Patent application number | Description | Published |
20150112601 | Processing Seismic Data by Nonlinear Stacking - Seismic data processing using one or more non-linear stacking enabling detection of weak signals relative to noise levels. The non-linear stacking includes a double phase, a double phase-weighted, a real phasor, a squared real phasor, a phase and an N-th root stack. Microseismic signals as recorded by one or more seismic detectors and transformed by transforming the signal to enhance detection of arrivals. The transforms enable the generation of an image, or map, representative of the likelihood that there was a source of seismic energy occurring at a given point in time at a particular point in space, which may be used, for example, in monitoring operations such as hydraulic fracturing, fluid production, water flooding, steam flooding, gas flooding, and formation compaction. | 04-23-2015 |
20150177400 | DETECTING AND CORRECTING CHANGES IN SIGNAL POLARITY FOR SEISMIC DATA PROCESSING - Utilizing the phase component of a moment tensor for a seismic data signal, isolated from the amplitude component, by automatically detecting polarity changes that occur over a focal mechanism of the seismic event, and correcting for such polarity reversals. Transforming seismic (including microseismic) signals as recorded by one or more seismic detectors to enhance detection of arrivals. The transforms enable the generation of an image, or map, representative of the likelihood that there was a source of seismic energy occurring at a given point in time at a particular point in time. | 06-25-2015 |
20150316669 | PROCESSING MICROSEISMIC DATA - A method of processing microseismic data obtained by a plurality of receivers. The method includes identifying a plurality of subsets of the microseismic data, wherein each subset of the microseismic data corresponds, respectively, to a microseismic event occurring underground at a known source location. The method also includes, for each combination of source location and receiver: determining a travel-time adjustment based on a spatial relationship between the source location and the receiver; and applying the travel-time adjustment to a waveform in a subset of the microseismic data that corresponds to the combination of source location and receiver. The method also includes combining the adjusted subsets of microseismic data to form composite microseismic data. The composite microseismic data may have a higher signal to noise ratio compared with the individual subsets of microseismic data, and as such, may be useful in determining a model that describes one or more properties relating to the propagation of elastic waves from at least one source location to a plurality of receivers, e.g. a static model or total travel-time model. | 11-05-2015 |
Patent application number | Description | Published |
20130061249 | DECOUPLING BACKGROUND WORK AND FOREGROUND WORK - Systems, methods, and apparatus for separately loading and managing foreground work and background work of an application. In some embodiments, a method is provided for use by an operating system executing on at least one computer. The operating system may identify at least one foreground component and at least one background component of an application, and may load the at least one foreground component for execution separately from the at least one background component. For example, the operating system may execute the at least one foreground component without executing the at least one background component. In some further embodiments, the operating system may use a specification associated with the application to identify at least one piece of computer executable code implementing the at least one background component. | 03-07-2013 |
20130061251 | EVENT AGGREGATION FOR BACKGROUND WORK EXECUTION - Systems, methods, and apparatus for separately managing foreground work and background work. In some embodiments, an operating system may identify at least one foreground component and at least one background component of a same application or different applications, and may manage the execution of the components differently. For example, the operating system may receive a request that at least one background component of an application be executed in response to at least one event. In response to detecting an occurrence of the at least one event, the operating system may determine whether at least one first condition set by the application is satisfied and whether at least one second condition set by the operating system is satisfied, and may execute the at least one background component when it is determined that the at least one first and second conditions are satisfied following the occurrence of the at least one event. | 03-07-2013 |
20130067494 | Resuming Applications and/or Exempting Applications from Suspension - Only a particular number of applications on a computing device are active at any given time, with applications that are not active being suspended. A policy is applied to determine when an application is to be suspended. However, an operating system component can have a particular application be exempted from being suspended (e.g., due to an operation being performed by the application). Additionally, an operating system component can have an application that has been suspended resumed (e.g., due to a desire of another application to communicate with the suspended application). | 03-14-2013 |
20140040917 | Resuming Applications and/or Exempting Applications from Suspension - Only a particular number of applications on a computing device are active at any given time, with applications that are not active being suspended. A policy is applied to determine when an application is to be suspended. However, an operating system component can have a particular application be exempted from being suspended (e.g., due to an operation being performed by the application). Additionally, an operating system component can have an application that has been suspended resumed (e.g., due to a desire of another application to communicate with the suspended application). | 02-06-2014 |
20150301835 | DECOUPLING BACKGROUND WORK AND FOREGROUND WORK - Systems, methods, and apparatus for separately loading and managing foreground work and background work of an application. In some embodiments, a method is provided for use by an operating system executing on at least one computer. The operating system may identify at least one foreground component and at least one background component of an application, and may load the at least one foreground component for execution separately from the at least one background component. For example, the operating system may execute the at least one foreground component without executing the at least one background component. In some further embodiments, the operating system may use a specification associated with the application to identify at least one piece of computer executable code implementing the at least one background component. | 10-22-2015 |
20160085601 | TRANSPARENT USER MODE SCHEDULING ON TRADITIONAL THREADING SYSTEMS - Embodiments for performing cooperative user mode scheduling between user mode schedulable (UMS) threads and primary threads are disclosed. In accordance with one embodiment, privileged hardware states are transferred from a kernel portion of a UMS thread to a kernel portion of a primary thread. | 03-24-2016 |
20160092678 | Protecting Application Secrets from Operating System Attacks - Various embodiments provide techniques and devices for protecting application secrets from operating system attacks. In some examples, applications execute with an isolated user mode of a secure execution environment, while relying on an operating system executing within a separate execution environment for resource management and system services. A proxy kernel can control access by the operating system to data associated with the secure execution environment. Further, the proxy kernel can act as a transparent interface between isolated user mode applications and the operating system during the provision of resource management and system services. | 03-31-2016 |
Patent application number | Description | Published |
20140145861 | VEHICLE INTERSECTION WARNING SYSTEM AND METHOD - A vehicle intersection warning method is provided. The method comprises exchanging host vehicle information and remote vehicle information between a host vehicle and a remote vehicle, determining a presence of a road intersection based on at least one of the host vehicle information and the remote vehicle information. determining, by operation of a processor, whether a possibility of contact between the host vehicle and the remote vehicle exists proximate the intersection based on the exchanged host vehicle information and remote vehicle information, and evaluating an operating condition of a brake of the host vehicle while the possibility of contact exists to determine a type of warning to provide to the host vehicle. | 05-29-2014 |
20140148998 | VEHICLE INTERSECTION MONITORING SYSTEM AND METHOD - A vehicle intersection monitoring method includes exchanging host vehicle information and remote vehicle information between a host vehicle and a remote vehicle, identifying a road intersection based on at least one of the host vehicle information and the remote vehicle information, and selecting an intersection scenario from a plurality of intersection scenarios based on the host vehicle information and the remote vehicle information. The method further includes monitoring, by operation of a processor, a location relationship between the host vehicle and the remote vehicle according to an algorithm that is determined based on the selected intersection scenario, to determine whether a possibility of contact between the host vehicle and the remote vehicle exists proximate to the intersection, and performing a threat mitigation operation while the possibility of contact exists. | 05-29-2014 |
20140148999 | VEHICLE INTERSECTION MONITORING SYSTEM AND METHOD - A vehicle intersection monitoring method includes exchanging host and remote vehicle information including information pertaining to host and remote vehicle locations and headings, respectively, and determining whether the host and remote vehicles are travelling on converging paths based on the host vehicle and/or remote vehicle information. The method further includes determining a possibility of the host and remote vehicles contacting each other at a contact location based on host and remote vehicle travel times from the host vehicle and remote vehicle locations, respectively, to the contact location that is determined based on the host and remove vehicle information, determining a threshold value based on a current moving state of the host vehicle while the possibility of the host and remote vehicles contacting each other exists, and evaluating whether to perform a threat mitigation operation based on a condition of the host vehicle in relation to the threshold value. | 05-29-2014 |
20140149031 | VEHICLE INTERSECTION MONITORING SYSTEM AND METHOD - A vehicle intersection monitoring method includes exchanging host vehicle information and remote vehicle information between a host vehicle and a remote vehicle, with the host vehicle information including information pertaining to a host vehicle location, a host vehicle heading and a host vehicle intended next maneuver and the remote vehicle information including information pertaining to a remote vehicle location, a remote vehicle heading and a remote vehicle intended next maneuver. The method further includes identifying a road intersection relating to the host vehicle heading and the remote vehicle heading, selecting an intersection scenario from a plurality of intersection scenarios based on the host vehicle information and the remote vehicle information, and monitoring, by operation of a processor, a location relationship between the host vehicle and the remote vehicle according to an algorithm that is determined based on the selected intersection scenario. | 05-29-2014 |
20140200782 | VEHICLE TURN MONITORING SYSTEM AND METHOD - A vehicle turn monitoring method comprises determining an intent for a host vehicle to execute a left turn before the host vehicle begins to execute the left turn, monitoring a location relationship between the host vehicle and a remote vehicle before the host vehicle begins to execute the left turn, and evaluating a travelling condition of the host vehicle before the host vehicle begins to execute the left turn. The method further includes determining, by operation of a processor, whether to perform a threat mitigation operation before the host vehicle begins to execute the left turn based on the location relationship and the travelling condition. | 07-17-2014 |
20150032362 | VEHICLE COLLISION MONITORING METHOD - A vehicle collision monitoring method comprises preparing a host vehicle message including information pertaining to a host vehicle including a host vehicle location and a host vehicle heading, receiving a remote vehicle message including information pertaining to a remote vehicle including a remote vehicle location and a remote vehicle heading, and evaluating, using a controller, whether the host vehicle heading and the remote vehicle heading are converging paths. The evaluating includes segregating an area surrounding the host vehicle location into a plurality of sectors, determining which of the sectors is a remote vehicle sector including the remote vehicle location, and determining whether the host vehicle heading and the remote vehicle heading are converging paths based on the host vehicle location, the host vehicle heading, the remote vehicle location, the remote vehicle heading and a characteristic relating to the sector that includes the remote vehicle location. | 01-29-2015 |
20150123778 | VEHICLE CONTACT AVOIDANCE SYSTEM - A vehicle contact avoidance system includes a detection system, a warning system, and a controller. The detection system is configured to detect a remote obstacle in proximity to a host vehicle equipped with the vehicle contact avoidance system, including information related to at least one of a speed, a direction and a distance of the remote obstacle relative to the host vehicle. The warning system is configured to emit a warning sound to notify a driver of the host vehicle of imminent contact between the host vehicle and the remote obstacle. The controller is programmed to determine whether contact between the host vehicle and the remote obstacle is imminent based of the information supplied to the controller by the detection system, and programmed to cause the warning system to emit the warning sound. The warning sound includes a non-speech portion and a speech portion. | 05-07-2015 |
20150254977 | VEHICLE CONTACT WARNING METHOD AND SYSTEM - A vehicle contact warning method and system are provided in a host vehicle. A communication device of the host vehicle receives a remote vehicle message including information pertaining to a remote vehicle including a remote vehicle location and a remote vehicle trajectory. A controller of the host vehicle prepares a host vehicle location and a host vehicle trajectory. The controller determines a possibility of contact between the host vehicle and the remote vehicle at a contact location at a contact time based on a host vehicle travel time from the host vehicle location to the contact location based on the host vehicle information and a remote vehicle travel time from the remote vehicle location to the contact location based on the remote vehicle information. The controller automatically operates an external warning device to the host vehicle, the remote vehicle, or both, upon determining the possibility of contact exists between the host vehicle and the remote vehicle. | 09-10-2015 |
20150254982 | ON-BOARD VEHICLE CONTROL SYSTEM AND METHOD FOR DETERMINING WHETHER A VALUE IS WITHIN AN AREA OF INTEREST FOR EXTRANEOUS WARNING SUPPRESSION - An on-board vehicle control system and method employ a storage device that stores information representing a plurality of boundary points of a boundary circumscribing an area of interest in which the boundary points are defined by two prescribed parameters, and a controller that obtains at least one condition point defined by current values of the prescribed parameters, determines a first boundary point of the boundary points that is closest to the condition point, and generates geometric data representing a geometric relationship between the first boundary point, the condition point and a second boundary point of the boundary points. The controller performs further calculations taking into account the geometric data to generate coordinate condition data, and determines whether a warning condition exists by determining whether the condition point lies within the area of interest based on a comparison between coordinates of the condition point and the coordinate condition data. | 09-10-2015 |
20150256534 | ON-BOARD VEHICLE COMMUNICATION SYSTEM AND METHOD - An on-board vehicle communication system and method employ a storage device, a communication device and a controller. The storage device is configured to store a plurality of security certificates. The communication device is configured to receive external information that is external to a host vehicle equipped with the on-board vehicle communication system. The controller is configured to determine whether to begin a security certificate replenishment process to attempt to receive additional security certificates from at least one source that is external of the host vehicle based on the received external information, upon an amount of security certificates stored in the storage device decreasing below a first prescribed threshold. | 09-10-2015 |
20150360601 | VEHICLE HEADLIGHT CONTROL SYSTEM AND METHOD - A vehicle headlight control system includes a headlight, a positioning system, a receiver, and a controller. The positioning system is configured to generate host vehicle information including a host vehicle location and a host vehicle trajectory. The receiver is configured to receive remote vehicle information including a remote vehicle location and a remote vehicle trajectory. The controller is configured to calculate a remote vehicle distance from the host vehicle location based on the remote vehicle information and the host vehicle information, determine whether the remote vehicle distance is less than a predetermined distance, and automatically operate the headlight in a first setting while the remote vehicle distance is determined to be less than the predetermined distance. | 12-17-2015 |
20160027304 | ON-BOARD VEHICLE CONTROL SYSTEM AND METHOD FOR DETERMINING WHETHER A VALUE IS WITHIN AN AREA OF INTEREST FOR EXTRANEOUS WARNING SUPPRESSION - A condition monitoring system and method employ a storage device that stores information representing a plurality of boundary points of a boundary circumscribing an area of interest in which the boundary points are defined by two prescribed parameters, and a controller that obtains at least one condition point defined by current values of the prescribed parameters, determines a first boundary point of the boundary points that is closest to the condition point, and generates geometric data representing a geometric relationship between the first boundary point, the condition point and a second boundary point of the boundary points. The controller performs further calculations taking into account the geometric data to generate coordinate condition data, and determines whether the condition point lies within the area of interest based on a comparison between coordinates of the condition point and the coordinate condition data. | 01-28-2016 |
20160096519 | METHOD AND SYSTEM OF MONITORING PASSENGER BUSES - A method of monitoring passenger buses includes generating host vehicle information with a navigation unit, the host vehicle information including a host vehicle location and a host vehicle heading, receiving passenger bus information with a receiver, the passenger bus information including an passenger bus status, a passenger bus location and a passenger bus heading, determining with a controller a distance between the host vehicle location and the passenger bus location, determining with the controller whether the distance between host vehicle location and the passenger bus location is decreasing, and performing a mitigation operation, when the distance between host vehicle location and the passenger bus location is decreasing, and the distance between host vehicle location and the passenger bus location is a threshold distance or less. | 04-07-2016 |
20160098926 | METHOD AND SYSTEM OF MONITORING EMERGENCY VEHICLES - A method of monitoring emergency vehicles includes generating host vehicle information with a navigation unit, the host vehicle information including a host vehicle location and a host vehicle heading, receiving emergency vehicle information with a receiver, the emergency vehicle information including an emergency vehicle emergency status, an emergency vehicle location and an emergency vehicle heading, determining with a controller a distance between the host vehicle location and the emergency vehicle location, determining with the controller whether the distance between host vehicle and the emergency vehicle is decreasing, and performing a mitigation operation, when the distance between host vehicle and the emergency vehicle is decreasing, and the distance between host vehicle and the emergency vehicle is a threshold distance or less. | 04-07-2016 |
Patent application number | Description | Published |
20140108803 | STEGANOGRAPHIC MESSAGING SYSTEM USING CODE INVARIANTS - A steganographic method to prevent the execution of malicious code and mitigate software piracy. The method uses invariant portions of machine instructions to create an executable watermark within unmodified code. This watermark can be verified at any stage of the software lifecycle, including dynamically and continuously during execution, to detect foreign code by verifying the integrity of the watermark prior to execution. In addition, the watermark may serve as a steganographic covert channel concealing additional information. Code invariants are not altered by binding operations such as loading and linking on different machines, and thus may be employed to consistently and repeatedly identify an unmodified instantiation of a particular program. The use of opcodes and register references as invariants avoids trivial register substitution as a means of program differentiation that eludes detection. The split key structure of the resulting cipher implies that knowledge of only the code (first key) or the cipher table (second key) alone is insufficient to derive the message. | 04-17-2014 |
20140337639 | STEGANOGRAPHIC EMBEDDING OF EXECUTABLE CODE - A method for digital immunity includes identifying a call graph of an executable entity, and mapping nodes of the call graph to a cipher table of obscured information, such that each node based on invariants in the executable entity. A cipher table maintains associations between the invariants and the obscured information. Construction of an obscured information item, such as a executable set of instructions or a program, involves extracting, from the cipher table, ordered portions of the obscured information, in which the ordered portions have a sequence based on the ordering of the invariants, and ensuring that the obscured information matches a predetermined ordering corresponding to acceptable operation, such as by execution of the instructions represented by the obscured information, or steganographic target program (to distinguish from the executable entity being evaluated). The unmodified nature of the executable entity is assured by successful execution of the steganographic target program. | 11-13-2014 |
20160094349 | STEGANOGRAPHIC EMBEDDING OF EXECUTABLE CODE - A method for digital immunity includes identifying a call graph of an executable entity, and mapping nodes of the call graph to a cipher table of obscured information, such that each node based on invariants in the executable entity. A cipher table maintains associations between the invariants and the obscured information. Construction of an obscured information item, such as a executable set of instructions or a program, involves extracting, from the cipher table, ordered portions of the obscured information, in which the ordered portions have a sequence based on the ordering of the invariants, and ensuring that the obscured information matches a predetermined ordering corresponding to acceptable operation, such as by execution of the instructions represented by the obscured information, or steganographic target program (to distinguish from the executable entity being evaluated). The unmodified nature of the executable entity is assured by successful execution of the steganographic target program. | 03-31-2016 |