Patent application number | Description | Published |
20130030859 | METHODS AND SYSTEMS FOR DEPLOYING A SERVICE WORKFLOW IN A HYBRID CLOUD ENVIRONMENT - A service workflow including ordered services is received, and a heuristic utility value is calculated for each service. A best node having a smallest heuristic utility value for a service is selected, and a best node identifier is placed in a node list. If the best node includes a parallel sub-workflow, potential next nodes are identified by generating potential next nodes from a data center that can perform a service associated with the best node with a minimum run-time value. Otherwise, potential next nodes are generated based on a data center associated with the service. A heuristic utility value is determined for each potential next node, and a new best node is selected based on the heuristic utility values. The identifying, determining, and selecting operations are repeated until the best node contains only the last ordered service. Data centers for each ordered service are identified based on the best node. | 01-31-2013 |
20130067434 | SYSTEMS AND METHODS FOR DISAMBIGUATING DIALECTS IN LIMITED SYNTAX LANGUAGES TO REDUCE SYSTEM FRAGILITY - An embodiment generally relates to systems and methods for improving system performance by reducing fragility of computing systems. A processing module can identify separate ensemble files each comprising interpretations, by separate entities of a workflow, of a phrase in a file. The processing module can compare the interpretations to determine if the interpretations are the same or essentially the same. If the interpretations are neither the same nor essentially the same, a subsequent entity in the workflow can create a new file that replaces an associated interpretation of the phrase with a common interpretation. The subsequent entity can proceed with an intended operation. | 03-14-2013 |
20130110758 | METHODS AND SYSTEMS FOR SCALABLE EXTRACTION OF EPISODE RULES USING INCREMENTAL EPISODE TREE CONSTRUCTION IN A MULTI-APPLICATION EVENT SPACE | 05-02-2013 |
20130242339 | SYSTEM AND METHOD FOR DYNAMIC REDEPLOYMENT OF CLOUD-BASED SERVICES - A method of scheduling a print job may include determining a first set of deployments that includes one or more deployments. Each deployment in the first set may include an indication of a logical device in a cloud environment and an indication of a production center. The method may include for one or more deployments in the first set of deployments, determining a total compliance value associated with the deployment, identifying a subset of deployments based on, at least in part, the associated total compliance values, generating a new set of deployments based on, at least in part, the identified subset of deployments, and in response to the first set of deployments being an improvement over the new set of deployments, incrementing a count variable, and repeating the determining a total compliance value, identifying, and generating operations until the count variable equals an exit condition value. | 09-19-2013 |
20130298135 | Dynamically Allocating Multitier Applications Based Upon Application Requirements and Performance Reliability of Resources - The present disclosure relates to dynamically allocating multitier applications based upon performance and reliability of resources. A controller analyzes resources and applications hosted by the resources, and collects operational data relating to the applications and resources. The controller is configured to determine an allocation scheme for allocating or reallocating the applications upon failure of a resource and/or upon rollout or distribution of a new application. The controller generates configuration data that describes steps for implementing the allocation scheme. The resources are monitored, in some embodiments, by monitoring devices. The monitoring devices collect and report the operational information and generate alarms if resources fail. | 11-07-2013 |
20130311994 | SYSTEMS AND METHODS FOR SELF-ADAPTIVE EPISODE MINING UNDER THE THRESHOLD USING DELAY ESTIMATION AND TEMPORAL DIVISION - Embodiments relate to systems and methods for self-adaptive episode mining under time threshold using delay estimation and temporal division. An episode mining engine can analyze a set of episodes captured from a set of network resources to detect all sequences of user-specified frequency within a supplied runtime budget or time threshold. The engine can achieve desired levels of completeness in the results by mining the input log file in multiple stages or steps, each having successively longer lengths of event sequences. After completion of each stage, the engine calculates a remaining amount of runtime budget, and updates the amount of time to be allocated for each of the remaining stages up to a generated maximum stage (or sequence length). The engine thus corrects the estimated remaining time in the runtime budget (or threshold) after each stage, and continues to the next stage until the runtime budget is consumed. | 11-21-2013 |
20130318388 | METHOD AND SYSTEM FOR COMPUTING ENERGY RATING FOR CLOUD-BASED SOFTWARE SERVICES - A method for computing the energy rating for cloud-based software services is disclosed. For each of the service, following steps are performed. The method includes identifying configuration parameters impacting the energy consumption. The method further includes determining a value for each configuration parameter. Further, the method includes determining a relative energy rating using a pre-determined equation, based on the values of the configuration parameter. Finally, the method includes assigning a discrete value based on the range of the relative energy rating. | 11-28-2013 |
20130332992 | METHODS AND SYSTEMS FOR IDENTIFYING A TRUSTABLE WORKFLOW BASED ON A COMPREHENSIVE TRUST MODEL - Methods and systems for identifying a trustable workflow based on a comprehensive trust model. One or more trustable links between two or more abstract services among a number of combinations of concrete services can be searched and the trustable link combined to realize an abstract workflow so as to construct a candidate trustable workflow space. The K trustable workflows can be determined by randomly selecting the trustable link with respect to each pair of connected abstract services and combining the selected trustable links. The trustable link in the workflow can be selected to be replaced with another candidate trustable link to provide a higher selection probability to the trustable link in a critical path. | 12-12-2013 |
20130346447 | SYSTEMS AND METHODS FOR BEHAVIORAL PATTERN MINING - Methods and systems of performing data mining may include receiving a plurality of web log records and a plurality of call log records; associating one or more web log records with a call log record, wherein the associated user for each of the associated one or more web log records and the call log record are the same; identifying one or more patterns among the web log records for the plurality of call log records, wherein each pattern comprises one or more web accesses, a time stamp at which each of the one or more web accesses is performed and the call topic for the call log record; identifying one or more web log records associated with a new call, and predicting a call topic for the new call based on at least one pattern and the one or more web log records. | 12-26-2013 |
20140012987 | METHOD AND SYSTEM FOR HANDLING LOAD ON A SERVICE COMPONENT IN A NETWORK - A method, a system and a computer program product for handling requests in a network are disclosed. A load pattern at a first service component is extracted. A capacity and pending requests at the first service component are calculated based on the load pattern. Thereafter, an insertion delay is calculated based on the capacity, pending requests, and a time period required to increase the capacity by applying various alternative adaptation techniques. The insertion delay is then distributed among a plurality of upstream service components. | 01-09-2014 |
20140039870 | METHOD FOR TRANSLATING DOCUMENTS USING CROWDSOURCING AND LATTICE-BASED STRING ALIGNMENT TECHNIQUE - A method, a system, and a computer program product for translating a document are disclosed. A document in a source language is received and text snippets are extracted from the same. The text snippets are sent to a first set of remote workers for translation and a second set of remote workers for validation. The words in the validated text snippets are assigned a probability score. The words with the highest probability score are combined to generate the translated document. | 02-06-2014 |
20140052506 | ENERGY EFFICIENCY IMPROVEMENTS IN CLOUD-BASED ENVIRONMENTS - An energy efficient cloud-based environment includes multiple users requesting delivery of cloud-based services from a cloud service provider. Each user provides inputs for the delivery of one or more specific cloud based services. The inputs include the type of service, time frame for using the service, and either an energy efficiency level or a performance level pertaining to the service's delivery. The service provider allocates different resources to the users for delivering the requested services, and calculates an actual price and an operating energy cost for delivering the requested services to each of the users. The profit of the service provider due to users is calculated. An overall profit of the service provider associated with delivering the cloud-based services is calculated, and a fraction of the overall profit is distributed as an incentive among the users. The incentive of each user is proportional to the profit contribution of that user. | 02-20-2014 |
20140074647 | METHODS AND SYSTEMS FOR RECOMMENDING CLOUD CONFIGURATION IN A CLOUD SERVICE MARKET PLACE - In a method and system for providing one or more cloud services in a cloud, one or more high-level parameters are received from a customer through a service requisition interface; a cloud configuration is generated along with a Service Level Agreement (SLA) based on the received high-level parameters; the generated cloud configuration along with the SLA is recommended to the customer through an output interface; the customer is allowed to negotiate the SLA recommendation through the service requisition interface based on a tradeoff between the one or more high level details at a service layer of the cloud through an SLA negotiation system; and the one or more cloud services are provided to the customer based on the negotiated SLA. | 03-13-2014 |
20140156518 | METHOD AND SYSTEMS FOR SUB-ALLOCATING COMPUTATIONAL RESOURCES - The disclosed embodiments relate to systems and methods for method and systems for sub-allocating computational resources. A first computing device receives information associated with a first set of computational resources from a cloud infrastructure. The first set of computational resources has been allocated to the first computing device by the cloud infrastructure. A first set of parameters associated with a workflow received by the first computing device is determined. The first set of parameters is indicative of a need of the first set of computational resources by the first computing device. One or more computational resources from the first set of computational resources are sub-allocated based on the determined first set of parameters. | 06-05-2014 |
20140200947 | METHODS AND SYSTEMS FOR REGULATING SERVICE LAYER AGREEMENTS FOR MULTIPLE CLOUD SERVICE REQUESTS - Methods and systems are disclosed for providing cloud services to multiple customers in a cloud. One embodiment includes receiving a number of requests for the cloud services from the multiple customers simultaneously or substantially simultaneously; prioritizing the requests based on a probability distribution of actually deploying a service, a budget of the customers, and an expected demand of the requested service based on the probability distribution; generating a number of cloud configurations along with a number of Service Level Agreements (SLAs) for the customers based on prioritization of the requests, a class & past behavior of the customers, and a current demand of the cloud services, the SLAs of the customers include differentiated price offering; recommending the cloud configurations and the SLAs to the customers; allowing the customers to negotiate terms of the SLAs; and providing the cloud services based on the negotiated SLAs to the customers. | 07-17-2014 |
20140280946 | SYSTEM AND PROCESS TO RECOMMEND CLOUD SERVICE CLOUD CONFIGURATION BASED ON SERVICE SIMILARITY - A method provides a recommendation for a cloud configuration for deploying a service. In response to receiving a service request, a database is searched for a cloud configuration. The search is performed by acquiring a resource usage pattern for the service. The resource usage pattern is mapped to a multidimensional space, which is searched for a previously deployed cloud configuration having a similar resource usage pattern. In response to finding a previously deployed cloud configuration, the activity management is determined for the previously deployed cloud configuration. A recommendation is made based on the activity management. | 09-18-2014 |
20140325151 | METHOD AND SYSTEM FOR DYNAMICALLY MANAGING BIG DATA IN HIERARCHICAL CLOUD STORAGE CLASSES TO IMPROVE DATA STORING AND PROCESSING COST EFFICIENCY - A system and method for autonomic data storage and movement for big data analytics. A cost, such as storing cost and a processing cost are calculated for received data. The processing type associated with the received data is determined in response to the calculated costs. The received data is classified as one of a set of hierarchical storage classes based upon the determined processing type. The hierarchical storage classes include no data store, memory, HDFS, database, disk archive, external clouds, and data removal. The received data is then stored in the storage location associated with that class. In the event that insufficient capacity is available in the location, the priority of the received data and the priority of previously stored data is determined and compared. The priority is calculated based on potential usage, privacy, estimated cost, frequency of usages and the age of data. The lower priority data is then moved to the next lower hierarchical class for storage. | 10-30-2014 |
20150019301 | SYSTEM AND METHOD FOR CLOUD CAPABILITY ESTIMATION FOR USER APPLICATION IN BLACK-BOX ENVIRONMENTS USING BENCHMARK-BASED APPROXIMATION - A system and method for providing cloud performance capability estimation and supporting recommender systems by simulating bottleneck and its migration for any given complex application in a cost-efficient way are provided. To do this, first, the system and method builds an abstract performance model for an application based on the resource usage pattern of the application in an in-house test-bed (i.e., a white-box environment). Second, it computes relative performance scores of many different cloud configurations given from black-boxed clouds using a cloud metering system. Third, it applies the collected performance scores into the abstract performance model to estimate performance capabilities and potential bottleneck situations of those cloud configurations. Finally, using the model, it can support recommender systems by providing performance estimates and simulations of bottlenecks and bottleneck migrations between resource sub-systems while new resources are added or replaced. | 01-15-2015 |
20150142524 | METHODS AND SYSTEMS TO PRICE CUSTOMIZED VIRTUAL MACHINES - Methods and systems for determining prices of customized virtual machines required to process customer-specified workloads are disclosed. A count of instances of the customized virtual machines, required to process the customer-specified workloads is determined, based on a configuration of the customized virtual machines. The instances of the customized virtual machines are consolidated on virtual machine servers. Further, the prices of the customized virtual machines are determined based on a count of the virtual machine servers, unused resources in the virtual machine servers, and unused resources in the customized virtual machines. The determined prices are recommended to the customer. Further, at least one of the prices of the customized virtual machines or the configuration of at least one or more customized virtual machines is modified, based on a response to the recommendation received from the customer. | 05-21-2015 |
20150178419 | METHOD AND APPARATUS FOR ESTIMATING A COMPLETION TIME FOR MAPREDUCE JOBS - A method, non-transitory computer readable medium, and apparatus for estimating a completion time for a MapReduce job are disclosed. For example, the method builds a general MapReduce performance model, computes one or more performance characteristics of each one of one or more benchmark workloads, computes one or more performance characteristics of the MapReduce job in the known processing system, selects a subset of the one or more benchmark workloads that have similar performance characteristics as the one or more performance characteristics of the MapReduce job, targets a cluster of processing nodes in a distributed processing system, computes one or more performance characteristics of the subset of the one or more benchmark workloads in the cluster of processing nodes and estimates the completion time for the MapReduce job. | 06-25-2015 |
20150213106 | METHODS AND SYSTEMS FOR RECOMMENDING CLOUD-COMPUTING SERVICES TO A CUSTOMER - There is provided systems and methods for creating a repository of templates. The templates are deterministic of a configuration a virtual machine. The method includes creating one or more templates for each of one or more applications types based on a benchmark data. Each of the one or more templates is stored in a hierarchal structure having one or more hierarchal levels. Each of the one or more hierarchal levels is indicative of a parameter of the configuration of the virtual machine. Thereafter, one or more rules are defined to traverse through the one or more hierarchal levels to access the one or more templates. | 07-30-2015 |
20150256434 | METHODS AND SYSTEMS TO IDENTIFY BOTTLENECK CAUSES IN APPLICATIONS USING TEMPORAL BOTTLENECK POINT DETECTION - Methods and systems are provided for determining performance characteristics of an application processing system. The method comprises monitoring throughput of a plurality of resources of the system in a selected time window. A change rate is detected in the throughput of the resources, respectively, representative of a change to constancy of workload in at least some of the resources. Such a change in constancy comprises a knee point of a plot of resource usage comprising load relative to throughput. The time of the change rate is identified within the time window. A relatively first to occur of a plurality of resources knee points is determined wherein the resource corresponding to the first to occur is determined to have a fully loaded throughput within the multi-tier processing system. The determination of the first to occur knee point comprises pinpointing a bottleneck starting point within the application processing system. | 09-10-2015 |
20150286935 | METHODS AND SYSTEMS FOR RECOMMENDING COMPUTATIONAL RESOURCES - Methods and systems for recommending one or more computational resources. A portion of computational resources is determined from a set of computational resources associated with a datacenter based on a user-profile associated with a user, from one or more users, and the set of computational resources. The user-profile comprises at least one of a required performance level, a required load, or a cost constraint. The one or more computational resources are recommended from the portion of computational resources, in response to requests received from the one or more users. | 10-08-2015 |
Patent application number | Description | Published |
20150262143 | SOCIAL NETWORKING SYSTEM AND METHOD - A method, computer program product, and computing system for defining a plurality of users within a social network, wherein a social currency amount is associated with each of the plurality of users of the social network. A social network bank is established within the social network, wherein the social network bank is configured to effectuate one or more social currency exchanges between at least one user of the plurality of users of the social network and a commercial banking institution. | 09-17-2015 |
20150262144 | SOCIAL NETWORKING SYSTEM AND METHOD - A method, computer program product, and computing system for defining a first user within a social network. A first social currency amount is associated with the first user of the social network. A reaction is received concerning the first user of the social network from a second user of the social network. The first social currency amount of the first user of the social network is adjusted based, at least in part, upon the reaction from the second user of the social network, thus defining a revised social currency amount for the first user of the social network. | 09-17-2015 |
20150262252 | SOCIAL NETWORKING SYSTEM AND METHOD - A method, computer program product, and computing system for defining a first user within a social network, wherein a first social currency amount is associated with the first user of the social network. A second user is defined within the social network, wherein a second social currency amount is associated with the second user of the social network. A portion of the second social currency amount is transferred to a first account associated with the first social currency amount. In response to transferring the portion of the second social currency amount, the second user of the social network is allowed to advertise on a portion of the social network controlled by the first user of the social network. | 09-17-2015 |
20150262260 | SOCIAL NETWORKING SYSTEM AND METHOD - A method, computer program product, and computing system for defining a plurality of users within a social network, wherein a social currency amount is associated with each of the plurality of users of the social network. A social network bank is established within the social network, wherein the social network bank is configured to effectuate one or more social currency transfers between the plurality of users of the social network. | 09-17-2015 |
20150262261 | SOCIAL NETWORKING SYSTEM AND METHOD - A method, computer program product, and computing system for defining a first user within a social network. A first social currency score is associated with the first user of the social network. A reaction is received concerning the first user of the social network from a second user of the social network. The first social currency score of the first user of the social network is adjusted based, at least in part, upon the reaction from the second user of the social network, thus defining a revised social currency score for the first user of the social network. | 09-17-2015 |
20150262314 | SOCIAL NETWORKING SYSTEM AND METHOD - A method, computer program product, and computing system for defining a first user within a social network, wherein a first social currency amount is associated with the first user of the social network. A first virtual paywall is associated with the first user of the social network. A second user is defined within the social network, wherein a second social currency amount is associated with the second user of the social network. A portion of the second social currency amount is transferred, via the first virtual paywall, to a first account associated with the first social currency amount. In response to transferring the portion of the second social currency amount, a commercial transaction is effectuated between the first user of the social network and the second user of the social network. | 09-17-2015 |
Patent application number | Description | Published |
20140099643 | USE OF PERTURBANTS TO FACILITATE INCORPORATION AND RECOVERY OF TAGGANTS FROM POLYMERIZED COATINGS - The invention provides methods for increasing the recoverability of taggants from an object. The methods include the steps of incorporating a taggant into a solution; mixing the solution including the taggant with a perturbant to form a first perturbant taggant solution; mixing the first perturbant taggant solution with a polymer to form a second perturbant taggant polymer solution; and applying the second perturbant taggant polymer solution to at least a portion of the object to form a taggant-coated object. Methods for authentication of a taggant marked object are also provided. | 04-10-2014 |
20140106357 | SECURITY SYSTEM AND METHOD OF MARKING AN INVENTORY ITEM AND/OR PERSON IN THE VICINITY - A method of marking an inventory item includes providing an activatable smoke generator and a reservoir for holding a smoke fluid and adapted to provide a flow of smoke fluid to the generator. The reservoir contains a smoke fluid including a carrier nucleic acid having a uniquely identifiable sequence, and upon activation of the smoke generator, marker smoke is generated and targeted to flow over the inventory item. The method further includes activating the smoke generator to produce the marker smoke including the carrier nucleic acid so as to cause the marker smoke to flow over the inventory item and thereby to detectably mark the inventory item with carrier nucleic acid. | 04-17-2014 |
20140256881 | ALKALINE ACTIVATION FOR IMMOBILIZATION OF DNA TAGGANTS - The invention provides methods for stably binding and immobilizing deoxyribonucleic acid onto objects and substrates. The method includes exposing the deoxyribonucleic acid to alkaline conditions, and contacting the deoxyribonucleic acid to the object or substrate. The alkaline conditions are produced by mixing the deoxyribonucleic acid with an alkaline solution having a pH of about 9.0 or higher, and contacting the deoxyribonucleic acid to the substrate. The immobilized DNA can be used as a taggant and can be used in combination with other detectable taggants, such as optical reporters. Methods for authentication of a DNA marked object are also provided. | 09-11-2014 |
20140272097 | DNA MARKING OF PREVIOUSLY UNDISTINGUISHED ITEMS FOR TRACEABILITY - The invention provides a method of marking an item with a naturally-derived or synthetic non-natural polymeric marker molecules, such as a DNA or Peptide marker in conjunction with optional visible or rapid scan reporters for authenticating or tracking, in which the method includes providing an item for marking, and applying a medium including a DNA marker to the item. The invention also provides a method of marking an item with a DNA marker for authenticating or tracking, in which the method includes providing a medium including a DNA marker, and molding the medium including the DNA marker to provide all or part of the item. The DNA marker encodes information unique to the item and/or the model of the item as desired. | 09-18-2014 |
20150018538 | METHOD AND DEVICE FOR MARKING ARTICLES - Provided are a method and device for marking an article for security, tracking or authentication. The method includes depositing a solution comprising a nucleic acid marker onto at least a portion of the article. The nucleic acid marker may be activated, for example, by adding a functional group to the nucleic acid marker. The activation of the nucleic acid marker may be performed by exposure to alkaline conditions. The method is well suited for marking fibers and textiles, as well as many other items. | 01-15-2015 |
20150083797 | VERIFICATION OF PHYSICAL ENCRYPTION TAGGANTS USING DIGITAL REPRESENTATIVES AND AUTHENTICATIONS THEREOF - A verifiably identifiable object that includes a primary taggant encoding a readable encrypted first identifier of the object encrypted by a first method and a secondary taggant encoding a readable encrypted second identifier of the object optionally encrypted by a second method. The primary taggant can be a physical identification taggant, such as DNA including an authentication sequence, and the secondary taggant can be a digital identification taggant. The digital identification taggant encodes information validating the physical identification taggant, such as by referencing information embodied in the physical taggant, e.g. the defined sequence within the DNA. Also included is a method and system for identification and/or authentication of an object that includes a primary taggant encoding a readable encrypted first identifier of the object encrypted by a first method and a secondary taggant encoding a readable encrypted second identifier of the object encrypted by a second method. | 03-26-2015 |
20150107475 | DNA MARKING OF PREVIOUSLY UNDISTINGUISHED ITEMS FOR TRACEABILITY - The invention provides a method of marking an item with naturally-derived or synthetic non-natural polymeric marker molecules, such as a DNA or Peptide marker in conjunction with optional visible or rapid scan reporters for authenticating or tracking, in which the method includes providing an item for marking, and applying a medium including a DNA marker to the item. The invention further provides methods for stably binding and immobilizing activated deoxyribonucleic acid onto objects and substrates. The method includes exposing the deoxyribonucleic acid to alkaline conditions, and contacting the deoxyribonucleic acid to the object or substrate. Also provided are methods for increasing the recoverability of taggants from an object. The methods include the steps of incorporating a taggant into a solution; mixing the solution including the taggant with a perturbant to form a first perturbant taggant solution; mixing the first perturbant taggant solution with a polymer to form a second perturbant taggant polymer solution; and applying the second perturbant taggant polymer solution to at least a portion of the object to form a taggant-coated object. The invention also provides a method of marking an item with a DNA marker for authenticating or tracking, in which the method includes providing a medium including a DNA marker, and molding the medium including the DNA marker to provide all or part of the item. The DNA marker encodes information unique to the item and/or the model of the item as desired. | 04-23-2015 |
20150141264 | IN-FIELD DNA EXTRACTION, DETECTION AND AUTHENTICATION METHODS AND SYSTEMS THEREFOR - The invention provides a method for in-field detection of a distinctive marker. The method includes providing a sample from an article of interest and analyzing the sample to detect the presence of the distinctive marker. The analysis is performed using an in-field detection instrument. The in-field detection instrument includes a microsystem configured to perform sample in-answer out analysis and detect the presence of the distinctive marker in the sample. | 05-21-2015 |
20150275271 | PLASMA TREATMENT FOR DNA BINDING - The invention provides a composition including DNA bonded to a plasma-treated surface, the plasma can be any suitable plasma, such as an argon plasma, a compressed air plasma, a flame-based plasma or a vacuum plasma. Surfaces treatable by the methods of the invention include ceramic, metal, fabric and organic polymer surfaces. The DNA can be any DNA, such as a marker DNA, which can be linear or circular, single-stranded or double stranded and from about 25 bases to about 10,000 bases in length. Also provided is a method of binding DNA to a surface, including the steps of exposing the surface to a plasma to produce a plasma-treated surface; and applying DNA to the plasma-treated surface to produce surface bound DNA on the treated surface. A system for binding DNA to a surface is also disclosed, the system includes a plasma generator adapted to treating a surface with a plasma to produce a plasma-treated surface; and an applicator containing DNA adapted to applying DNA to the plasma-treated surface to produce surface bound DNA on the plasma-treated surface. | 10-01-2015 |
20150302713 | SECURITY SYSTEM AND METHOD OF MARKING AN INVENTORY ITEM AND/OR PERSON IN THE VICINITY - A method of marking an inventory item includes providing an activatable smoke generator and a reservoir for holding a smoke fluid and adapted to provide a flow of smoke fluid to the generator. The reservoir contains a smoke fluid including a carrier nucleic acid having a uniquely identifiable sequence, and upon activation of the smoke generator, marker smoke is generated and targeted to flow over the inventory item. The method further includes activating the smoke generator to produce the marker smoke including the carrier nucleic acid so as to cause the marker smoke to flow over the inventory item and thereby to detectably mark the inventory item with carrier nucleic acid. | 10-22-2015 |
20150304109 | CONTOUR ENCRYPTION AND DECRYPTION - A method of encrypting information includes converting an information sequence represented as a strings of bits into a curvilinear coding system, where each element of the curvilinear coding system corresponds to a sub-sequence of successive same-valued bits, converting said curvilinear coding system into a at least one closed curve, and embedding said at least one closed curve in a 2-dimensional pattern. A method for decrypting information includes extracting at least one closed curve from a digitized 2-dimensional pattern, and converting the at least one closed curve into an information sequence represented as a string of bits. | 10-22-2015 |
Patent application number | Description | Published |
20140023834 | IMAGE TRANSFER PROCESS EMPLOYING A HARD MASK LAYER - At least one mask layer formed over a substrate includes at least one of a dielectric material and a metallic material. By forming a first pattern in one of the at least one mask layer, a patterned mask layer including said first pattern is formed. An overlying structure including a second pattern that includes at least one blocking area is formed over said patterned mask layer. Portions of said patterned mask layer that do not underlie said blocking area are removed. The remaining portions of the patterned mask layer include a composite pattern that is an intersection of the first pattern and the second pattern. The patterned mask layer includes a dielectric material or a metallic material, and thus, enables high fidelity pattern transfer into an underlying material layer. | 01-23-2014 |
20140024209 | METHOD OF SIMULTANEOUSLY FORMING MULTIPLE STRUCTURES HAVING DIFFERENT CRITICAL DIMENSIONS USING SIDEWALL TRANSFER - A method of forming multiple different width dimension features simultaneously. The method includes forming multiple sidewall spacers of different widths formed from different combinations of conformal layers on different mandrels, removing the mandrels, and simultaneously transferring the pattern of the different sidewall spacers into an underlying layer. | 01-23-2014 |
20140024219 | IMAGE TRANSFER PROCESS EMPLOYING A HARD MASK LAYER - At least one mask layer formed over a substrate includes at least one of a dielectric material and a metallic material. By forming a first pattern in one of the at least one mask layer, a patterned mask layer including said first pattern is formed. An overlying structure including a second pattern that includes at least one blocking area is formed over said patterned mask layer. Portions of said patterned mask layer that do not underlie said blocking area are removed. The remaining portions of the patterned mask layer include a composite pattern that is an intersection of the first pattern and the second pattern. The patterned mask layer includes a dielectric material or a metallic material, and thus, enables high fidelity pattern transfer into an underlying material layer. | 01-23-2014 |
20140057436 | THREE PHOTOMASK SIDEWALL IMAGE TRANSFER METHOD - A three photomask image transfer method. The method includes using a first photomask, defining a set of mandrels on a hardmask layer on a substrate; forming sidewall spacers on sidewalls of the mandrels, the sidewall spacers spaced apart; removing the set of mandrels; using a second photomask, removing regions of the sidewall spacers forming trimmed sidewall spacers and defining a pattern of first features; forming a pattern transfer layer on the trimmed sidewall spacers and the hardmask layer not covered by the trimmed sidewall spacers; using a third photomask, defining a pattern of second features in the transfer layer, at least one of the second features abutting at least one feature of the pattern of first features; and simultaneously transferring the pattern of first features and the pattern of second features into the hardmask layer thereby forming a patterned hardmask layer. | 02-27-2014 |
20140329388 | METHODS OF PATTERNING FEATURES HAVING DIFFERING WIDTHS - Disclosed herein are methods of patterning features that have differing widths. In one example, the method includes forming a layer of material above a semiconductor substrate, forming a masking layer above the layer of material, wherein the masking layer is comprised of a first plurality features positioned above a first region of the semiconductor substrate and a second plurality of features positioned above a second region of the semiconductor substrate, wherein the first and second plurality of features have the same pitch spacing and wherein the first and second plurality of features have different widths, and performing at least one etching process on the layer of material through the masking layer. | 11-06-2014 |
20150372113 | METHOD AND STRUCTURE FOR ENABLING HIGH ASPECT RATIO SACRIFICIAL GATES - Sacrificial gate structures having an aspect ratio of greater than 5:1 are formed on a substrate. In some embodiments, each sacrificial gate structure straddles a portion of a semiconductor fin that is present on the substrate. An anchoring element is formed orthogonal to each sacrificial gate structure rendering the sacrificial gate structures mechanically stable. After formation of a planarization dielectric layer, each anchoring element can be removed and thereafter each sacrificial gate structure can be replaced with a functional gate structure. | 12-24-2015 |
20150372127 | METHOD AND STRUCTURE FOR ENABLING HIGH ASPECT RATIO SACRIFICIAL GATES - Sacrificial gate structures having an aspect ratio of greater than 5:1 are formed on a substrate. In some embodiments, each sacrificial gate structure straddles a portion of a semiconductor fin that is present on the substrate. An anchoring element is formed orthogonal to each sacrificial gate structure rendering the sacrificial gate structures mechanically stable. After formation of a planarization dielectric layer, each anchoring element can be removed and thereafter each sacrificial gate structure can be replaced with a functional gate structure. | 12-24-2015 |
20150380514 | JUNCTION OVERLAP CONTROL IN A SEMICONDUCTOR DEVICE USING A SACRIFICIAL SPACER LAYER - Approaches for providing junction overlap control in a semiconductor device are provided. Specifically, at least one approach includes: providing a gate over a substrate; forming a set of junction extensions in a channel region adjacent the gate; forming a set of spacer layers along each of a set of sidewalls of the gate; removing the gate between the set of spacer layers to form an opening; removing, from within the opening, an exposed sacrificial spacer layer of the set of spacer layers, the exposed sacrificial spacer layer defining a junction extension overlap linear distance from the set of sidewalls of the gate; and forming a replacement gate electrode within the opening. This results in a highly scaled advanced transistor having precisely defined junction profiles and well-controlled gate overlap geometry achieved using extremely abrupt junctions whose surface position is defined using the set of spacer layers. | 12-31-2015 |