness results from destructive and/or non-destructive testing of the witness articles subsequent to deep-cryogenic treatment. The processing (e.g., including witness results and/or analysis thereof) may then be entered into a computer-controlled, parametric analysis system that generates absolute and comparative validation and/or certification of the validation articles. | 07-12-2012 |
Patent application number | Description | Published |
20090076983 | METHOD AND SYSTEM FOR OBJECT-ORIENTED MANAGEMENT OF MULTI-DIMENSIONAL DATA - Methods and systems for managing and analyzing multi-dimensional data are provided. Example embodiments provide a Meta-Object Data Management System “MODMS,” which enables users to arrange and to rearrange the hierarchical relationships of the data on an ad-hoc basis and allows the data to be analyzed using any set of attributes (dimensions) while the system is running. The MODMS represents heterogeneous data in a normalized (standardized) fashion using an object type management system that allows the arbitrary coercion of one type of object into another different type of object and automatically resolves attribute dependencies. In one embodiment, the MODMS comprises an object type management subsystem; a meta-object instantiation subsystem; one or more data repositories that hold, for example, the data used to populate objects and object type definitions; and an input/output interface. These components cooperate to allow the creation, management, and analysis of relationships between many different types of single and multi-dimensional data. In one embodiment, the MODMS is used to implement an enterprise portfolio management system. | 03-19-2009 |
20090077107 | METHOD AND SYSTEM FOR OBJECT-ORIENTED MANAGEMENT OF MULTI-DIMENSIONAL DATA - Methods and systems for managing and analyzing multi-dimensional data are provided. Example embodiments provide a Meta-Object Data Management System “MODMS,” which enables users to arrange and to rearrange the hierarchical relationships of the data on an ad-hoc basis and allows the data to be analyzed using any set of attributes (dimensions) while the system is running. The MODMS represents heterogeneous data in a normalized (standardized) fashion using an object type management system that allows the arbitrary coercion of one type of object into another different type of object and automatically resolves attribute dependencies. In one embodiment, the MODMS comprises an object type management subsystem; a meta-object instantiation subsystem; one or more data repositories that hold, for example, the data used to populate objects and object type definitions; and an input/output interface. These components cooperate to allow the creation, management, and analysis of relationships between many different types of single and multi-dimensional data. In one embodiment, the MODMS is used to implement an enterprise portfolio management system. | 03-19-2009 |
20110224893 | LEARNING ROAD FEATURE DELAY TIMES BASED ON AGGREGATE DRIVER BEHAVIOR - Techniques are described for generating and using information regarding road traffic in various ways, including by obtaining and analyzing road traffic information regarding actual behavior of drivers of vehicles on a network of roads. Obtained actual driver behavior information may in some situations be analyzed to determine actual delays for vehicles encountering various particular road features in the network of roads, such as for identified decision points at which drivers face choices corresponding to possible alternative routes through the network of roads (e.g., intersections, highway exits and/or entrances, etc.) and/or for other traffic flow impediments. The identified and determined information from the analysis may then be used in various manners, including in some situations to assist in determining particular recommended or preferred routes of vehicles through the network of roads based at least in part on actual driver behavior information. | 09-15-2011 |
20110224898 | LEARNING ROAD NAVIGATION PATHS BASED ON AGGREGATE DRIVER BEHAVIOR - Techniques are described for generating and using information regarding road traffic in various ways, including by obtaining and analyzing road traffic information regarding actual behavior of drivers of vehicles on a network of roads. Obtained actual driver behavior information may in some situations be analyzed to identify decision point locations at which drivers face choices corresponding to possible alternative routes through the network of roads (e.g., intersections, highway exits and/or entrances, etc.), as well as to track the actual use by drivers of particular paths between particular decision points in order to determine preferred compound links between those decision point locations. The identified and determined information from the analysis may then be used in various manners, including in some situations to assist in determining particular recommended or preferred routes of vehicles through the network of roads based at least in part on actual driver behavior information. | 09-15-2011 |
20140309914 | LEARNING ROAD NAVIGATION PATHS BASED ON AGGREGATE DRIVER BEHAVIOR - Techniques are described for generating and using information regarding road traffic in various ways, including by obtaining and analyzing road traffic information regarding actual behavior of drivers of vehicles on a network of roads. Obtained actual driver behavior information may in some situations be analyzed to identify decision point locations at which drivers face choices corresponding to possible alternative routes through the network of roads (e.g., intersections, highway exits and/or entrances, etc.), as well as to track the actual use by drivers of particular paths between particular decision points in order to determine preferred compound links between those decision point locations. The identified and determined information from the analysis may then be used in various manners, including in some situations to assist in determining particular recommended or preferred routes of vehicles through the network of roads based at least in part on actual driver behavior information. | 10-16-2014 |
Patent application number | Description | Published |
20090070865 | Security proxy service - A secure proxy service has been developed to authorize pre-defined individuals (defined as a “Security Agent”) to gain access to otherwise privileged information/premises when an individual has “gone missing”. The individual subscribing to the service defines and retains control of various factors such as: the time period to trigger the proxy service (i.e., missing for several days, missing for several weeks, etc.), the types of information to be accessed (i.e., only email, both premises and email, bank accounts, etc.), and the like. Once activated, the proxy allows the authorized individual(s) to gain access to the person's residence, computer accounts, bank accounts, etc. (via previously-executed “power of attorney” documents, when necessary) in an attempt to find clues regarding the missing person's location. | 03-12-2009 |
20090213739 | Methods for optimizing and evaluating network access techniques - Methods of evaluating access to Virtual Private Networks (VPNs) from alternate access connections and for improving access to VPNs from alternate access connections such as ISPs. The methods include downloading a set of tests through a network backbone to simulate access to the VPN from the alternate access connection and comparing the results of the test to benchmarks for the test of access to the VPN from leased lines and modems. By obtaining comparisons of the tests and the benchmarks, it is possible to determine the throughput of data through the VPN and tell the customer how its access connections are affecting, among other things, the raw data throughput. This allows the customer and/or the network service provider to adjust the access connections to improve communications with the VPN. | 08-27-2009 |
20100246397 | Network having multiple QoS levels - In a multi-QoS network, a scheduling mechanism, such as Weighted Fair Queueing, is configured to meet the multiple QoS guarantees. For each link with n classes and n fixed weights, the traffic is assigned to the various classes to meet end-to-end delay constraints. | 09-30-2010 |
Patent application number | Description | Published |
20100185382 | DISPLAYING ROAD TRAFFIC CONDITION INFORMATION AND USER CONTROLS - Techniques are described for displaying or otherwise providing information to users regarding various types of road traffic condition information in various ways. The information may be provided, for example, as part of a user interface (or “UI”), which may in some situations further include one or more types of user-selectable controls to allow a user to manipulate in various ways what road traffic condition information is displayed and/or how the information is displayed. A variety of types of road traffic condition information may be presented to users in various manners, including by presenting information on graphically displayed maps for geographic areas to indicate various information about road conditions in the geographic area. In addition, provided controls may allow users to select particular times, select particular routes, indicate to perform animation of various types of changing traffic conditions over a sequence of multiple successive times, etc. | 07-22-2010 |
20110035141 | DISPLAYING ROAD TRAFFIC CONDITION INFORMATION AND USER CONTROLS - Techniques are described for displaying or otherwise providing information to users regarding various types of road traffic condition information in various ways. The information may be provided, for example, as part of a user interface (or “UI”), which may in some situations further include one or more types of user-selectable controls to allow a user to manipulate in various ways what road traffic condition information is displayed and/or how the information is displayed. A variety of types of road traffic condition information may be presented to users in various manners, including by presenting information on graphically displayed maps for geographic areas to indicate various information about road conditions in the geographic area. In addition, provided controls may allow users to select particular times, select particular routes, indicate to perform animation of various types of changing traffic conditions over a sequence of multiple successive times, etc. | 02-10-2011 |
20110106416 | PREDICTING EXPECTED ROAD TRAFFIC CONDITIONS BASED ON HISTORICAL AND CURRENT DATA - Techniques are described for determining and using information regarding expected road traffic flow conditions information for vehicles traveling on roads. The expected road traffic flow conditions for a particular portion of a road may be generated by combining historical representative information about road traffic flow conditions for that road portion with current information about actual traffic flow on or near that road portion. The combination may, for example, provide benefits for estimating expected traffic flow conditions information for roads with structural flow obstructions that cause reduced traffic flow at certain road locations and times—for example, the expected traffic flow conditions information may be based at least in part on fitting or otherwise adapting partial actual traffic flow information about a vehicle's actual travel path to a historical travel profile for a road that includes representative traffic flow information for various combinations of road locations and time periods. | 05-05-2011 |
20110112747 | DETECTING ANOMALOUS ROAD TRAFFIC CONDITIONS - Techniques are described for automatically detecting anomalous road traffic conditions and for providing information about the detected anomalies, such as for use in facilitating travel on roads of interest. Anomalous road traffic conditions may be identified using target traffic conditions for a particular road segment at a particular selected time, such as target traffic conditions that reflect actual traffic conditions for a current or past selected time, and/or target traffic conditions that reflect predicted future traffic conditions for a future selected time. Target traffic conditions may be compared to distinct expected road traffic conditions for a road segment at a selected time, with the expected conditions reflecting road traffic conditions that are typical or normal for the road segment at the selected time. Anomalous conditions may be identified based on sufficiently large differences from the expected conditions, and information about the anomalous conditions may be provided in various ways. | 05-12-2011 |
20110173015 | DETERMINING ROAD TRAFFIC CONDITIONS USING DATA FROM MULTIPLE DATA SOURCES - Techniques are described for assessing road traffic conditions in various ways based on obtained traffic-related data, such as data samples from vehicles and other mobile data sources traveling on the roads and/or from one or more other sources (such as physical sensors near to or embedded in the roads). The road traffic conditions assessment based on obtained data samples may include various filtering and/or conditioning of the data samples, and various inferences and probabilistic determinations of traffic-related characteristics of interest from the data samples. In some situations, the inferences include repeatedly determining current traffic flow characteristics and/or predicted future traffic flow characteristics for road segments of interest during time periods of interest, such as to determine average traffic speed, traffic volume and/or occupancy, and include weighting various data samples in various ways (e.g., based on a latency of the data samples and/or a source of the data samples). | 07-14-2011 |
20120150425 | DETERMINING ROAD TRAFFIC CONDITIONS USING MULTIPLE DATA SAMPLES - Techniques are described for assessing road traffic conditions in various ways based on obtained traffic-related data, such as data samples from vehicles and other mobile data sources traveling on the roads and/or from one or more other sources (such as physical sensors near to or embedded in the roads). The road traffic conditions assessment based on obtained data samples may include various filtering and/or conditioning of the data samples, and various inferences and probabilistic determinations of traffic-related characteristics of interest from the data samples. In some situations, the inferences include repeatedly determining current traffic flow characteristics and/or predicted future traffic flow characteristics for road segments of interest during time periods of interest, such as to determine average traffic speed, traffic volume and/or occupancy, and include weighting various data samples in various ways (e.g., based on a latency of the data samples and/or a source of the data samples). | 06-14-2012 |
20130289862 | DETECTING ANOMALOUS ROAD TRAFFIC CONDITIONS - Techniques are described for assessing road traffic conditions in various ways based on obtained traffic-related data, such as data samples from vehicles and other mobile data sources traveling on the roads and/or from one or more other sources (such as physical sensors near to or embedded in the roads). The road traffic conditions assessment based on obtained data samples may include various filtering and/or conditioning of the data samples, and various inferences and probabilistic determinations of traffic-related characteristics of interest from the data samples. In some situations, the inferences include repeatedly determining current traffic flow characteristics and/or predicted future traffic flow characteristics for road segments of interest during time periods of interest, such as to determine average traffic speed, traffic volume and/or occupancy, and include weighting various data samples in various ways (e.g., based on a latency of the data samples and/or a source of the data samples). | 10-31-2013 |
20140149028 | ASSESSING ROAD TRAFFIC SPEED USING DATA FROM MULTIPLE DATA SOURCES - Techniques are described for assessing road traffic conditions in various ways based on obtained traffic-related data, such as data samples from vehicles and other mobile data sources traveling on the roads and/or from one or more other sources (such as physical sensors near to or embedded in the roads). The road traffic conditions assessment based on obtained data samples may include various filtering and/or conditioning of the data samples, and various inferences and probabilistic determinations of traffic-related characteristics of interest from the data samples. In some situations, the inferences include repeatedly determining current traffic flow characteristics and/or predicted future traffic flow characteristics for road segments of interest during time periods of interest, such as to determine average traffic speed, traffic volume and/or occupancy, and include weighting various data samples in various ways (e.g., based on a latency of the data samples and/or a source of the data samples). | 05-29-2014 |
20140149030 | Detecting Unrepresentative Road Traffic Condition Data - Techniques are described for assessing road traffic conditions in various ways based on obtained traffic-related data, such as data samples from vehicles and other mobile data sources traveling on the roads and/or from one or more other sources (such as physical sensors near to or embedded in the roads). The road traffic conditions assessment based on obtained data samples may include various filtering and/or conditioning of the data samples, and various inferences and probabilistic determinations of traffic-related characteristics of interest from the data samples. In some situations, the inferences include repeatedly determining current traffic flow characteristics and/or predicted future traffic flow characteristics for road segments of interest during time periods of interest, such as to determine average traffic speed, traffic volume and/or occupancy, and include weighting various data samples in various ways (e.g., based on a latency of the data samples and/or a source of the data samples). | 05-29-2014 |
20150094941 | FILTERING ROAD TRAFFIC DATA FROM MULTIPLE DATA SOURCES - Techniques are described for assessing road traffic conditions in various ways based on obtained traffic-related data, such as data samples from vehicles and other mobile data sources traveling on the roads and/or from one or more other sources (such as physical sensors near to or embedded in the roads). The road traffic conditions assessment based on obtained data samples may include various filtering and/or conditioning of the data samples, and various inferences and probabilistic determinations of traffic-related characteristics of interest from the data samples. In some situations, the inferences include repeatedly determining current traffic flow characteristics and/or predicted future traffic flow characteristics for road segments of interest during time periods of interest, such as to determine average traffic speed, traffic volume and/or occupancy, and include weighting various data samples in various ways (e.g., based on a latency of the data samples and/or a source of the data samples). | 04-02-2015 |
Patent application number | Description | Published |
20080313088 | IDENTIFICATION VERIFICATION SYSTEM - An identification verification system having several applications is disclosed. First, a sender sends a person an offer that requests information. The person replies to the sender, who forwards the reply to a verifying entity. If the sender is legitimate, the verifying entity forwards the reply to a UDID service, which requests authorization from the person to send the information to the sender. Second, a passenger can only access a boarding pass online after entering in a UDID and password. A code string is also generated in a document verification field that is decoded to determine information. Third, an online shopper requests verification from a merchant. The merchant then asks a credit card company for a token. If the merchant has a merchant account with the company, the merchant receives the token that generates a certificate for the shopper, who sends the certificate to the company to verify it is valid. | 12-18-2008 |
20110010553 | On-Line Membership Verification - A system and method of providing on-line verification of various credentials without requiring second site authentication utilizes protocols and cryptography to assure customers (generally referred to hereinafter as “users”) that they are dealing with a person (or organization) that can present multiple, non-repudiable proof of their identification. The system is launched directly from the user's browser such that certificate verification is performed “locally”, without needing to go out and obtain information from a second web site. The system is based upon the creation of a new MIME (i.e. Multipurpose Internet Mail Extensions) type that is employed by the user's browser and utilizes public keys associated with the credentialing organizations in combination with a public key of the verification organization. | 01-13-2011 |
20110225093 | Depository-Based Security Trading System - A system for protecting individuals (including institutions) involved in securities transactions has been created that utilizes an “independent” depository as an intermediary between a security owner and a brokerage firm. The inclusion of a depository is considered to protect the security owner from untoward actions on the part of the brokerage firm. The depository is used to “hold” the securities behalf of the owner. The security owners and brokerage firms must be registered with the depository and maintain accounts with the depository. All transactions involving the securities are still performed by the broker, but the requests are transmitted from the security owner to the depository, and the depository then relays messages regarding the transactions to the broker. Thus, the securities are only in the possession of the broker on a transaction-by-transaction basis. | 09-15-2011 |
20120081227 | METHOD AND APPARATUS FOR ASSET MANAGEMENT IN AN OPEN ENVIRONMENT - A method and apparatus for asset management in an open environment are disclosed. In one embodiment, the method correlates a person's RFID tag with an RFID of an asset and uses this information to determine whether an asset is allowed to pass an access point. | 04-05-2012 |
20120216253 | On-Line Membership Verification Utilizing An Associated Organization Certificate - A system and method is presented for providing verification of specified credentials to an independent person (a third party, that is, a user of a purported member's website) through the utilization of an “organization certificate” (OC) in combination with a “membership certificate” (MC), with the field structure of the OC limiting the type of information that can be certified by the issuing organization. The set of fields in the OC is defined as associated with a particular type of organization, where any extraneous information will not be permitted to form part of a legitimate membership certificate (hereinafter “MC”). The use of specific field descriptions thus assumes that any field appearing in an MC that does not have a corresponding tag in the OC will cause the MC to be flagged as invalid by the user's browser extension during the verification process. | 08-23-2012 |
20130006840 | Depository-Based Security Trading System - A system for protecting individuals (including institutions) involved in securities transactions has been created that utilizes an “independent” depository as an intermediary between a security owner and a brokerage firm. The inclusion of a depository is considered to protect the security owner from untoward actions on the part of the brokerage firm. The depository is used to “hold” the securities behalf of the owner. The security owners and brokerage firms must be registered with the depository and maintain accounts with the depository. All transactions involving the securities are still performed by the broker, but the requests are transmitted from the security owner to the depository, and the depository then relays messages regarding the transactions to the broker. Thus, the securities are only in the possession of the broker on a transaction-by-transaction basis. | 01-03-2013 |
20130190071 | Creation And Monitoring Of "Fair Play" Online Gaming - A “fair play” online gaming system comprises a deal server for generating an encrypted set of gaming elements (such as cards) and a play server for controlling a set of operations within a game. The play server is coupled to the deal server and receives encrypted gaming elements from the deal server in response to commands. The gaming system also includes an audit server that is coupled to the play server, where the audit server is used to send and receive information between the play server and one or more online players communicating via the internet. Importantly, the deal server and the play server cannot communicate with the internet and cannot be accessed by untoward individuals, thus providing fair play conditions for an online game. | 07-25-2013 |
20150154826 | Creation And Monitoring Of "Fair Play" Online Gaming - A “fair play” online gaming system comprises a deal server for generating an encrypted set of gaming elements (such as cards) and a play server for controlling a set of operations within a game. The play server is coupled to the deal server and receives encrypted gaming elements from the deal server in response to commands. The gaming system also includes an audit server that is coupled to the play server, where the audit server is used to send and receive information between the play server and one or more online players communicating via the internet. A transcript server may be inserted in the signal path between the audit server and the internet, and used to archive all communications. Importantly, the deal server and the play server cannot communicate with the internet and cannot be accessed by untoward individuals, thus providing fair play conditions for an online game. | 06-04-2015 |