Huang, WA
Baoquan Huang, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20090137772 | NONLINEAR OPTICAL CHROMOPHORES WITH STABILIZING SUBSTITUENT AND ELECTRO-OPTIC DEVICES - According to an embodiment, a nonlinear optical chromophore includes the structure D-π-A, wherein D is a donor, π is a π-bridge, and A is an acceptor, and wherein at least one of D, π, or A is covalently attached to a substituent group including a substituent center that is directly bonded to at least three aryl groups. | 05-28-2009 |
Brigette Huang, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20090063045 | GPS BASED FUEL EFFICIENCY OPTIMIZER - Routing options for fuel efficient use of a motor vehicle employing a GPS-based navigation system are computed based on travel information and external data. A navigation device receives route input from a driver or by recording a travelled route. External data such as traffic conditions, weather conditions, actual fuel consumption, road blockages, traffic light configurations, and the like is received from one or more networked information sources. A fuel efficient route based on the original route and the received external data is computed for the whole route or individual sections between stops on the route for display to the driver. Fuel efficient route(s) may be recomputed with up-to-date external data upon driver request, predefined intervals, or updates to external data. | 03-05-2009 |
Chang-Pin Huang, Shoreline, WA US
Patent application number | Description | Published |
---|---|---|
20130064838 | ENHANCED DEATH RECEPTOR AGONISTS - Methods and compositions for treatment of cancer in a human patient comprising administering a therapeutically effective amount of an Fc-polypeptide agonist of DR5 having high-affinity to FCGR3A. Methods of making the Fc-polypeptides are provided. | 03-14-2013 |
Chi-Chou Huang, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20130322741 | Teachable pattern scoring method - A computerized teachable pattern scoring method receives a teaching image and region pattern labels. A region segmentation is performed using the teaching image to generate regions of interest output. A feature measurement is performed using the teaching image and the regions of interest to generate region features output. A pattern score learning is performed using the region features and the region pattern labels to generate pattern score recipe output. A computerized region classification method using the region features and the pattern score recipe to generate pattern scores output. A region classification is performed using the pattern scores and region features to generate region class output. | 12-05-2013 |
Chih-Jen Huang, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20090248543 | SYSTEM AND METHOD FOR MESSAGE-BASED PURCHASING - Various embodiments of a system and method for message-based purchasing are described. The system and method for message-based purchasing may include a message-based purchase service configured to determine that a selection has been performed through a network-based interface. Such selection may be indicative of one or more items offered for sale via the network-based interface. The message-based purchase service may be configured to, in response to the selection of one or more items, send to a communication device, a message indicating a code corresponding to the selection. The message-based purchase service may receive from the communication device through a communication channel that does not include the network-based interface, a message including the code. The message-based purchase service may be configured to, in response to determining that the message received from the communication device includes the code, generate a purchase request for the one or more previously selected items. | 10-01-2009 |
20090249459 | SYSTEM AND METHOD FOR RECEIVING REQUESTS FOR TASKS FROM UNREGISTERED DEVICES - Embodiments of a system and method for receiving task requests from unregistered devices are described. Embodiments may include a communication interface service configured to receive from a communication device a message indicative of a request to perform a task. The communication interface service may determine that the communication device is not registered with an existing account that provides information for performing said task. The communication interface service may obtain identification and authentication information for an existing account via a communication channel. The existing account may be an account for that is accessible via a network-based interface. The communication channel through which the identification and authentication information is received by the communication interface service may be any communication channel that does not include the network-based interface of the existing account. Additionally, the communication interface service may use the identification and authentication information for performance of the task using the existing account. | 10-01-2009 |
20120303482 | SYSTEM AND METHOD FOR MESSAGE-BASED PURCHASING - Various embodiments of a system and method for message-based purchasing are described. The system and method for message-based purchasing may include a message-based purchase service configured to determine that a selection has been performed through a network-based interface. Such selection may be indicative of one or more items offered for sale via the network-based interface. The message-based purchase service may be configured to, in response to the selection of one or more items, send to a communication device, a message indicating a code corresponding to the selection. The message-based purchase service may receive from the communication device through a communication channel that does not include the network-based interface, a message including the code. The message-based purchase service may be configured to, in response to determining that the message received from the communication device includes the code, generate a purchase request for the one or more previously selected items. | 11-29-2012 |
20140012702 | SYSTEM AND METHOD FOR MESSAGE-BASED PURCHASING - Various embodiments of a system and method for message-based purchasing are described. The system and method for message-based purchasing may include a message-based purchase service configured to determine that a selection has been performed through a network-based interface. Such selection may be indicative of one or more items offered for sale via the network-based interface. The message-based purchase service may be configured to, in response to the selection of one or more items, send to a communication device, a message indicating a code corresponding to the selection. The message-based purchase service may receive from the communication device through a communication channel that does not include the network-based interface, a message including the code. The message-based purchase service may be configured to, in response to determining that the message received from the communication device includes the code, generate a purchase request for the one or more previously selected items. | 01-09-2014 |
20140095391 | SYSTEM AND METHOD FOR RECEIVING REQUESTS FOR TASKS FROM UNREGISTERED DEVICES - Embodiments of a system and method for receiving task requests from unregistered devices are described. Embodiments may include a communication interface service configured to receive from a communication device a message indicative of a request to perform a task. The communication interface service may determine that the communication device is not registered with an existing account that provides information for performing said task. The communication interface service may obtain identification and authentication information for an existing account via a communication channel. The existing account may be an account for that is accessible via a network-based interface. The communication channel through which the identification and authentication information is received by the communication interface service may be any communication channel that does not include the network-based interface of the existing account. Additionally, the communication interface service may use the identification and authentication information for performance of the task using the existing account. | 04-03-2014 |
Chih-Jen Huang, Issaquah, WA US
Patent application number | Description | Published |
---|---|---|
20130225287 | SYNCHRONOUS AND ASYNCHRONOUS GAME MODES - A system, machine-readable storage medium storing at least one program, and a computer-implemented method for switching between synchronous and asynchronous game modes is provided. A first game instance of a computer-implemented game of a first player and a second player is generated. The first game instance is generated in a first mode associated with the availability of the second player to play the game. First display data is provided to a client device of the first player to display the first game instance of the game in the first mode. A change in the availability of the second player is identified. A second game instance of the game is generated in a second mode associated with the change in the availability of the second player. Second display data is provided to the client device to display the second game instance of the game in the second mode. | 08-29-2013 |
20130344963 | MULTIPLAYER SYNCHRONOUS GAMING SYSTEMS AND METHODS - A system, computer-readable storage medium storing at least one program, and a computer-implemented method for providing synchronous multiplayer games are presented. To begin, an enabling request for multiplayer functionality in a multiplayer instance that includes a single player mode game is received. The single player mode game may involve a game board dedicated to a first player. Then, the single player mode game of the multiplayer instance is matched with additional multiplayer instances. Each additional multiplayer instance includes a corresponding single player mode game dedicated to a respective player. The single player mode games from the multiplayer instance and the additional multiplayer instances are then instructed to initiate gameplay at substantially the same time. Final scores from the single player mode games from the multiplayer instance and the additional multiplayer instances are collected. A game summary page is finally communicated to the first player and the respective players. | 12-26-2013 |
20140250005 | REAL-TIME MOBILE WALLET SERVER - Techniques and apparatuses for providing wallet server information to an entity using a real-time mobile wallet server (MWS) are disclosed herein. The MWS may receive a request for personal information from an entity. The MWS may then display to a user a summary of the request, a list of selections available in the wallet server that may satisfy the request, and a list of selectable response options for the user to choose to respond to the entity. In some aspects, the wallet server may store username and associated passwords, payment information, and/or contact information. In further aspects, the MWS may generate limited-use payment information associated with existing payment information. The MWS may communicate ad hoc messaging to the entity using voice-based or real-time text-based communications over an established communication link between the MWS and entity. | 09-04-2014 |
20140258103 | SYSTEM AND METHOD FOR PERSONALIZED COMMANDS - Various embodiments of a system and method for personalized commands are described. The system and method for personalized commands may include a payment service including a command management component. Such payment service may be responsive to one or more base commands. The command management component may be configured to generate a user interface for specifying personalized commands that correspond to the base commands. The command management component may be configured to generate mapping information from the information received via the user interface. The command management component may be configured to receive one or more messages that may include commands for the payment service, including personalized commands. From the personalized commands, the command management component may be configured to determine a corresponding base commands (e.g., based on the mapping information). Once the base command is determined, the payment service may perform the base command. | 09-11-2014 |
Chu-Yu Huang, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110299089 | COMPACT LIQUID CRYSTAL BASED FOURIER TRANSFORM SPECTROMETER SYSTEM - Systems and methods for a compact Fourier transform spectrometer. A cell having two transparent walls and containing a liquid crystal medium is placed in a light beam. Applying a voltage across the cell causes the liquid crystal molecules to orient at a certain angle, wherein the angle is a function of the voltage applied. The refractive index if the cell is dependent upon the orientation of the liquid crystal molecules, and from the refractive index of the cell an optical path difference between ordinary and extraordinary waves can be calculated. Accordingly, any suitable optical path difference can be achieved by varying the voltage across the cell for a Fourier transform analysis. | 12-08-2011 |
Cindy Chi-Lan Huang, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130021173 | User-Defined Pages for Aircraft - A method and apparatus for displaying aircraft information. A selection of a piece of dynamic information is detected about an aircraft on a first display on a user interface. The piece of dynamic information is used to operate the aircraft and changes during operation of the aircraft. The piece of dynamic information selected from the first display is added to a custom display on the user interface. The custom display is displayed on the user interface on a display system for the aircraft. | 01-24-2013 |
Danwen Huang, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20080275067 | Quinazolinones as Inhibitors of Human Phosphatidylinositol 3-Kinase Delta - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 11-06-2008 |
20120015964 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 01-19-2012 |
20130116266 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Compounds that inhibit P13Kδ activity, including compounds that selectively inhibit P13Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (P13Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which P13Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 05-09-2013 |
20130231356 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 09-05-2013 |
20140121223 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYLINOSITOL 3-KINASE DELTA - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 05-01-2014 |
20140121224 | QUINAZOLINONES AS INHIBITORS OF HUMAN PHOSPHATIDYOSITOL 3-KINASE DELTA - Compounds that inhibit PI3Kδ activity, including compounds that selectively inhibit PI3Kδ activity, are disclosed. Methods of inhibiting phosphatidylinositol 3-kinase delta isoform (PI3Kδ) activity, and methods of treating diseases, such as disorders of immunity and inflammation in which PI3Kδ plays a role in leukocyte function, using the compounds also are disclosed. | 05-01-2014 |
David Charles Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20110183655 | Content Sharing for Mobile Devices - Aspects of the subject matter described herein relate to content sharing for mobile devices. In aspects, images that are created using mobile devices may be automatically uploaded to one or more targets. In addition, images created on the one or more targets may be automatically downloaded to the mobile device based on one or more criteria. A service facilitates transfer of images in both directions and includes a pluggable architecture in which forwarders for new targets may be added. | 07-28-2011 |
20140329510 | CONTENT SHARING FOR MOBILE DEVICES - Aspects of the subject matter described herein relate to content sharing for mobile devices. In aspects, images that are created using mobile devices may be automatically uploaded to one or more targets. In addition, images created on the one or more targets may be automatically downloaded to the mobile device based on one or more criteria. A service facilitates transfer of images in both directions and includes a pluggable architecture in which forwarders for new targets may be added. | 11-06-2014 |
Diyun Huang, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20090137772 | NONLINEAR OPTICAL CHROMOPHORES WITH STABILIZING SUBSTITUENT AND ELECTRO-OPTIC DEVICES - According to an embodiment, a nonlinear optical chromophore includes the structure D-π-A, wherein D is a donor, π is a π-bridge, and A is an acceptor, and wherein at least one of D, π, or A is covalently attached to a substituent group including a substituent center that is directly bonded to at least three aryl groups. | 05-28-2009 |
20090231678 | ELECTRO-OPTIC CHROMOPHORE HAVING AN EDOT STRUCTURE, AND RELATED METHODS AND APPARATUSES - In various embodiments, chromophores are described that include novel election acceptors, novel electron donors, and/or novel conjugated bridges that are useful in nonlinear optical applications. In some embodiments, the present invention provides chromophore architectures wherein a chromophore contains more than one electron acceptor in electronic communication with a single election donor, and/or more than one electron donor in electronic communication with a single electron acceptor. Also described is processes for providing materials comprising the novel chromophores and polymer matrices containing the novel chromophores. Electro-optic devices described herein contain one or more of the described electron acceptors, electron donors, conjugated bridges, or chromophores. | 09-17-2009 |
20120157584 | STABILIZED ELECTRO-OPTIC MATERIALS AND ELECTRO-OPTIC DEVICES MADE THEREFROM - According to an embodiment, an electro-optic polymer comprises a host polymer and a guest nonlinear optical chromophore having the structure D-π-A, wherein: D is a donor, π is a π-bridge, and A is an acceptor; a bulky substituent group is covalently attached to at least one of D, π, or A; and the bulky substituent group has at least one non-covalent interaction with part of the host polymer that impedes chromophore depoling. | 06-21-2012 |
Dylan Hai Huang, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100293449 | METHOD FOR EXPANDING AND COLLAPSING DATA CELLS IN A SPREADSHEET REPORT - Data cells in a spreadsheet report are collapsed and expanded without disrupting other spreadsheet data. A user may want to drill down on data corresponding to a parent member of the report to display more detailed information about the parent member. Likewise, a user may want to drill up the displayed information corresponding to the parent member to hide detailed information associated with the parent member. Before expanding or collapsing a report, the spreadsheet is scanned for information to determine whether the display of other data in the spreadsheet would be disrupted by the expansion/collapse. The information may include cross-join information associated with the parent member, the number of child members associated with the parent member, the dimension of the report created by the parent member and the associated child members, and other reports that may be linked to the report that includes the parent member. | 11-18-2010 |
20130290823 | METHOD FOR EXPANDING AND COLLAPSING DATA CELLS IN A SPREADSHEET REPORT - Data cells in a spreadsheet report are collapsed and expanded without disrupting other spreadsheet data. A user may want to drill down on data corresponding to a parent member of the report to display more detailed information about the parent member. Likewise, a user may want to drill up the displayed information corresponding to the parent member to hide detailed information associated with the parent member. Before expanding or collapsing a report, the spreadsheet is scanned for information to determine whether the display of other data in the spreadsheet would be disrupted by the expansion/collapse. The information may include cross join information associated with the parent member, the number of child members associated with the parent member, the dimension of the report created by the parent member and the associated child members, and other reports that may be linked to the report that includes the parent member. | 10-31-2013 |
Edmund T.k. Huang, Naches, WA US
Patent application number | Description | Published |
---|---|---|
20090253578 | Ethylene Biosynthesis Inhibitor Compositions Suitable for Thermal Fogging Applications - The present invention generally relates to liquid compositions comprising an ethylene synthesis inhibitor for the treatment of crops suitable for thermal fogging applications. A preferred ethylene synthesis inhibitor is aminoethoxyvinylglycine hydrochloride (AVG HCl). | 10-08-2009 |
20090253579 | Methods of Applying Ethylene Biosynthesis Inhibitor Compositions by Thermal Fogging - The present invention generally relates to methods of thermal fogging ethylene synthesis inhibitor compositions for post-harvest treatment of crops. A preferred ethylene synthesis inhibitor is aminoethyoxyvinylglycine hydrochloride (AVG HCl). In a preferred embodiment, a method comprises producing a thermal fogging mist from said composition, wherein said thermal fogging mist contains particles of the ethylene synthesis inhibitor and applying an effective amount of said thermal fogging mist to said crops. | 10-08-2009 |
Flynn X. Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20080312976 | ENHANCED TRAVEL RESERVATION SYSTEM AND METHOD - An enhanced travel reservation system and method allows for contribution to reservation offer and selection of a travel reservation provider by a traveler while also allowing for negotiation to occur between the traveler and the travel reservation provider. Before a final booking both the traveler and the travel reservation provider can negotiate over unsettled issues directly with each other. In implementations, the system deducts a fee from an account of the travel reservation provider to enter a final negotiation phase. Depending upon the result of the final negotiation, the traveler will either book a reservation directly or decline. In this manner the traveler is involved with travel reservation offer definition while retaining control over the reservation process so that the traveler can avoid unsatisfactory results. | 12-18-2008 |
Heng Huang, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20090160833 | Laser Projection White Balance Tracking - The radiance of a laser diode is a function of laser diode drive current. The radiance is also a function of other factors, such as age and temperature. A laser projection device includes laser diodes to generate light in response to a commanded radiance, and also includes photodetectors to provide a measured radiance. The commanded radiance and measured radiance are compared, and drive currents for the laser diodes are adjusted to provide luminance and color balance tracking. | 06-25-2009 |
20090161707 | Method and Apparatus for Laser Diode Compensation - The luminance of a laser diode is a function of laser diode drive current. The luminance is also a function of other factors, such as age and temperature. A laser projection device includes laser diodes to generate light in response to a commanded luminance, and also includes photodiodes to provide a measured luminance. The commanded luminance and measured luminance are compared, and drive currents for the laser diodes are adjusted to compensate for changes in laser diode characteristics. | 06-25-2009 |
20110181574 | Controlled Light Source Startup in a Display - Briefly, in accordance with one or more embodiments, a display is powered on to display a projected image, and the operation of one or more display elements are ramped up until a stabilized state is reached. During said ramping up, a light source of the display is powered display at less than full power until the stabilized state is reached. While the light source is operating at less than full power, a splash screen may be displayed. After the stabilized state is reached, the light source can then be operated at or near full power. By providing a light output that is less than full power during ramp up, the display does not need to wait until the stabilized state is reached before the light source is powered on. As a result, the projector provides an output earlier in time to cue to the user that the projector is operating. | 07-28-2011 |
20110181791 | Method and Apparatus for Laser Diode Compensation - The luminance of a laser diode is a function of laser diode drive current. The luminance is also a function of other factors, such as age and temperature. A laser projection device includes laser diodes to generate light in response to a commanded luminance, and also includes photodiodes to provide a measured luminance. The commanded luminance and measured luminance are compared, and drive currents for the laser diodes are adjusted to compensate for changes in laser diode characteristics. | 07-28-2011 |
20110205498 | Laser Projection White Balance Tracking - The radiance of a laser diode is a function of laser diode drive current. The radiance is also a function of other factors, such as age and temperature. A laser projection device includes laser diodes to generate light in response to a commanded radiance, and also includes photodetectors to provide a measured radiance. The commanded radiance and measured radiance are compared, and drive currents for the laser diodes are adjusted to provide luminance and color balance tracking. | 08-25-2011 |
20150089248 | Accessory Device Power Management - Accessory device power management techniques are described in which a power exchange state for a system including a host computing device, an accessory device, and an adapter is recognized. Power exchange states may be defined according to relative states of charge (RSOC) and connection status for the system components and mapped to power management control actions. Responsive to the recognition of a current power exchange state, corresponding power management control actions may be ascertained and applied to jointly manage power for the system. For instance, the host device may draw supplemental power from a power source associated with an accessory device (e.g., a battery or power adapter) or supply power for use by the accessory device according to different states. Power exchanges may also be managed in accordance with capabilities of the accessory device identified based on authentication of the accessory device. | 03-26-2015 |
Hsien-Lin Huang, Lynnwood, WA US
Patent application number | Description | Published |
---|---|---|
20130043422 | METHODS FOR FORMING LEAD ZIRCONATE TITANATE NANOPARTICLES - Methods for forming lead zirconate titanate (PZT) nanoparticles are provided. The PZT nanoparticles are formed from a precursor solution, comprising a source of lead, a source of titanium, a source of zirconium, and a mineraliser, that undergoes a hydrothermal process. The size and morphology of the PZT nanoparticles are controlled, in part, by the heating schedule used during the hydrothermal process. | 02-21-2013 |
20130044175 | Method and System of Fabricating PZT Nanoparticle Ink Based Piezoelectric Sensor - The disclosure provides in one embodiment a method of fabricating a lead zirconate titanate (PZT) nanoparticle ink based piezoelectric sensor. The method has a step of formulating a lead zirconate titanate (PZT) nanoparticle ink. The method further has a step of depositing the PZT nanoparticle ink onto a substrate via an ink deposition process to form a PZT nanoparticle ink based piezoelectric sensor. | 02-21-2013 |
20140374642 | METHODS FOR FORMING LEAD ZIRCONATE TITANATE NANOPARTICLES - Methods for forming lead zirconate titanate (PZT) nanoparticles are provided. The PZT nanoparticles are formed from a precursor solution, comprising a source of lead, a source of titanium, a source of zirconium, and a mineraliser, that undergoes a hydro thermal process. The size and morphology of the PZT nanoparticles are controlled, in part, by the heating schedule used during the hydro thermal process. | 12-25-2014 |
Hui Huang, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20110252242 | MULTI-PHASE STORAGE VOLUME TRANSFORMATION - In accordance with one or more aspects, a storage volume is transformed into an encrypted storage volume or an unencrypted storage volume using a multi-phase process. One or more parts of the storage volume that have not yet been transformed are identified, and one or more parts of the storage volume that are allocated for use are identified. In a first phase of the multi-phase process, one or more parts of the storage volume that have not yet been transformed and that are allocated for use are transformed. In a second phase of the multi-phase process, after the first phase is finished, one or more parts of the storage volume that have not yet been transformed and are not allocated for use are transformed. | 10-13-2011 |
20120102504 | APPLICATION LIFETIME MANAGEMENT - In a computing device running multiple applications, a check is made as to whether a threshold value of multiple threshold values has been met. Each of the multiple threshold values is associated with a characteristic of one of the multiple applications or a characteristic of a resource of the computing device. If the threshold value has not been met, then the multiple applications are allowed to continue running on the computing device. However, if the threshold value has been met, then one or more of the multiple applications to shut down is selected based at least in part on the characteristic associated with the threshold value that has been met, and the selected application is shut down. | 04-26-2012 |
Jeff Huang, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100131517 | System and method for ranking and grouping results of code searches - A method of sorting search results associated with a function search performed on a source code repository comprises receiving the search results, wherein each search result is either a function definition or a function usage, grouping the search results into groups according to a grouping function, ranking the groups according to a ranking function, and displaying the grouped and ranked search results. | 05-27-2010 |
20110264673 | ESTABLISHING SEARCH RESULTS AND DEEPLINKS USING TRAILS - Search and browse trails are temporally-ordered sequences of web pages visited by a user during post-search query navigation beginning with a page associated with one of the search results. The trails can provide useful information for a number of search-related purposes. For example, these trails can be used to leverage the post-query behavior of other users to help the current user search more effectively and allow them to make more informed search interaction decisions. The trails can also be used to establish search results and refine search result rankings, select and evaluate deeplinks, and recommend multi-step trails as an alternative to or enhancement for existing search result presentation techniques. | 10-27-2011 |
20130246383 | Cursor Activity Evaluation For Search Result Enhancement - The subject disclosure is directed towards using cursor activity with respect to search result pages to enhance search engine operation. Data associated with the cursor activity may be translated into cursor events representing user interactions with a search result page. Based on the cursor events, user behavior indicia may be identified via a user intent prediction model corresponding to various search result page related user actions. The user behavior indicia and/or the user intent prediction model may be used to produce search result pages for current search queries from the user. | 09-19-2013 |
Jiayuan Huang, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20100312608 | CONTENT ADVERTISEMENTS FOR VIDEO - Described herein are techniques and components for displaying a text advertisement in an online video being viewed by a user. The advertisement is selected based on keywords associated with the online video or the user, and the selected advertisement is presented as an overlay on the rendered video over regions of frames determined to be less important in the video. To determine importance, every frame of the online video is divided into grids, and parameters of the visual data in each grid are analyzed. Based on the analysis of each grid, regions in successive frames are identified to display the selected advertisement. | 12-09-2010 |
20110191142 | USING NETWORKING SITE INTERACTIONS TO GENERATE A TARGET LIST OF POTENTIAL CONSUMERS - Embodiments of the present invention relate to systems, methods, and computer-storage media for providing a method of presenting advertisements to a target group of potential consumers generated from a group of seed consumers. In one embodiment, a target list request is received from an advertiser. A set of seed consumers associated with the advertiser is then determined. A set of potential consumers is then determined based on the set of seed consumers. Further, a subset of the set of potential consumers is determined, each potential consumer of the subset having a common characteristic. A target list of potential consumers is then generated comprising at least a portion of the subset of potential consumers. The target list of potential consumers is then provided to the advertiser. | 08-04-2011 |
20120197732 | ACTION-AWARE INTENT-BASED BEHAVIOR TARGETING - Methods and computer-storage media having computer-executable instructions embodied thereon that facilitate classifying user intent with respect to an entity using intent-strength scores. A user query indicating a particular entity is received. The user's intent with respect to the particular entity is determined by assigning an intent-strength score to the user. The user's intent-strength score is determined using intent-strength scores assigned to seed patterns identified for entities in a category, as well as the received user query. In embodiments, a user's intent-strength score may be updated based on a subsequent query, or may be changed according to a function. A list of users having particular intent-strength scores for particular entities may be also be generated. | 08-02-2012 |
20130268513 | ANNOTATIONS BASED ON HIERARCHICAL CATEGORIES AND GROUPS - Systems and methods for recommending entities to a user are presented. In at least one embodiment, a user is identified as belonging to one or more groups of users, or to a hierarchy of groups. A category of entities, preferred by at least of the hierarchy of identified groups, is identified. The category of entities preferred by the at least one identified group corresponds to the category of a user-preferred entity preferred by the user. An entity from the category of entities is selected; the selected entity is not the user-preferred entity. The selected entity is provided to the user as a recommended entity to the user. | 10-10-2013 |
20140188866 | RECOMMENDATION ENGINE BASED ON CONDITIONED PROFILES - A conditional recommendation system and methods are presented. The conditional recommendation engine (embodied as a system, a method, or computer-readable media) provides recommendations of entities to a computer user based on a conditioned user profile for the computer user. The conditioned user profile identifies user preferences in regard to dynamic, changeable conditional factors. These factors may include the time of day that a request was made, the day of week, the month of the year, the season, whether it is a holiday and which holiday, and the like. | 07-03-2014 |
Ke-Cheng Huang, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20130156309 | Raster Graphics Image Transcoding for File Size Reduction - Described is a technology by which a raster graphics image file (e.g., a PNG) containing pixels having color component data and alpha channel data (e.g., RGBA data) is transcoded into a smaller Palette Indexed format with non-noticeable and/or virtually no loss. Hextrees are used to represent the pixels of the image, such as one hextree for each subset (segment) of the image's pixels, where alpha channel data distribution may be used to determine each segment. A palette containing sets of alpha and color values is generated from the hextrees, with the transcoded image data provided by representing the pixel data as indexes to the palette. | 06-20-2013 |
20130156310 | Dynamic Image Quality Checker for use in Image Transcoding - Described is a technology by which an image is transcoded to a desired quality measure (e.g., PSNR). A quality measure of transcoded image data is checked against a desired quality measure, and if a desired quality measure is not achieved, a different quality level is iteratively provided to attempt to re-transcode the image until the desired quality measure is achieved. | 06-20-2013 |
Li-Hsin Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20110022971 | Searching and Browsing URLs and URL History - System(s) and/or method(s) (“tools”) are described that present indicia for implicitly and explicitly user-associated web pages of a network browser application. The tools can present these indicia in a single graphic user interface, in response to a user's selection of a single unified access point, or in response to a search of the browser's user-associated web pages. | 01-27-2011 |
20110113355 | SUPPRESSING DIALOG BOXES - A method for browser software with a tabbed interface to suppress, or delay, the display of a dialog box that is initiated by an inactive, or background, tab. An indication may be provided to the user that a dialog box needing user attention may be provided. When that tab becomes active, and the web page on that tab becomes visible, the dialog box is then displayed. This suppression method may be applied to a variety of application programs. | 05-12-2011 |
20110252482 | TIERED OBJECT-RELATED TRUST DECISIONS - Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A prompt is displayed to advise a user that the object has been suppressed, and to provide an opportunity to interactively accept or decline activation of an action for the object. | 10-13-2011 |
20120222118 | TIERED OBJECT-RELATED TRUST DECISIONS - Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A prompt is displayed to advise a user that the object has been suppressed, and to provide an opportunity to interactively accept or decline activation of an action for the object. | 08-30-2012 |
20130254898 | TIERED OBJECT-RELATED TRUST DECISIONS - Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A prompt is displayed to advise a user that the object has been suppressed, and to provide an opportunity to interactively accept or decline activation of an action for the object. | 09-26-2013 |
Li-Hsin Huang, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20120066666 | ADD-ON PERFORMANCE ADVISOR - Various embodiments provide an add-on advisor that is designed to assist users in managing add-ons for a browser and/or other application programs. In at least some embodiments, the add-on advisor can be implemented to detect newly installed add-ons and provide notifications to a user of the detected add-ons. The notifications regarding new add-ons can be configured with options to permit the user to enable or disable the add-ons. Add-ons that are not explicitly enabled by a user can be prevented from operating by the add-on advisor. Further, in at least some embodiments, the add-on advisor can be implemented to monitor performance impact of add-ons and provide notifications to a user when add-ons adversely affect performance. The user can then interact with the add-on advisor to improve performance by selectively enabling and disabling add-ons. | 03-15-2012 |
20120297160 | Surface Caching - Techniques for surface caching are described in which a cache for surfaces is provided to enable existing surfaces to be reused. Surfaces in the cache can be assigned to one of multiple surface lists used to service requests for surfaces. The multiple lists can include at least a main list and an auxiliary list configured to group existing surfaces according to corresponding surface constraints. When a surface is requested, the multiple lists can be searched to find an existing surface based on constraints including, for example, the type of surface and size requirements for the requested surface. If an existing surface is discovered, the existing surface can be returned to service the request. If a suitable surface is not found in the multiple lists, a new surface is created for the request and the new surface can be added to a corresponding one of the multiple surface lists. | 11-22-2012 |
20130208012 | Speculative Render Ahead and Caching in Multiple Passes - Various embodiments are directed to intelligently rendering or pre-rendering content that may likely be brought into an associated viewport during a user's interaction with the content. In at least some embodiments, the process of caching pre-rendered content is separated from a determination of which regions outside of the viewport are to be kept up to date over use and time. Further, at least some embodiments perform rendering activities in multiple passes in an effort to reduce potential delays in the user visible content reaching completion, without interfering with other work that an associated application or system performs during rendering. | 08-15-2013 |
20140375657 | Synchronization Points for State Information - Techniques for synchronization points for state information are described. In at least some embodiments, synchronization points are employed to propagate state information among different processing threads. A synchronization point, for example, can be employed to propagate state information among different independently-executing threads. Accordingly, in at least some embodiments, synchronization points serve as inter-thread communications among different independently-executing threads. | 12-25-2014 |
Lizhong Huang, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20090292545 | CREATING, MANAGING, AND PROVISIONING PACKAGES OF ONLINE APPLICATIONS - Methods and computer-readable media are provided herein for implementing custom application programming interfaces (API) for creating, managing, and provisioning packages of online applications. An offer management service API is implemented that provides methods for creating and modifying offers for packages of online applications. An offer provisioning API is implemented that provides methods enabling the provisioning of online applications for subscribers to offers. An application provider API is published and utilized to provision and maintain individual instances of online applications provided by application providers. | 11-26-2009 |
20120290627 | WRITE AGENT DELAYED WRITE TO DATA STORES - The reliable writing of data to multiple data stores using a write agent. The overall write operation is managed by a write manager that is communicatively coupled to the write agent and to a certain data store. Upon determined that multiple data stores are to be written to, the write manager first instructs the write agent to perform a delay write to other data store(s). The delay write means that the write agents waits a delay time before performing the write unless instructed in the meantime to more immediately perform the write, and if a delay passes, does not perform the write without first checking that the write has been made to the certain data store. After instructing the write agent to delay write, the write manager attempts to write to the certain data store. Upon successfully writing to the certain data store, the write manager may instruct the write agent to proceed immediately. | 11-15-2012 |
Ludan Huang, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110278541 | COLOR-SELECTIVE QUANTUM DOT PHOTODETECTORS - Photoconductive optoelectronic devices, such as photodetectors and photovoltaics, are provided. The devices are sensitized to a particular wavelength (or range of wavelengths) of electromagnetic radiation such that the devices provide increased performance efficiency (e.g., external quantum efficiency) at the wavelength. The devices include a photoconductive semiconductor layer spanning an electrode gap between two electrodes to provide a photoconductive electrical conduit. Abutting the semiconductor layer is a plurality of plasmonic nanoparticles. The improved efficiency of the devices results from wavelength-dependent plasmonic enhancement of device photosensitivity by the plasmonic nanoparticles. | 11-17-2011 |
Mark Huang, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100125553 | Delta compression after identity deduplication - Delta compression after identity deduplication is disclosed. A first data segment is determined to be identical to a first previous data segment. A second data segment, not determined to be identical to a second previous data segment, is then determined to be similar to a third previous data segment. | 05-20-2010 |
20120084333 | TRANSMITTING FILESYSTEM CHANGES OVER A NETWORK - Transmitting filesystem changes over a network is disclosed. A hash of data comprising a chunk of directory elements comprising one or more consecutive directory elements in a set of elements sorted in a canonical order is computed at a client system. One or more directory elements comprising the chunk are sent to a remote server in the event it is determined based at least in part on the computed hash that corresponding directory elements as stored on the remote server are not identical to the directory elements comprising the chunk as stored on the client system. | 04-05-2012 |
20130166862 | EFFICIENT BACKUP REPLICATION - A system for backup replication comprises a processor and a memory. The processor is configured to determine data present in a most recent backup not present in a previous backup; transmit an extent specification; and transmit data segment fingerprints of the one or more data segments. The memory is coupled to the processor and is configured to provide the processor with instructions. | 06-27-2013 |
20130232125 | STREAM LOCALITY DELTA COMPRESSION - Stream locality delta compression is disclosed. A previous stream indicated locale of data segments is selected. A first data segment is then determined to be similar to a data segment in the stream indicated locale. | 09-05-2013 |
20130268500 | REPRESENTING DE-DUPLICATED FILE DATA - Providing a subset of de-duplicated as output is disclosed. In some embodiments, the output comprises a subset of data stored in de-duplicated form in a plurality of containers each comprising a plurality of data segments comprising the data. For each container that includes one or more data segments comprising the subset, a corresponding container data is included in the output. Each container may include one or more segments not included in the subset. For each container the corresponding container data of which is included in the output, a corresponding value in a data structure comprising for each container stored on the de-duplicated storage system a data value indicating whether or not the corresponding container data has been included in the output is updated. | 10-10-2013 |
20140279958 | REPRESENTING DE-DUPLICATED FILE DATA - Providing a subset of de-duplicated as output is disclosed. In some embodiments, the output comprises a subset of data stored in de-duplicated form in a plurality of containers each comprising a plurality of data segments comprising the data. For each container that includes one or more data segments comprising the subset, a corresponding container data is included in the output. Each container may include one or more segments not included in the subset. For each container the corresponding container data of which is included in the output, a corresponding value in a data structure comprising for each container stored on the de-duplicated storage system a data value indicating whether or not the corresponding container data has been included in the output is updated. | 09-18-2014 |
20140344622 | Scalable Log Analytics - Large amounts of unstructured log data generated by software and infrastructure components of a computing system are processed and analyzed in real time to identify anomalies and potential problems within the computing system. A log analytics module reduces both the volume and level of detail of log data by first classifying log messages into message types based on their content similarity. The log analytics module may then further reduce data by grouping bursts of log messages into log events. Patterns within these log events, such as the collection and number of different message types that comprise the event, can be used to identify anomalous events. | 11-20-2014 |
20150052103 | DATA REPLICATION WITH DELTA COMPRESSION - Data replication with delta compression is disclosed. A primary system and a replica system are determined to both have an identical first data segment that is similar to a second data segment. The second data segment is encoded, wherein the encoding refers to the first data segment. | 02-19-2015 |
Ming T. Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20120144790 | PLEATABLE COMPOSITE FILTER MEDIA - A pleatable, high efficiency composite gas filtration media is provided. The media includes an essentially boron free chopped strand glass backer layer and media layer comprising a synthetic material. The composite media exhibits excellent pleatability, low boron out gassing, and low organic out gassing, with filtration performance comparable to existing commercial membrane composites. | 06-14-2012 |
Ming-Yuh Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20090119746 | GLOBAL POLICY APPARATUS AND RELATED METHODS - A method of implementing requirements applicable to systems of an enterprise includes modeling the requirements as contents of policies applicable to target domains of the enterprise. The policy contents are integrated into a policy model. The policy model is adapted to obtain representations of domain-specific requirements corresponding to target systems in the target domains. The representations are integrated with the corresponding target systems to implement the domain-specific requirements. | 05-07-2009 |
20130239171 | DISTRIBUTED SECURITY ARCHITECTURE - A distributed security architecture may include: a mobile anti-tamper hardware policy enforcement point configured to control communication behaviors of a mobile or stationary client by enforcing communication policies within a policy decision point; an anti-tamper hardware policy decision point encapsulated within the anti-tamper hardware policy enforcement point; a policy exchange channel for policy distribution modes configured to distribute and/or update communication and routing security policies to the client; a context manager configured to handle system-wide status change update signaling; and an authentication manager configured to provide clients with registration and credential/role assignments based on access policies. The distributed security architecture may be configured to provide open system interconnection layer 3.5 policy-based secure routing, and open system interconnection layer 2 policy-based mandatory access control address filtering to provide secure communication and computing for layers 4, 5, 6, and 7. | 09-12-2013 |
Qinsheng Huang, Camas, WA US
Patent application number | Description | Published |
---|---|---|
20100318435 | System of facilitating a sales transaction between a buying group and multiple sellers over and electronic network - A system to facilitate the interaction of a group of buyers and a group of sellers through a transaction network, such as the internet, is disclosed. A buyer may start a buying group or join an existing group for purchasing a product or service. During the life cycle of a buying group, buyers are encouraged to invite other buyers to join the group via email, blog, social networking websites, or other means, thereby increasing the purchasing power of that group. Once a buying group has been established, sellers can compete for the volume sale. Sellers may review the bid price submitted by other sellers and submit competing bids. Once the bid cycle closes this system will automatically match the buyers and sellers based on a variety of factors including the order each buyer entered his or her purchase intent, each buyer's maximum price, each seller's bidding price, the quantity each seller can provide, and the order of each seller's bid. At the end of the matching, one or more sellers may fulfill a single group order. | 12-16-2010 |
Rou-Peng Huang, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20080208720 | Type-driven rules for financial intellegence - Financial intelligence architecture that employs financial types that are combined with rules to build financial behavior into the product. Types have behaviors such that types can be assigned that lead to the physical creation of underlying code which embodies the behaviors. Extensibility is provided at least by type parameterization and new type creation. Because types are a design time experience, types are two-way and can be modified, even after instantiation. This allows for mixing and matching of types and underlying behavior giving the system more flexibility at design time while providing a huge simplification of all the details that actually go into such financial applications. The type library is a set of rules that produce metadata, which metadata is later processed by a separate engine to produce the physical schema. The type library defines the basic interactions, data types, and behaviors for predefined dimensions in the system. | 08-28-2008 |
Rou-Peng Huang, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20080209435 | Scalable workflow management system - A scalable workflow management system is provided that includes queues for storing work items to be processed. Work items may be placed into the queues by front-end services executing within the workflow management system. When a work item is placed on a queue, it remains on the queue until an appropriate back-end service is available to de-queue the work item, validate the de-queued work item, and process the de-queued work item. Separate queues are provided for storing normal work items, work items generated according to a time schedule, and work items generated by job launching services. The state of operation of the workflow management system may be controlled by an administrative console application. | 08-28-2008 |
20080256122 | Time intelligence for application programs - Techniques to implement time intelligence for application program are described. An apparatus may include a calendar application module. The calendar application module may be arranged to define and generate a calendar for an application program, the calendar application module to define time members for a time dimension of a multidimensional data model, assign a monotonically increasing unique identifier to each time member, and generate the calendar with time members from the time dimension using the unique identifiers. Other embodiments are described and claimed. | 10-16-2008 |
20090006409 | METADATA-BASED APPLICATION DEPLOYMENT - Computer-implemented methods, computer-readable media, and an application system are disclosed for creating and deploying metadata-generated applications. Access is provided to one or more type libraries that each include one or more defined object types configurable for use in generating the application. The defined object types include data structure types, rule types, and data types. Input is elicited from a user regarding desired content and function of the application. Based on the user input, metadata is generated to adapt the defined object types to generate the application. Metadata is generated to adapt the defined data structure types to create one or more application databases, to adapt the defined rule types to create one or more application behaviors, and to adapt the defined data types to create one or more application data types. | 01-01-2009 |
20100125471 | FINANCIAL JOURNALS IN FINANCIAL MODELS OF PERFORMANCE SERVERS - Architecture that employs a journal assignment that can be created on demand when journal is created, and operates outside the business cycle. The assignment is routed to reviewers and approvers based on predefined company policy that users define. The assignment encloses a changelist of data changes created by the journal. The changelist is used for rendition and calculation for reviewers and approvers (in addition to the journal contributor) to view/verify and modify the data as if the data is already written into the model. At the time that other users access this model, the data is not present. At the end of the successful workflow chain the changelist is written into the model. If failed, the changelist will be used as that basis for correction or the user can discard the changelist. | 05-20-2010 |
20100125578 | SCALABLE SELECTION MANAGEMENT - Architecture for handling large data selections with small and substantially constant memory footprints. The architecture facilitates the creation of sets of data objects (e.g., rows) of a data source based on selection of the data objects. The set structures can be defined according to a range (span) of data objects selected and a pattern of the objects selected. These set structures are then saved in memory, rather than the data objects, to provide optimized memory usage. In a database implementation, the solution stores the set representation (the structure) in nearly a constant amount of memory, regardless of the number of rows in the grid, and regardless of the number of rows selected. Memory usage can be proportional to the number of discontinuous spans of rows selected by the user. Structures in memory can be consolidated, replaced, or eliminated dynamically as the user changes row selections and pattern criteria. | 05-20-2010 |
Ruke Huang, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100082974 | PARALLEL DOCUMENT PROCESSING - Documents distributed in parallel are processed. One or more digital document packages are received, where each digital document package includes a content portion and an identity-verification code (IVC) verifying an identity of a source from which the digital document package is received. Each IVC may be a private-key encryption of a content-verification code hashed from the content portion of each digital document package. A master digital document package is created, which includes a master content portion equivalent to the content portion in each unmodified digital document package, and one or more different IVCs, each IVC obtained from a digital document package received from a different source. | 04-01-2010 |
20130067237 | PROVIDING RANDOM ACCESS TO ARCHIVES WITH BLOCK MAPS - Objects of an object set stored in an archive may be randomly accessed using the addresses of the objects stored in the archive. However, archives often fail to enable random access to the data within an object, without accessing other portions of the object, due to the variable compression of respective segments of the object. Random-access capabilities within the objects may be provided by segmenting the object into segments of a segment size, generating a block map specifying the block sizes of respective blocks corresponding to respective segments of the objects, and storing the block map in the archive as an object of the object set. Additionally, hashcodes may be calculated respective blocks and included in the block map in order to expose alterations of respective blocks, and/or to update an archive to an updated version of the archive by comparing the hashcodes and retrieving and substituting the updated blocks. | 03-14-2013 |
Shangyuan Huang, Kent, WA US
Patent application number | Description | Published |
---|---|---|
20100290744 | ADAPTIVE DEVICE FOR SHIFTING IMAGING AXIS ACROSS FIBER-OPTIC ENDFACES IN MULTI-FIBER CONNECTOR FOR INSPECTION - A device for shifting the imaging axis of a microscope across the endfaces of a multi-fiber connector for inspecting the endfaces comprises: a supporting body attached to the optical tube of a microscope and having an extended portion; a swinging lever mounted at one end to the extended portion of the supporting body and rotatable on an axis perpendicular to the imaging axis of the microscope; a connection piece connecting between the swinging lever and a fitting tip; a bevel wheel fastened to the supporting body; and a torsion spring for pushing the swinging lever against a slanted surface of the bevel wheel. The bevel wheel is adapted to swing the swinging lever relative to the supporting body so that the imaging axis of the microscope is moved relative to the fitting tip to selectively align the imaging axis across the endfaces for inspection. | 11-18-2010 |
20140063598 | ADAPTIVE DEVICE FOR INSPECTING ENDFACES OF FIBER-OPTIC CONNECTOR HAVING MULTIPLE ROWS OF FIBERS - A device for shifting the imaging axis of a microscope for inspecting endfaces of a fiber-optic connector having multiple rows of endfaces has a supporting body for receiving a microscope; a first swinging lever mounted on top of the supporting body and rotatable about a first swinging axis perpendicular to the imaging axis of the microscope; a first connecting piece extending from the first swinging lever towards the imaging axis; a second swinging lever pivoted on the first connecting piece and rotatable about a second swinging axis perpendicular to the first swinging axis; and a fitting tip connected to the second swinging lever for interfacing with the fiber-optic connector. Using two sets of biasing means and adjustment drivers, the imaging axis passing through the supporting body and the fitting tip can be shifted in two mutually perpendicular directions to selectively align with any endface of the fiber-optic connector. | 03-06-2014 |
20140268114 | APPARATUS FOR SIMULTANEOUSLY INSPECTING AND CLEANING FIBER CONNECTOR - The fiberscope for inspecting and cleaning a fiber connector simultaneously includes a housing with a front panel, a microscope system, a connector holder mounted at a distance from the front panel for receiving a connector ferrule of a fiber connector, and a translation stage for moving the microscope system transversely to align its optical axis with the connector ferrule. The fiberscope further includes a hand knob attached to a fine screw through the connector holder for adjusting the vertical position of the connector ferrule, a mirror pivotally mounted between the connector holder and the front panel, an LED lamp, air nozzles attached to the front panel, and a cleaning air tube for supplying compressed air to the air nozzles. The cleaning air from the air nozzles spray sideways onto the fiber endfaces so that the cleaning air bounces off sideways to avoid secondary contamination. | 09-18-2014 |
20140327756 | USER-FRIENDLY WIRELESS FIBER OPTIC ENDFACE INSPECTOR - A wireless fiber optic endface inspector includes a video microscope capable of wirelessly transmitting video streaming signal of endface image in real-time to a display device. The video microscope includes a microscope optical system, an adapting tip for interfacing an endface, an LED light source, a camera module for receiving and converting the endface image into video streaming signal, a Wi-Fi AP board, and a battery for supplying power. The video microscope may be constructed by adding a Wi-Fi AP board and a battery to a conventional inspector microscope. The display device has software for detecting when the endface is focused. Once the endface is focused, the display device emits an audio signal to alert the operator, who may then trigger the display device to analyze the endface image using an endface analysis software or save it to a folder, or transmit the image to a remote server. | 11-06-2014 |
20140354977 | FITTING TIP WITH RELAY LENS FOR FIBER-OPTIC CONNECTOR ENDFACE INSPECTOR - A fitting tip of fiber-optic connector endface inspection microscope for inspecting angled connector endfaces includes a relay lens fixed inside its internal channel and is designed such that when it is received in an intended connector adapter and mounted to the inspection microscope, the normal line to the connector endface forms an acute angle γ with the optical axis of the relay lens; the ray exiting from the relay lens and conjugate to the ray along the normal line is aligned with the optical axis of the inspection microscope; and as a result the connector endface is imaged on an imaging plane within the focusing adjustment range of the inspection microscope. The best image of the connector endface is obtained when the angle γ is half of the inclined angle of the angled connector endface. | 12-04-2014 |
Sheng-Wen Huang, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100091613 | ACOUSTIC SENSOR UTILIZING ACOUSTOELECTRIC EFFECT - An ultrasound system that detects a characteristic of an ultrasound wave. The system includes a circuit member defining a sensing portion operable to be exposed to the ultrasound wave. The system also includes a current generating device that generates a current in the sensing portion of the circuit member. Furthermore, the system includes a voltage sensor that detects a voltage across the sensing portion due to the exposure to the ultrasound wave to thereby detect the characteristic of the ultrasound wave. | 04-15-2010 |
Su Shiong Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20110101901 | Power control system for vehicle disk motor - A brushless D.C. disk motor has one or more disk rotor assemblies and pairs of stator assemblies for each rotor assembly. Each disk rotor assembly has a disk and a plurality of permanent magnets distributed along two or more circular paths in the disk inboard of the peripheral edge of the rotor. Each stator assembly has a plurality of pole pieces and coils distributed along a mounting plate in corresponding circular paths. The disk is rotatably mounted to a support member; while the stator sub-assemblies are fixed to the support member. The coils are selectively activated by commutated power control signals generated in response to a vehicle condition parameter, such as vehicle speed or disk motor load, to optimize power drain from the source of electrical power in accordance with the value of the vehicle condition parameter. | 05-05-2011 |
20110119027 | Pedometer with shoe mounted sensor and transmitter - A pedometer has first and second signal generators mounted along the inner margin of a first shoe and separated by a fixed distance. A sensor and transmitter assembly is mounted along the inner margin of a second shoe. The sensor and transmitter assembly includes a sensor, a microcontroller unit and a wireless transmitter. A pair of impulses is received by the microcontroller unit each time the shoes pass in close proximity to each other. The microcontroller unit generates various pedestrian performance data based on the impulses. The pedestrian performance data is wirelessly transmitted to a display unit carried by the pedestrian. | 05-19-2011 |
20110121676 | Vehicle disk motor with movable magnet poles - A brushless D.C. disk motor has one or more disk rotor assemblies and pairs of stator assemblies for each rotor assembly. Each disk rotor assembly has a disk and a plurality of permanent magnets distributed along two or more circular paths in the disk inboard of the peripheral edge of the rotor. Each stator assembly has a plurality of pole pieces and coils distributed along a mounting plate in corresponding circular paths. The disk is rotatably mounted to a support member; while the stator sub-assemblies are fixed to the support member. The coils are selectively activated by commutated power control signals generated in response to a vehicle condition parameter, such as vehicle speed or disk motor load, to optimize power drain from the source of electrical power in accordance with the value of the vehicle condition parameter. The stator assembly pole pieces are movably mounted on the stator mounting plate to improve motor efficiency. | 05-26-2011 |
20110241890 | Collective objects management system with object identification using addressable decoder units - A collective objects management system for objects such as documents contained in file folders in drawers of file cabinets. Each file folder has an electrical circuit with a visible indicator mounted on the file folder. Each folder circuit has an address decoder with a unique system address which generates a VALID signal whenever an incoming address from a source is a match. A local microcomputer and optional encoder receive incoming object identification signals from the source and supplies the desired object address to all the file folders in the cabinet. To aid the user, each file drawer has a visible indicator mounted on the front panel, the panel indicator being illuminated when the sought folder is contained in that drawer. The invention can be applied to a wide variety of collective objects management systems, such as supermarkets, automobile parts distributors, and various manufacturing operations. | 10-06-2011 |
20110304456 | Collective objects management system with object identification using addressable decoder units - A collective objects management system for objects such as documents contained in file folders in drawers of file cabinets. Each file folder has an electrical circuit with a visible indicator mounted on the file folder. Each folder circuit has an address decoder with a unique system address which enables generation of a VALID signal whenever an incoming address from a source is a match, and a circuit for deriving operating power for the address decoder from an incoming address signal. A local microcomputer and optional encoder receive incoming object identification signals from the source and supplies the desired object address to all the file folders in the cabinet. To aid the user, each file drawer has a visible indicator mounted on the front panel, the panel indicator being illuminated when the sought folder is contained in that drawer. The invention can be applied to a wide variety of collective objects management systems, such as supermarkets, automobile parts distributors, and various manufacturing operations. | 12-15-2011 |
20120001758 | Documents management using remote document location and retrieval - A documents management system with remote location and retrieval of documents contained in file folders positioned in file drawers in a collection of file cabinets. Each document has an RFID tag containing a document identifier and the contents of the document stored in a read-only memory. Each file folder has a circuit containing a unique identifier for that folder. Each file cabinet has a control unit which searches for a specific file folder in response to receipt of a file folder request from a source. If the folder is found, each cabinet has an R.F. reader which searches for a specific document in response to receipt of a document request from the source. If the document is found, the R.F. reader extracts the document contents and transmits them to the source. | 01-05-2012 |
20120093569 | Searchable binder - A binder management system having a cabinet with shelves for removable storage of searchable binders. Each binder has a body with front and rear covers and a spine. Inside the body is a binder mechanism for removably retaining sheet media. Each binder has externally extending upper and tower ohmic contact members which ohmically engage conductive members mounted on the shelf surfaces near the front. Each binder has a binder identification circuit coupled to an LED mounted on the binder spine in a location visible when the binder rests on a shelf. When a binder identification signal from a host computer is presented to the shelf conductive members it is transferred by the binder contact members to the binder identification circuit. If the signal matches, the LED is activated to aid the user in finding the binder. An LED and an optional audible indicator are mounted on the shelves to further aid the user in finding the sought binder. | 04-19-2012 |
20120321492 | Fan with flexible drive shaft - An electric motor driven fan device has a base member with walls forming an enclosure, an electrically powered motor located within the enclosure and having an output shaft coupled via a bearing mounted in an upper wall of the base member to one end of a flexible drive shaft rotatably enclosed in a bendable sheath secured to the base member. The other end of the flexible drive shaft is coupled via a second bearing to a driven shaft secured to a multi-bladed fan. The other end of the bendable sheath is secured to the outer race of the second bearing. The predominant mass of the device is at the bottom, which reduces the footprint of the lower portion. The bendable sheath enables the attitude of the fan to be manually adjusted. | 12-20-2012 |
20130186951 | Intelligent fastener - An intelligent fastener having a head and an externally threaded shank for threaded engagement with a structural member. The head has a recess formed in the top surface for mounting an RFID tag with a memory containing information specific to the fastener—such as fastener identification, specified torque value and other information—an antenna for enabling bidirectional communication with an RFID tag reader, and a torque value sensor for determining the torque applied to the fastener by a fastener installation tool. Once installed, the existing torque on a collection of fasteners is measured by using an RFID tag reader to scan the information stored in the memory of each fastener. | 07-25-2013 |
20140191633 | Storage container for electronically addressable file folders and documents - A storage container for use in a documents management system with remote location of file folders positioned on support members mounted between walls of the storage container. The support members are electrically connected to an electrical input connector which supplies file folder search signals to the container and receives response signals from address decoder circuits located in each file folder removably received in the container. Each container has an electrical output connector which can be connected to the electrical input connector of another container so that several containers can be connected to one another. Each container can be removably installed in a file cabinet drawer and electrically connected to the file drawer conductive rails to communicate with a file cabinet based file management system. | 07-10-2014 |
20140210594 | Compartment storage container with electronically addressable compartments - A compartment storage container for use in a collective objects management system with remote location of compartments containing sought objects. Each compartment has an address decoder with a unique address electrically connected to an electrical input connector which supplies compartment search signals to the container. Each compartment has an LED indicator which is activated when a compartment search signal specifies a compartment address which matches the address of an address decoder in the container. Each container has an electrical output connector which can be connected to the electrical input connector of another container so that several containers can be connected to one another. Each container can be removably installed in a cabinet drawer and electrically connected to conductive support rails in the drawer to communicate with a cabinet based collective objects management system. | 07-31-2014 |
20150021328 | TWO STAGE DRAW LATCH FOR STACKABLE STORAGE BOX WITH REMOVABLE COVER - A dual function two stage draw latch has a first stage loop member pivotally attached at one end to a latch lever pivotally mounted to a base member secured to a wall of a first container. A second stage loop member is pivotally attached to the other end of the first stage loop member. The free end of the second stage loop member is able to engage a catch mounted on a wall of a second container stacked on top of the first container to provide a holding force for the two containers. This free end is also able to engage a catch element mounted on a container lid to hold the lid in place. Electrically conductive strips interconnect the latch and catch to provide electrical interconnection between the containers. | 01-22-2015 |
Su Shiong Huang, Belleville, WA US
Patent application number | Description | Published |
---|---|---|
20090145216 | TIRE PARAMETER SENSOR UNIT WITH REAL TIME DATA STORAGE - A tire parameter sensor unit for monitoring one or more vehicle tire parameters such as internal tire pressure and temperature and developing a permanent log of the operational history of the tire. The sensor unit has a power system, a processor/transmitter, a radio time clock, one or more sensors, and a memory mounted on a substrate. This assembly is permanently attached to the tire in the side wall or tread wall. Initial tire identification information is stored in the memory upon tire fabrication. During the lifetime of the tire, operational information specifying the tire operating conditions (pressure, temperature, etc.) is permanently stored in the memory along with real time data. The operational information and real time data can be read out from memory to provide the history log. | 06-11-2009 |
20120155700 | Intelligent document with stored text and image - A self-authenticating intelligent document in sheet medium form has an information storage and transfer means incorporated thereinto for storing the original text portion of document information formed on the surface of the sheet medium and for storing an image of the completed document after supplemental information has been added to the original text portion on the surface of the sheet medium. The information storage and transfer means is either a single RFID tag having a first memory portion for storing the text portion and a second memory portion for storing the image of the completed document; or a first RFID tag having a memory portion for storing the text portion and a second RFID tag for storing the image of the completed document. To verify the authenticity of the document, the image stored in the information storage and transfer means is read out and compared with the visible version. When the two are identical, the document is authentic. | 06-21-2012 |
Tai-Yi Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20110238686 | CACHING DATA OBTAINED VIA DATA SERVICE INTERFACES - A potential user query that can be subsequently received from a user is identified. An interface exposed by a data service is invoked, which includes providing the potential user query to the interface. Search results in response to the potential user query are received from the interface and maintained in a complex data set store. If a user query is subsequently received that maps to a normalized query that is the potential user query, then search results for the normalized query are obtained from the complex data set store and returned as the search results for the user query. | 09-29-2011 |
20110316772 | INPUT METHOD EDITOR - Methods, systems, and apparatus, including computer program products, in which an input method editor receives input in a first writing system and presents input candidates in the first writing system or a second writing system. In one implementation, a method is provided. The method includes receiving input in a first writing system; presenting the input in the first writing system in a first interface element of an interface as content input; automatically identifying one or more candidates in a second writing system based on the input in the first writing system; and presenting the one or more candidates in the second writing system in a second interface element that is separate from the first interface element. | 12-29-2011 |
20120016658 | INPUT METHOD EDITOR - Methods, systems, and apparatus, including computer program products, in which an input method editor receives graphemes in a first writing system and identifies lexical items in a second writing system based on the graphemes in the first writing system. In one implementation, a method is provided. The method includes receiving a first grapheme in a first writing system; using a grapheme graph of graphemes in the first writing system to identify a first n-gram representation in the first writing system of a first morpheme in a second writing system; using the first n-gram representation to locate one or more first nodes in a morpheme graph; selecting a first lexical item from the one or more first lexical items based on a first score associated with each of the one or more first lexical items; and providing the first lexical item for display on a user device. | 01-19-2012 |
20120019446 | INTERACTION WITH IME COMPUTING DEVICE - A computer-implemented user interface method is disclosed that includes displaying on a touch screen of a computing device a keyboard defined by a first character set; displaying on the touch screen an electronic canvas on which information corresponding to keys on the keyboard is displayed as a user selects the keys on the keyboard, the information appearing in a second character set that differs from the first character set; generating a candidate area over a front surface of the canvas; and automatically controlling a location of the candidate area as information is added to the canvas so as to move the candidate area away from being over a location on the canvas that is presently, or next to be, a location at which information is added to the canvas. | 01-26-2012 |
20120113011 | IME TEXT ENTRY ASSISTANCE - A computer-implemented user interface method is disclosed that includes displaying on a touch screen of a computing device a keyboard defined by a first character set; displaying on the touch screen an electronic canvas on which information corresponding to keys on the keyboard is displayed as a user selects the keys on the keyboard, the information appearing in a second character set that differs from the first character set; generating a candidate area over a front surface of the canvas; and automatically controlling a location of the candidate area as information is added to the canvas so as to move the candidate area away from being over a location on the canvas that is presently, or next to be, a location at which information is added to the canvas. | 05-10-2012 |
Te-Ming Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20110106416 | PREDICTING EXPECTED ROAD TRAFFIC CONDITIONS BASED ON HISTORICAL AND CURRENT DATA - Techniques are described for determining and using information regarding expected road traffic flow conditions information for vehicles traveling on roads. The expected road traffic flow conditions for a particular portion of a road may be generated by combining historical representative information about road traffic flow conditions for that road portion with current information about actual traffic flow on or near that road portion. The combination may, for example, provide benefits for estimating expected traffic flow conditions information for roads with structural flow obstructions that cause reduced traffic flow at certain road locations and times—for example, the expected traffic flow conditions information may be based at least in part on fitting or otherwise adapting partial actual traffic flow information about a vehicle's actual travel path to a historical travel profile for a road that includes representative traffic flow information for various combinations of road locations and time periods. | 05-05-2011 |
Xiao Huang, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20120278354 | USER ANALYSIS THROUGH USER LOG FEATURE EXTRACTION - Systems, methods, and computer media for efficiently processing user log data are provided. A received user log data analysis request specifies: target user log features that identify users in a target user group, analysis user log features that identify data associated with the users in the target user group, and an analysis to perform on the identified data associated with the users in the target user group. Occurrences of specified features are extracted from user logs and stored. Users associated with an occurrence of each of the extracted and stored target user log features are identified as users in the target user group. Occurrences of the analysis user log features that are associated with a user in the target user group are extracted and reformatted for the analysis specified in the analysis request. | 11-01-2012 |
Xinhua Huang, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20120323955 | RELATIONAL MODELING AND RUNTIME FOR DATE EFFECTIVE ENTITIES - A database application may receive a database query to retrieve a relation with date effective information stored by a relational database, and send a database result having the date effective information. The database application may comprise a data mapping component to retrieve a relation definition for the relation from metadata associated with the relation, the relation definition having a relation variable with a set of attributes including multiple date effective attributes, the relation definition having a definition for an alternate key formed from a composite of a date effective attribute and one other attribute from the set of attributes, and a data access component to generate the relation with the date effective information using the alternate key, the relation having a set of one or more tuples, with each tuple having one or more attribute values for corresponding date effective attributes of the relation. Other embodiments are described and claimed. | 12-20-2012 |
Xiwen Huang, Pasco, WA US
Patent application number | Description | Published |
---|---|---|
20090035622 | SYSTEMS AND METHODS FOR REDUCING ORGANIC SULFUR COMPONENTS IN HYDROCARBON FUELS - The present invention includes systems and methods of treating a hydrocarbon fuel to reduce organic sulfur components so as to be amenable to small-scale and/or field-based applications. Embodiments of the invention involve the performance of a vapor-phase hydrodesulfurization operation using steam reformate. The steam reformate is a hydrogen source for the hydrodesulfurization and is provided by an integrated steam reformer. | 02-05-2009 |
Xuedong Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20080253544 | Automatically aggregated probabilistic personal contacts - Described is a technology by which a user's telephone-related data is aggregated from various sources for use in assisting the user with making telephone calls. For example, call history data corresponding to a landline telephone, a mobile telephone and/or an office telephone of the user may be combined. Other sources include a landline telephone service, a mobile telephone service, an enterprise telephone system or server, a computing device, voice mail data, web page data, electronic message content, instant message content, a contacts list, and/or an information data store. The telephone-related data can be processed (e.g., based on frequency and calling patterns) to determine corresponding probability data to help determine a user's intent in locating a particular recipient to call. The user may access the telephone-related data via voice commands input at one of the user's telephones, or by receiving a visible list of at least part of the telephone-related data. | 10-16-2008 |
20090203361 | PROVIDING RELEVANT ADVERTISEMENTS OR OTHER CONTENT BASED ON A COMMUNICATIONS IDENTIFIER - Described is a technology by which a communications identifier such as a telephone number is used in selecting relevant content (e.g., an advertisement) for outputting as audible and/or visible information to a destination device. The communications identifier is used like a search term/keyword to determine content relevant to that identifier. A telephone number may be the identifier, selected based on a partially-dialed or actually dialed number, or a user's current scrolling position among listed telephone numbers. A telephone number of an incoming call may be used as the identifier. Profile data and/or state data may be used in selecting relevant content. Some of the profile data may be mined based on previous user activities. In one example, the content may be provided via a remote source of the content, and used immediately or cached for later use (e.g., output). | 08-13-2009 |
20100241663 | PROVIDING CONTENT ITEMS SELECTED BASED ON CONTEXT - Systems, methods, and computer storage media having computer-executable instructions embodied thereon that provide content items selected based on context are provided. Contextual indicators associated with a user are identified and utilized to determine one or more content items that the user is likely to desire to access at a particular point in time. Upon receiving an indication that the user desires to perform a context-aware search, the identified content items (or references thereto) are presented automatically to the user, that is, without the user having to input any search query terms. The indication that the user desires to perform a context-aware search may be received, for instance, upon receiving an indication that a selectable context-aware search button has been selected by the user. This single-button action is particularly useful for mobile computing devices, wherein alpha-numeric textual input is relatively difficult. | 09-23-2010 |
20110195726 | COMMERCIALLY SUBSIDIZED MOBILE COMMUNICATION DEVICES AND SERVICES - Mobile communication devices, such as mobile phones, may be capable of recommending to a user various providers of one or more solicited services, e.g., by identifying a user location and identifying providers near the user location that provide the services, and by initiating a call between the user and a selected provider. However, the equipment and service costs of such devices may be prohibitive, particularly for mid-range mobile communication devices that may appeal to cost-conscious users. The prohibitive costs may be diminished by redirecting part or all of the cost of providing the recommendation service from the providers, e.g., by charging the provider a service cost upon initiating a call from the user to the provider, or upon representing the provider in a provider database. In one such embodiment, all service costs may be borne by providers, providing to the user a free recommendation service via the mobile communication device. | 08-11-2011 |
20120278162 | CONDUCTING AN AUCTION OF SERVICES RESPONSIVE TO POSITIONAL SELECTION - Various technologies pertaining to provision of graphical data to a client computing device responsive to receipt of a positional selection on a web page by a user of a client computing device are described herein. A computer-executable application executing on the client computing device detects that the user has selected a certain position on the web page, wherein this application is not called by code of the web page. The position is transmitted to an ad server, which conducts an auction for display space on the client computing device based at least in part upon the detection of the certain position. | 11-01-2012 |
20120323686 | VIRTUAL IDENTITY MANAGER - A computing system and method for managing an identity of a user are provided. A server may be configured to communicate with each of a plurality of client devices in corresponding request and response streams. An inference engine is configured to monitor the request and response streams for identifying factors that distinguish each of the plurality of client devices from other of the plurality of client devices. Upon detecting one or more of the identifying factors for each of the two or more client devices that match within a threshold probability, the inference engine makes an inference that two or more of the plurality of client devices are used by the user. Based upon the inference, the inference engine creates a virtual identity record at the server linking the two or more client devices. | 12-20-2012 |
20120323948 | DIALOG-ENHANCED CONTEXTUAL SEARCH QUERY ANALYSIS - Embodiments of the present invention relate to systems, methods, and computer-storage media for a method of contextually analyzing terms within a search query. In one embodiment, a received search query is classified into a domain category. Additionally, information is assigned to a schema associated with the domain by analyzing the search query. Further, at least one search result that helps a user complete a task within the domain is provided based on the information in the schema. | 12-20-2012 |
20130006738 | SHARED ELECTRONIC INCENTIVES AND COUPONS LEVERAGING SOCIAL CONNECTIONS AND SHEPHERDING - Systems and methods for distributing shared electronic coupons are provided. According to one aspect, the electronic coupon may include a coupon benefit display region displaying a textual and/or graphical representation of a coupon benefit. The electronic coupon may further include a candidate display region displaying a list of one or more friends of the user who are determined to be redeemer candidates from among friends in a social network profile or address book of the user. Each redeemer candidate friend in the list has an associated selector, and selection by the user of a selector corresponding to a friend causes the client device to send a message to a coupon server to instruct the coupon server to send the electronic coupon to a client device of the selected friend. Predictive models generated through machine learning may aid in selecting the user to which coupons are distributed and the redeemer candidates. | 01-03-2013 |
20130006754 | MULTI-STEP IMPRESSION CAMPAIGNS - Various embodiments are described for computerized advertising systems and methods. The system may include an ad server that includes an impression campaign engine configured to associate a target user profile with a plurality of computing devices. The ad server is also configured to receive a multi-step impression plan including a plurality of triggers from an advertiser. Each trigger is associated with a different advertisement to be served to at least one of the plurality of devices. The system also includes an ad serving engine configured to serve a first advertisement to a first device in response to making an inference from sensors or detecting a first trigger, and a second advertisement to a second device in response to a second inference or detecting a second trigger, according to the impression plan. A predictive model developed from machine learning may be used to develop a learning-based multi-step impression plan. | 01-03-2013 |
20130006794 | ONLINE MARKETPLACE WITH OFFER/BID POOLING - Systems and methods for facilitating purchase transactions through real-time dynamic marketplace sessions are provided. A method may include pooling offers for goods/services to form a pooled offer, and pooling bids to form a pooled bid. The pooled offer and the pooled bid may be matched to form a pooled offer/bid pair. Methods for inducing and using predictive models for successful configuration of properties and participants with machine learning procedures that operate on data about successful and unsuccessful offers may be employed. A real-time dynamic marketplace session may be established between offer agents associated with the pooled offers and bid agents associated with the pooled bids. Upon a successful conclusion to the negotiation, a purchase transaction for the pooled offer/bid pair may be processed. | 01-03-2013 |
20130058470 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one telephone communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one telephone communication. | 03-07-2013 |
20130059572 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one telephone communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one telephone communication. | 03-07-2013 |
20130060619 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; and negotiating presentation of at least one persona to the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060620 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; and negotiating presentation of at least one persona to the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060624 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one persona from a party to a transaction; evaluating the transaction; and negotiating receipt of at least one different persona from the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060625 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one persona from a party to a transaction; evaluating the transaction; and negotiating receipt of at least one different persona from the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060665 | Computational systems and methods for disambiguating search terms corresponding to network members - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one search term corresponding to at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting a disambiguated search term at least partly based on at least one of the network-participation identifier data or the device-identifier data. | 03-07-2013 |
20130060695 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; selecting a persona at least partly based on an evaluation of the transaction, wherein the persona is linked to a unique identifier that is at least partly based on a user's device-identifier data and the user's network-participation data; and presenting the persona in response to the request for personal information. | 03-07-2013 |
20130060759 | Computational systems and methods for disambiguating search terms corresponding to network members - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one search term corresponding to at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting a disambiguated search term at least partly based on at least one of the network-participation identifier data or the device-identifier data. | 03-07-2013 |
20130060848 | Computational systems and methods for linking users of devices - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting device-identifier data corresponding to at least one communication device; accepting network-participation identifier data associated with a verified real-world user associated with the at least one communication device; and assigning a unique identifier at least partly based on the device-identifier data and the network-participation identifier data. | 03-07-2013 |
20130060850 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one indication of an interaction involving at least one member of a network; creating a persona corresponding to the at least one member of a network, wherein the persona is at least partly based on the indication of an interaction; and presenting the persona for use in the interaction involving the at least one member of the network. | 03-07-2013 |
20130060851 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one indication of an interaction involving at least one member of a network; creating a persona corresponding to the at least one member of a network, wherein the persona is at least partly based on the indication of an interaction; and presenting the persona for use in the interaction involving the at least one member of the network. | 03-07-2013 |
20130060852 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; selecting a persona at least partly based on an evaluation of the transaction, wherein the persona is linked to a unique identifier that is at least partly based on a user's device-identifier data and the user's network-participation data; and presenting the persona in response to the request for personal information. | 03-07-2013 |
20130060866 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one email communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one email communication. | 03-07-2013 |
20130060867 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one email communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one email communication. | 03-07-2013 |
20130060868 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one social network message from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one. | 03-07-2013 |
20130060869 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one social network message from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one. | 03-07-2013 |
20130061050 | Computational systems and methods for linking users of devices - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting device-identifier data corresponding to at least one communication device; accepting network-participation identifier data associated with a verified real-world user associated with the at least one communication device; and assigning a unique identifier at least partly based on the device-identifier data and the network-participation identifier data. | 03-07-2013 |
20130061332 | Computational systems and methods for verifying personal information during transactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information. | 03-07-2013 |
20130061333 | Computational systems and methods for verifying personal information during transactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information. | 03-07-2013 |
20130085843 | GESTURE BASED NAVIGATION TO AUXILIARY CONTENT - Methods, systems, and techniques for providing automatic navigation to auxiliary content. Example embodiments provide a Dynamic Gesturelet Generation System (DGGS), which enables users to use a gesture-based user interface and dynamically define any content as a “link” for navigating to other content. In overview, the DGGS allows a user to use a gesture-based user interface to indicate some portion of content that is being presented on a presentation device associated with the user. This indicated portion is then used as a dynamic “link” (without necessitating a link being embedded in the underlying content) by the DGGS to navigate to other content or for other purposes. This dynamic cross-reference to other content is termed a “gesturelet.” The DGGS determines, based upon this gesturelet what content to present next to the user and then presents it accordingly. | 04-04-2013 |
20130085847 | PERSISTENT GESTURELETS - Methods, systems, and techniques for automatically providing auxiliary content are provided. Example embodiments provide a Dynamic Gesturelet Generation System (DGGS), which enables one to dynamically define a gesturelet for navigating to or presenting other content, or for performing some behavior. In overview, the DGGS allows a portion of electronically presented content to be dynamically indicated by a gesture. The indicated portion can then be formed into a gesturelet and used by the DGGS to navigate to other content, perform a set of instructions, present auxiliary content, or for other purposes. Gesturelets may be stored persistently and associated with some auxiliary content, such as a set of behaviors, advertisements, competitions, supplemental material or images, or the like. Later, when an action in the system occurs such that the persistent representation is retrieved, the behavior associated with the persistent representation is performed and the associated auxiliary content presented. | 04-04-2013 |
20130085848 | GESTURE BASED SEARCH SYSTEM - Methods, systems, and techniques for automatically initiating a search to present auxiliary content in a gesture based input system are provided Example embodiments provide a Gesture Based Search System (GBSS), which enables a gesture-based user interface to invoke (e.g., execute, generate, initiate, perform, or cause to be executed, generated, initiated, performed, or the like) a search related to an portion of electronic input that has been indicated by a received gesture. In overview, the GBSS allows a portion (e.g., an area, part, or the like) of electronically presented content to be dynamically indicated by a gesture. The GBSS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine input to a search. The search is then automatically initiated with the determined source input. Once search result content is determined, the result content is then presented to the user. | 04-04-2013 |
20130085849 | PRESENTING OPPORTUNITIES FOR COMMERCIALIZATION IN A GESTURE-BASED USER INTERFACE - Methods, systems, and techniques for automatically presenting commercial opportunities in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to present an opportunity for commercialization related to a portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine an opportunity for commercialization to present. An opportunity for commercialization may come in many forms, including, for example, a web page, code, document, or the like. Once the opportunity for commercialization is determined, it is then presented to the user, for example, using a separate panel, an overlay, or in any other fashion. | 04-04-2013 |
20130085855 | GESTURE BASED NAVIGATION SYSTEM - Methods, systems, and techniques for automatically providing auxiliary content are provided. Example embodiments provide a Gesture Based Navigation System (GBNS), which enables a gesture-based user interface to navigate to auxiliary content that is related to an portion of electronic input that has been indicated by a received gesture. In overview, the GBNS allows a portion (e.g., an area, part, or the like) of electronically presented content to be dynamically indicated by a gesture. The GBNS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine auxiliary content to navigate to. Auxiliary content may be in many forms, including, for example, a web page, code, document, or the like. Once the auxiliary content is determined, it is then presented to the user, for example, using a separate panel, an overlay, or in any other fashion. | 04-04-2013 |
20130086056 | GESTURE BASED CONTEXT MENUS - Methods, systems, and techniques for providing context menus based upon gestured input are provided. Example embodiments provide a Gesture Based Context Menu System, which enables a gesture-based user interface to invoke a context menu to present one or more choices of next actions and/or entities based upon the context indicated by the gestured input and a set of criteria. In overview, the GBCMS allows an area of electronically presented content to be dynamically indicated by a gesture and then examines the indicated area in conjunction with a set of criteria to determine and present a context menu of further choices available to the user. The choices may be presented in the form of, for example, a pop-up menu, a pull-down menu, an interest wheel, or a rectangular or non-rectangular menu. In some embodiments the menus dynamically change as the gesture is modified. | 04-04-2013 |
20130086499 | PRESENTING AUXILIARY CONTENT IN A GESTURE-BASED SYSTEM - Methods, systems, and techniques for automatically providing auxiliary content are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to present auxiliary content that is related to an portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, or the like) of electronically presented content to be dynamically indicated by a gesture. The GBCPS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine auxiliary content to present. Auxiliary content may be in many forms, including, for example, a web page, code, document, or the like. Once the auxiliary content is determined, it is then presented to the user, for example, using a separate panel, an overlay, or in any other fashion. | 04-04-2013 |
20130097022 | COMMERCIALLY SUBSIDIZED MOBILE COMMUNICATION DEVICES AND SERVICES - Mobile communication devices, such as mobile phones, may be capable of recommending to a user various providers of one or more solicited services, e.g., by identifying a user location and identifying providers near the user location that provide the services, and by initiating a call between the user and a selected provider. However, the equipment and service costs of such devices may be prohibitive, particularly for mid-range mobile communication devices that may appeal to cost-conscious users. The prohibitive costs may be diminished by redirecting part or all of the cost of providing the recommendation service from the providers, e.g., by charging the provider a service cost upon initiating a call from the user to the provider, or upon representing the provider in a provider database. In one such embodiment, all service costs may be borne by providers, providing to the user a free recommendation service via the mobile communication device. | 04-18-2013 |
20130097669 | Behavioral fingerprint controlled theft detection and recovery - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network accessible user; and disabling the one or more devices automatically as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 04-18-2013 |
20130097683 | Trust verification schema based transaction authorization - A computationally implemented method includes, but is not limited to: for determining one or more behavioral fingerprints associated with one or more network accessible users; relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the one or more network accessible users; and determining whether to authenticate one or more transactions via the trust verification schema. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 04-18-2013 |
20130103493 | Search Query and Document-Related Data Translation - The subject disclosure is directed towards developing a translation model for mapping search query terms to document-related data. By processing user logs comprising search histories into word-aligned query-document pairs, the translation model may be trained using data, such as probabilities, corresponding to the word-aligned query-document pairs. After incorporating the translation model into model data for a search engine, the translation model is used may used as features for producing relevance scores for current search queries and ranking documents/advertisements according to relevance. | 04-25-2013 |
20130104203 | BEHAVIORAL FINGERPRINT BASED AUTHENTICATION - A computationally-implemented method, for certain example embodiments, may include, but is not limited to: determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint. In addition to the foregoing, other example aspects are described in the claims, drawings, and written description forming a part of the present disclosure. | 04-25-2013 |
20130106682 | Context-sensitive query enrichment | 05-02-2013 |
20130106683 | Context-sensitive query enrichment | 05-02-2013 |
20130106695 | Context-sensitive query enrichment | 05-02-2013 |
20130106892 | Context-sensitive query enrichment | 05-02-2013 |
20130106893 | Context-sensitive query enrichment | 05-02-2013 |
20130106894 | Context-sensitive query enrichment | 05-02-2013 |
20130110804 | Context-sensitive query enrichment | 05-02-2013 |
20130117105 | ANALYZING AND DISTRIBUTING BROWSING FUTURES IN A GESTURE BASED USER INTERFACE - Methods, systems, and techniques for presenting auxiliary content and information regarding browsing and/or navigation futures to be used in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to offer to one or more sponsors of content information regarding a next content to be examined by a user related to a portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS examines the indicated portion in conjunction with potentially a set of (e.g., one or more) factors to determine a next content and distributes information to potential sponsors. Once auxiliary content is received or determined, it is then presented to the user when the next content is navigated to. | 05-09-2013 |
20130117111 | COMMERCIALIZATION OPPORTUNITIES FOR INFORMATIONAL SEARCHING IN A GESTURE-BASED USER INTERFACE - Methods, systems, and techniques for presenting sponsor supplied content associated with commercial opportunities in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to determine and present sponsor supplied content associated with an opportunity for commercialization related to a portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS examines the indicated portion in conjunction with possibly a set of (e.g., one or more) factors to determine which sponsor supplied content associated with an opportunity for commercialization to present. Once the sponsor supplied content associated with an opportunity for commercialization is determined, it is then presented to the user in conjunction with the indicated topic, object, and/or action. | 05-09-2013 |
20130117130 | OFFERING OF OCCASIONS FOR COMMERCIAL OPPORTUNITIES IN A GESTURE-BASED USER INTERFACE - Methods, systems, and techniques for presenting commercial opportunities to be used in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to offer occasions for an opportunity for commercialization related to a portion of electronic input that has been indicated by a received gesture to one or more sponsors of content. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine which opportunity for commercialization to present which is dynamically or has been previously associated with the content indicated by the gesture. Once the opportunity for commercialization is determined, it is then presented to the user in conjunction with the indicated product and/or service. | 05-09-2013 |
20130117214 | Behavioral Fingerprinting Via Derived Personal Relation - Disclosed herein are example embodiments for behavioral fingerprinting via derived personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be derived via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 05-09-2013 |
20130133033 | Behavioral fingerprint controlled automatic task determination - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network-accessible user, the behavioral fingerprint providing a current status of the network-accessible user; and controlling one or more devices automatically as a function of the determined behavioral fingerprint and a direction received from the network-accessible user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 05-23-2013 |
20130133052 | Behavioral fingerprint device identification - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network-accessible user; and identifying a current device of the one or more devices as being currently used by the network-accessible user as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 05-23-2013 |
20130133054 | Relationship Based Trust Verification Schema - A computationally-implemented method, in accordance with certain example embodiments, may include, but is not limited to: receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other aspects are presented in the claims, drawings, and written description forming a part of the present disclosure. | 05-23-2013 |
20130135332 | Context-sensitive query enrichment - Structures and protocols are presented for facilitating a search partly based on a movement status of a search-capable device or on a position of a person's limb or on an association with another search-capable device. | 05-30-2013 |
20130151515 | Behavioral Fingerprinting Via Social Networking Interaction - Disclosed herein are example embodiments for behavioral fingerprinting via social networking interaction. For certain example embodiments, at least one indication of family relation for at least one authorized user may be obtained via at least one social networking interaction, and the at least one indication of family relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 06-13-2013 |
20130151617 | BEHAVIORAL FINGERPRINTING VIA SOCIAL NETWORK VERIFICATION - Disclosed herein are example embodiments for behavioral fingerprinting via social network verification. For certain example embodiments, one or more devices may (i) detect at least one attempt to perform at least one task via at least one user device; and (ii) initiate transmission of at least one verification inquiry to one or more social network connections based at least partly on the at least one attempt to perform the at least one task via the at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-13-2013 |
20130167207 | Network Acquired Behavioral Fingerprint for Authentication - A computationally-implemented method, for certain example embodiments, may include, but is not limited to: identifying a network connection coupling a computer server to a computing device; and transmitting, via the network connection, a behavioral fingerprint associated with an authorized user of the computing device, the behavioral fingerprint providing at least one status of the authorized user with respect to the computing device. In addition to the foregoing, other example aspects are presented in the claims, drawings, and written description forming a part of the present disclosure. | 06-27-2013 |
20130191887 | Social network based trust verification Schema - A computationally implemented method includes, but is not limited to: for receiving at a computing device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computing device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computing device a decision associated with the authentication request, the decision based on a trust verification schema generated by relationally mapping the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 07-25-2013 |
20130268756 | COMPUTATIONAL SYSTEMS AND METHODS FOR ANONYMIZED STORAGE OF DOUBLE-ENCRYPTED DATA - Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-two encrypted data and at least one associated hash; storing the level-two encrypted data and at least one associated hash; and transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash. | 10-10-2013 |
20130268773 | COMPUTATIONAL SYSTEMS AND METHODS FOR PREPARING DATA FOR DOUBLE-ENCRYPTION AND ANONYMOUS STORAGE - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one identifier corresponding to the user to produce at least one encrypted identifier, wherein the at least one encrypted identifier also corresponds to the at least one instance of data for encryption; and transmitting the encrypted identifier to an encryption entity. | 10-10-2013 |
20130287204 | COMPUTATIONAL SYSTEMS AND METHODS FOR DOUBLE-ENCRYPTING DATA FOR SUBSEQUENT ANONYMOUS STORAGE - Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-one encrypted data including at least one associated encrypted identifier; encrypting with a level-two encryption key at least a part of the level-one encrypted data to produce level-two encrypted data; receiving a hash of the at least one associated encrypted identifier; associating the hash with the level-two encrypted data; and transmitting the level-two encrypted data and associated hash of the at least one associated encrypted identifier. | 10-31-2013 |
20130290700 | COMPUTATIONAL SYSTEMS AND METHODS FOR ENCRYPTING DATA FOR ANONYMOUS STORAGE - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier. | 10-31-2013 |
20140040989 | MULTI-DEVICE BEHAVIORAL FINGERPRINTING - Disclosed herein are example embodiments for multi-device behavioral fingerprinting by a user device or a server device. For certain example embodiments, at least one device may obtain at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of two or more user devices by the at least one authorized user. The at least one device may perform at least one authentication-related operation based at least partially on the at least one behavioral fingerprint. | 02-06-2014 |
20140173426 | SEAMLESSLY INCORPORATING ONLINE CONTENT INTO DOCUMENTS - Computer-readable media, computer systems, and computing devices for inserting online content within editable content of a document being composed or manipulated within a document-authoring application, without exiting the document-authoring application or leaving a context of composing or manipulating the document, are provided. Initially, a user-initiated selection of a portion of the editable content within the document is detected. The selected portion of the editable content is automatically distributed to a search engine, where the search engine is equipped to generate search results that are relevant to the selected portion. Upon receiving the search results, they are presented to the user. At this point, the user is allowed to target at least one of the presented search results. Online content associated with the targeted search result is then inserted within the editable content of the document. | 06-19-2014 |
20140222724 | GENERATION OF LOG-LINEAR MODELS USING L-1 REGULARIZATION - A log-linear model may be trained using a modified version of an original limited-memory Broyden-Fletcher-Goldfarb-Shanno (L-BFGS) algorithm. The modified version may be based on modifying the original L-BFGS algorithm using a single map-reduce implementation. In another aspect, a sparse log-linear model may be accessed. The sparse log-linear model may be trained with L1-regularization, based on data indicating past user ad selection behaviors. A probability of a user selection of an ad may be determined based on the sparse log-linear model. | 08-07-2014 |
20140223381 | INVISIBLE CONTROL - An invisible control may be implemented in a client device or in an application of the client device. A user may activate the invisible control by applying a gesture on a predetermined region of the client device or the application. In response to receiving the user gesture, a predetermined action associated with the invisible control may be activated. The predetermined action may be applied to the application or some or all of the content associated with the application. An Application Programming Interface may further be provided to allow the user, an application vendor or a content provider to customize the invisible control or operating modes associated with activation of the invisible control. | 08-07-2014 |
20140279991 | CONDUCTING SEARCH SESSIONS UTILIZING NAVIGATION PATTERNS - Systems, methods, and computer-readable storage media are provided for conducting searches utilizing search navigation patterns. Search queries are received that include search terms that are of a particular type. It is recognized that at least one prior search session has been conducted that included a search query having search terms of an equivalent or similar type and followed a particular navigation pattern. Such prior search(es) may have been conducted by the user or by a different user and/or may have a navigation pattern that was affirmatively recorded by the requesting user or that was recorded by the system without explicit contemporaneous user instruction to do so. Upon identifying the navigation pattern associated with the prior search, the system effectively conducts a search session following the navigation pattern. | 09-18-2014 |
20150050911 | COMMERCIALLY SUBSIDIZED MOBILE COMMUNICATION DEVICES AND SERVICES - Mobile communication devices, such as mobile phones, may be capable of recommending to a user various providers of one or more solicited services, e.g., by identifying a user location and identifying providers near the user location that provide the services, and by initiating a call between the user and a selected provider. However, the equipment and service costs of such devices may be prohibitive, particularly for mid-range mobile communication devices that may appeal to cost-conscious users. The prohibitive costs may be diminished by redirecting part or all of the cost of providing the recommendation service from the providers, e.g., by charging the provider a service cost upon initiating a call from the user to the provider, or upon representing the provider in a provider database. In one such embodiment, all service costs may be borne by providers, providing to the user a free recommendation service via the mobile communication device. | 02-19-2015 |
Xuedong D. Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20100306647 | FORCE-FEEDBACK WITHIN TELEPRESENCE - The claimed subject matter provides a system and/or a method that facilitates replicating a telepresence session with a real world physical meeting. A telepresence session can be initiated within a communication framework that includes two or more virtually represented users that communicate therein. A trigger component can monitor the telepresence session in real time to identify a participant interaction with an object, wherein the object is at least one of a real world physical object or a virtually represented object within the telepresence session. A feedback component can implement a force feedback to at least one participant within the telepresence session based upon the identified participant interaction with the object, wherein the force feedback is employed via a device associated with at least one participant. | 12-02-2010 |
20100306670 | GESTURE-BASED DOCUMENT SHARING MANIPULATION - The claimed subject matter provides a system and/or a method that facilitates interacting with data associated with a telepresence session. A telepresence session can be initiated within a communication framework that includes two or more virtually represented users that communicate therein. A portion of data can be virtually represented within the telepresence session in which at least one virtually represented user interacts therewith. A detect component can monitor motions related to at least one virtually represented user to identify a gesture, the gesture involves a virtual interaction with the portion of data within the telepresence session. An interaction component can implement a manipulation to the portion of data virtually represented within the telepresence session based upon the identified gesture. | 12-02-2010 |
20130124492 | Statistical Machine Translation Based Search Query Spelling Correction - Statistical Machine Translation (SMT) based search query spelling correction techniques are described herein. In one or more implementations, search data regarding searches performed by clients may be logged. The logged data includes query correction pairs that may be used to ascertain error patterns indicating how misspelled substrings may be translated to corrected substrings. The error patterns may be used to determine suggestions for an input query and to develop query correction models used to translate the input query to a corrected query. In one or more implementations, probabilistic features from multiple query correction models are combined to score different correction candidates. One or more top scoring correction candidates may then be exposed as suggestions for selection by a user and/or provided to a search engine to conduct a corresponding search using the corrected query version(s). | 05-16-2013 |
Xuedong D. Huang, Bellvue, WA US
Patent application number | Description | Published |
---|---|---|
20130229330 | CONTROLLING IMAGES AT HAND-HELD DEVICES - Controlling images at hand-held devices using sensor input, for example, as detected by one or more orientation sensors in a hand-held computing device is described. In various embodiments images are displayed at a hand-held computing device according to orientation sensor readings observed at the device and before user input is received at the images. For example, two or more images with different opacities are superimposed and the opacities differentially varied as the hand-held device is tilted. In another example images are placed in a 3D space which is rotated as the device is tilted. In another example, a video is played either forwards or backwards according to an orientation of the device. In various examples the images are displayed as part of a web page by using a template in the web page to control the display of images according to sensor readings. | 09-05-2013 |
Xuedong David Huang, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20090063590 | Operating System Support of Graceful Degradation for Web Applications - Systems and methods for storing a copy of a web page accessed by the user while the user is online and displaying the web page upon a user request while working offline are described. The web pages may be accessed by the user while working online and automatically copied and stored in the memory. While operating in an offline mode, the user can access any of the web pages that were viewed. When the user is working in offline mode inputs a web page query into the browser, the browser checks if the web page requested is present in the memory. If the webpage exists in the memory, the browser fetches and displays the web page on the browser window. In case the requested web page is not available in the local memory, a message can be displayed on the browser indicating that the requested web page is not available. | 03-05-2009 |
20090327418 | PARTICIPANT POSITIONING IN MULTIMEDIA CONFERENCING - A multimedia conference technique is disclosed that allows physically remote users to participate in an immersive telecollaborative environment by synchronizing multiple data, images and sounds. The multimedia conference implementation provides users with the perception of being in the same room visually as well as acoustically according to an orientation plan which reflects each remote user's position within the multimedia conference environment. | 12-31-2009 |
20100228825 | SMART MEETING ROOM - The claimed subject matter provides a system and/or a method that facilitates enhancing the employment of a telepresence session. An automatic telepresence engine that can evaluate data associated with at least one of an attendee, a schedule for an attendee, or a portion of an electronic communication for an attendee. The automatic telepresence engine can identify at least one the following for a telepresence session based upon the evaluated data: a participant to include for the telepresence session, a portion of data related to a presentation within the telepresence session, a portion of data related to a meeting topic within the telepresence session, a device utilized by an attendee to communicate within the telepresence session. The automatic telepresence engine can initiate the telepresence session within a communication framework that includes two or more virtually represented users that communicate therein. | 09-09-2010 |
20120197857 | GESTURE-BASED SEARCH - A search of displayed content may be automatically performed in response to receipt of a search gesture that defines a scope of the search and initiates the search. The search gesture may define a region of content within the displayed content. A search query may be formulated based on the region of content defined by the search gesture. In response to completion of the search gesture, a search may be automatically initiated. In some examples, the search gesture comprises a generally circular gesture that substantially bounds the region of content. | 08-02-2012 |
20120233209 | ENTERPRISE SEARCH OVER PRIVATE AND PUBLIC DATA - A unified search service may collect information related to an enterprise from at least one of publicly available data and private enterprise data. In some implementations, crowd sourcing may be used to determine a source list of one or more sources of information. Authored content can be generated, such as by combining one or more items of information from the public data with one or more items of information from the private enterprise data. Further, in some implementations, a public index may be generated from the public data, and one or more affiliation indexes may be generated from the private enterprise data. For example, a first affiliation index may contain confidential enterprise information, while a second affiliation index may contain non-confidential enterprise information. A user's affiliation to the enterprise may be taken into consideration when determining which indexes to use when responding to a search request from the user. | 09-13-2012 |
20130006957 | GESTURE-BASED SEARCH - Computer-readable media, computer systems, and computing devices for initiating a search function, such as presentation of a search box or initiation of a search, is provided. In one embodiment, the method includes detecting movement of a selector from within a display area to an edge of the display area. Such a selector can be controlled by an input device coupled to a user device. In response to detecting movement of the selector from within the display area to the edge of the display area, a search-query input area associated with a search engine is presented within a display screen view. | 01-03-2013 |
20130226935 | Context-based Search Query Formation - Searching is assisted by recognizing a selection of text from a document as an indication that a user wishes to initiate a search based on the selected text. The user is provided with query suggestions based on the selected text and the query suggestions are ranked based on a context provided by the document. The user may select the text by using a mouse, drawing a circle around the text on a touch screen, or by other input techniques. The query suggestions may be based on query reformulation or query expansion techniques applied to the selected text. Context provided by the document is used by a language model and/or an artificial intelligence system to rank the query suggestions in predicted order of relevance based on the selected text and the context. | 08-29-2013 |
20140244629 | Communication-Powered Search - A communication-powered searching system provides real-time personalized search assistance to a user by integrating search functionality with real-time communication. Upon submitting a query and receiving search results from the communication-powered searching system, the user may select a communication link included in the search results to activate communication with an entity associated with the communication link. The communication-powered searching system may then refine search results displayed to the user based on information exchanged between the user and the entity. The refinements may be made in real time or substantially in real time. | 08-28-2014 |
Yanlin Huang, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20100228623 | TRACKING AD UNIT PERFORMANCE - Methods and computer storage media for tracking and reporting ad unit performance are described. Tags are associated with ad units and may be manually associated and/or extracted from content items to be presented on a webpage associated with an ad unit. Upon receipt of a request for an advertisement to be presented in association with an ad unit, one or more associated tags are also received. Performance of the ad unit may be tracked utilizing the associated tags and one or more performance data elements, for instance, click-through-rate, income generated by the ad unit, visitor data, number of impressions, and expected cost per thousand impressions (eCPM). Reports on the tracked performance may be generated as desired. | 09-09-2010 |
Zhe Huang, Vancouver, WA US
Patent application number | Description | Published |
---|---|---|
20080262484 | Motion-controlled laser surface treatment apparatus - An exposure apparatus for skin treatment or other applications includes a laser diode module controller that is configured to operate one or more laser diodes that are situated to provide optical radiation to an exposure aperture. A two-dimensional position sensor is secured to the exposure aperture and provides an exposure aperture translation signal that is coupled to the laser diode module controller. Delivery of optical radiation to the exposure aperture by the laser diode module controller is based on an exposure aperture translation or velocity that is estimated based on the exposure aperture translation signal. In addition, a clock or timer is coupled to the laser diode module controller to permit selection of laser diode pulse duty cycle or to provide safe or comfortable skin treatment. The two dimensional position sensor can be based on optical sensing such as provided in an optical mouse, and can also provide proximity sensing for safe, efficient operation. | 10-23-2008 |
20090168826 | Semiconductor lasers utilizing optimized n-side and p-side junctions - A semiconductor laser and a method of forming the same are provided. The n-side and p-side junctions are independently optimized to improve carrier flow. The material for the n-side cladding layer is selected to yield a small conduction to valance band gap offset ratio while the material for the p-side cladding layer is selected to yield a large conduction to valance band gap offset ratio. | 07-02-2009 |
Zhenyu Huang, Richland, WA US
Patent application number | Description | Published |
---|---|---|
20100241608 | Decision Support Systems and Methods for Complex Networks - Methods and systems for automated decision support in analyzing operation data from a complex network. Embodiments of the present invention utilize these algorithms and techniques not only to characterize the past and present condition of a complex network, but also to predict future conditions to help operators anticipate deteriorating and/or problem situations. In particular, embodiments of the present invention characterize network conditions from operation data using a state estimator. Contingency scenarios can then be generated based on those network conditions. For at least a portion of all of the contingency scenarios, risk indices are determined that describe the potential impact of each of those scenarios. Contingency scenarios with risk indices are presented visually as graphical representations in the context of a visual representation of the complex network. Analysis of the historical risk indices based on the graphical representations can then provide trends that allow for prediction of future network conditions. | 09-23-2010 |
Ziji Huang, Kenmore, WA US
Patent application number | Description | Published |
---|---|---|
20130120602 | Taking Photos With Multiple Cameras - Various embodiments utilize multiple built-in cameras on a mobile device, e.g., a phone, to capture images, individuals of which include a portion from each of the cameras. The ratio and layout of the portions from different cameras can be adjusted before the image is captured and stored. In at least some embodiments, individual cameras face different directions, and images captured by one of the cameras can be incorporated into images captured by another of the cameras. For example, in at least some embodiments, particularly those in which a user's image is captured, the user's image can be extracted from the view of a first camera, such as a front-facing camera on a mobile device, and displayed to a user in the foreground of the image captured by a second camera, such as a landscape image captured by a back-facing camera on the mobile device. | 05-16-2013 |