Patent application number | Description | Published |
20120068837 | Apparatus And Method To Detect Vehicle Theft - Disclosed is an apparatus and method to detect vehicle theft. In one embodiment, a processor may be configured to execute instructions to: receive a vehicle detection signal from a vehicle detector; determine whether a vehicle is present or absent based upon the vehicle detection signal; establish an authentication credential after the vehicle is determined to present; and validate the authentication credential to indicate validated parking. If the vehicle is determined to be absent and an authentication credential to un-park the vehicle has not been validated, a notification action may be transmitted to appropriate personnel to indicate that the vehicle has been moved or un-parked without proper authentication. | 03-22-2012 |
20120254987 | Pairing and authentication process between a host device and a limited input wireless device - Disclosed is an apparatus and method to perform a pairing process with a limited input wireless device. A host device includes a transceiver and a processor. The processor may be configured to execute instructions to: receive from the transceiver a pairing process request from the limited input wireless device, wherein the pairing process request includes a private code based upon a physical user action implemented with the limited input wireless device; and implement a pairing process to validate the limited input wireless device for a particular host device function associated with the private code. | 10-04-2012 |
20130117817 | PREVENTION OF CROSS SITE REQUEST FORGERY ATTACKS BY CONDITIONAL USE COOKIES - To inhibit cross-site forgery attacks, different types/classes of cookies are used. A first cookie and a second cookie are generated by a web server and provided to a client browser during a web session. The first cookie defines a first set of use conditions for when the first cookie is to be used within the web session. The second cookie defines a second set of use conditions for when the second cookie is to be used within the web session. The client browser determines which (if any) of the first cookie or second cookie to send to the web server based on the use conditions defined within each cookie and the operation(s) sought by the client browser. The web server may grant different or the same privileges to operation(s) being sought by the client browser depending on whether the first or second cookie is sent by the client browser. | 05-09-2013 |
20130185792 | DYNAMIC EXECUTION PREVENTION TO INHIBIT RETURN-ORIENTED PROGRAMMING - A method, apparatus, and/or system for execution prevention is provided. A state indicator for a first subset of a plurality of memory pages of executable code in a memory device is set to a non-executable state. A state indicator for a second subset of the plurality of memory pages is set to an executable state, where the second subset of the plurality of memory pages includes indirection stubs to functions in the first subset of the plurality of memory pages. Upon execution of an application, a function call is directed to a corresponding indirection stub in the second subset of the plurality of memory pages which modifies the state indicator for a corresponding function in the first subset of the plurality of memory pages prior to directing execution of the called function from the first subset of the plurality of memory pages. | 07-18-2013 |
20140372701 | METHODS, DEVICES, AND SYSTEMS FOR DETECTING RETURN ORIENTED PROGRAMMING EXPLOITS - Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences. | 12-18-2014 |
Patent application number | Description | Published |
20140269106 | Program Cycle Skip Evaluation Before Write Operations In Non-Volatile Memory - A non-volatile memory system is disclosed that evaluates during a read before write operation whether to skip programming of portions of group of memory cells during a subsequent write operation. By evaluating skip information during a read before write operation, the write operation can be expedited. The additional overhead for evaluating skip information is consumed during the read before write operation. By performing a skip evaluation during the read before write operation, a full analysis of the availability of skipping programming for memory cells can be performed. Skip evaluations in different embodiments may be performed for entire bay address cycles, column address cycles, and/or sense amplifier address cycles. In some embodiments, some skip evaluations are performed during read before write operations while others are deferred to the write operation. In this manner, the number of data latches for storing skip information can be decreased. | 09-18-2014 |
20140281135 | Dynamic Address Grouping For Parallel Programming In Non-Volatile Memory - A non-volatile memory system evaluates user data before writing in order to potentially group addresses for writing within a cycle. The system can determine which sense amplifier addresses of a column address will be programmed in a column address cycle. The number of bits that will be programmed is compared with an allowable number of parallel bits. The system generates groups of sense amplifier addresses based on the comparison. The system generates groups that include a total number of bits to be programmed that is within the allowable number of parallel bits. Each group is programmed in one sense amplifier address cycle. Multiple sense amplifier addresses can be grouped for programming while still remaining within an allowable number of parallel programming bits. The system performs a read before write operation and generates bitmap data for the grouping information corresponding sense amplifier addresses. | 09-18-2014 |
20150073743 | TEMPERATURE SENSOR - According to one embodiment, a temperature sensor includes: a voltage generating part generating (2 | 03-12-2015 |
20150106554 | Regrouping and Skipping Cycles in Non-Volatile Memory - A non-volatile memory system utilizes multiple programming cycles to write units of data, such as a logical page of data, to a non-volatile memory array. User data is evaluated before writing to determine whether programming can be skipped for bay addresses. The system determines whether programming can be skipped for an initial set of bay groups. If a bay group cannot be skipped, the system determines whether the bay group includes individual bays that may be skipped. Bays are regrouped into new bay groups to reduce the number of BAD cycles during programming. Independent column addressing for multiple bays within a bay group is provided. During a column address cycle, a separate column address is provided to the bays to select different columns for programming within each bay. By simultaneously programming multiple column addresses during a single column address cycle, the system may skip programming for some column address cycles. | 04-16-2015 |
20150287459 | Methods For Programming ReRAM Devices - A programming technique for a set of resistance-switching memory cells such as ReRAM cell involves programming the low resistance cells to the high resistance state (in a reset process) early in a programming operation, before programming the high resistance cells to the low resistance state (in a set process), to minimize losses due to leakage currents. The reset process can be performed in one or more phases. In some cases, a current limit is imposed which limits the number of cells which can be reset at the same time. Initially, the cells which are to be reset and set are identified by comparing a logical value of their current resistance state to a logical value of write data. If there is a match, the cell is not programmed. If there is not a match, the cell is programmed. | 10-08-2015 |
Patent application number | Description | Published |
20100106893 | PAGE BUFFER PROGRAM COMMAND AND METHODS TO REPROGRAM PAGES WITHOUT RE-INPUTTING DATA TO A MEMORY DEVICE - A technique for efficiently handling write operation failures in a memory device which communicates with an external host device allows a page of data to be re-written to a memory array from a page buffer. The host provides user data, a first write address and a write command to the memory device. If the write attempt fails, the host provides a re-write command with a new address, without re-sending the user data to the memory device. Additional data can be received at a data cache of the memory device while a re-write from the page buffer is in progress. The re-written data may be obtained in a copy operation in which the data is read out to the host, modified and written back to the memory device. Additional data can be input to the memory device during the copy operation. Page buffer data can also be modified in place. | 04-29-2010 |
20110141788 | PAGE REGISTER OUTSIDE ARRAY AND SENSE AMPLIFIER INTERFACE - A non-volatile storage device includes a substrate, a monolithic three-dimensional memory array of non-volatile storage elements arranged above a portion of the substrate, a plurality of sense amplifiers in communication with the non-volatile storage elements, a plurality of temporary storage devices in communication with the sense amplifiers, a page register in communication with the temporary storage devices, and one or more control circuits. The one or more control circuits are in communication with the page register, the temporary storage devices and the sense amplifiers. The sense amplifiers are arranged on the substrate underneath the monolithic three-dimensional memory array. The temporary storage devices are arranged on the substrate underneath the monolithic three-dimensional memory array. The page register is arranged on the substrate in an area that is not underneath the monolithic three-dimensional memory array. Data read from the non-volatile storage elements by the sense amplifiers is transferred to the temporary storage devices and then to the page register in response to the one or more control circuits. Data to be programmed into the non-volatile storage elements is transferred to the temporary storage devices from the page register in response to the one or more control circuits. | 06-16-2011 |
20110141832 | PROGRAM CYCLE SKIP - A non-volatile storage system includes technology for skipping programming cycles while programming a page (or other unit) of data. While programming a current subset of the page (or other unit) of data, the system will evaluate whether the next subsets of the page (or other unit) of data should be programmed into non-volatile storage elements or skipped. Subsets of the page (or other unit) of data that should not be skipped are programmed into non-volatile storage elements. Some embodiments include transferring the appropriate data to temporary latches/registers, in preparation for programming, concurrently with the evaluation of whether to program or skip the programming. | 06-16-2011 |
20120224408 | THREE DIMENSIONAL MEMORY SYSTEM WITH COLUMN PIPELINE - A monolithic three dimensional array of non-volatile storage elements is arranged in blocks. The non-volatile storage elements are connected to bit lines and word lines. The bit lines for each block are grouped into columns of bit lines. The columns of bit lines include top columns of bit lines that are connected to selection circuits on a top side of a respective block and bottom columns of bit lines that are connected to selection circuits on a bottom side of the respective block. Programming of data is pipelined between two or more columns of bit lines in order to increase programming speed. One embodiment of the programming process includes selectively connecting two columns of bit lines to a set of one or more selection circuits, using the one or more selection circuits to selectively connect one of the two columns of bit lines to one or more signal sources, programming non-volatile storage elements for the column of bit lines that is currently connected to the one or more signal sources, and changing one of the columns of bit lines connected to the set of one or more selection circuits while another column of bit lines is being programmed. | 09-06-2012 |
20120236663 | PROGRAM CYCLE SKIP - A non-volatile storage system includes technology for skipping programming cycles while programming a page (or other unit) of data. While programming a current subset of the page (or other unit) of data, the system will evaluate whether the next subsets of the page (or other unit) of data should be programmed into non-volatile storage elements or skipped. Subsets of the page (or other unit) of data that should not be skipped are programmed into non-volatile storage elements. Some embodiments include transferring the appropriate data to temporary latches/registers, in preparation for programming, concurrently with the evaluation of whether to program or skip the programming. | 09-20-2012 |
20120243349 | PROGRAM CYCLE SKIP - A non-volatile storage system includes technology for skipping programming cycles while programming a page (or other unit) of data. While programming a current subset of the page (or other unit) of data, the system will evaluate whether the next subsets of the page (or other unit) of data should be programmed into non-volatile storage elements or skipped. Subsets of the page (or other unit) of data that should not be skipped are programmed into non-volatile storage elements. Some embodiments include transferring the appropriate data to temporary latches/registers, in preparation for programming, concurrently with the evaluation of whether to program or skip the programming. | 09-27-2012 |
20150243362 | TIMED MULTIPLEX SENSING - Methods for determining memory cell states during a read operation using a detection scheme that reduces the area of detection circuitry for detecting the states of the memory cells by time multiplexing the use of portions of the detection circuitry are described. The read operation may include a precharge phase, a sensing phase, and a detection phase. In some embodiments, a first bit line and a second bit line may be precharged to a read voltage in parallel, and then sensing and/or detection of selected memory cells corresponding with the first bit line and the second bit line may be performed serially using the same detection circuitry by time multiplexing the use of the detection circuitry. In some cases, the time multiplexed detection circuitry may be used for detecting two or more states corresponding with two or more memory cells being sensed during a read operation. | 08-27-2015 |
20160042771 | TIMED MULTIPLEX SENSING - Methods for determining memory cell states during a read operation using a detection scheme that reduces the area of detection circuitry for detecting the states of the memory cells by time multiplexing the use of portions of the detection circuitry are described. The read operation may include a precharge phase, a sensing phase, and a detection phase. In some embodiments, a first bit line and a second bit line may be precharged to a read voltage in parallel, and then sensing and/or detection of selected memory cells corresponding with the first bit line and the second bit line may be performed serially using the same detection circuitry by time multiplexing the use of the detection circuitry. In some cases, the time multiplexed detection circuitry may be used for detecting two or more states corresponding with two or more memory cells being sensed during a read operation. | 02-11-2016 |
20160093373 | APPARATUS AND METHODS FOR SENSING HARD BIT AND SOFT BITS - A method is provided for reading a memory cell of a nonvolatile memory system. The method includes generating a hard bit and N soft bits for the memory cell in a total time corresponding to a single read latency period and N+1 data transfer times. | 03-31-2016 |
Patent application number | Description | Published |
20100105361 | Interrupting and Resuming a Media Player - In an embodiment, a method is provided. The method includes playing a content file with a media player on a cellular telephone. Also, the method includes receiving an interrupt event. Moreover, the method includes saving state of the media player on the cellular telephone in the media player. | 04-29-2010 |
20110296057 | Event Handling In An Integrated Execution Environment - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for handling input received from a common interface of a program and a runtime environment when both the program and the runtime environment are configured to consume the received input. Given that both a browser program and a media player program hosted by the browser program are configured to detect an event of a certain type, there may be a contention of whether the browser program or the media player program may act first on the detected event. The disclosed systems and techniques enable interpretation of a user's intent when the user interacts with a webpage hosting media content and when the user's input occurs over media content rendered by the media player program. Similar advantages may also be realized within the context of another execution environment, or other program, different than a browser program. | 12-01-2011 |
20120162118 | Event Handling In An Integrated Execution Environment - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for handling input received from a common interface of a program and a runtime environment when both the program and the runtime environment are configured to consume the received input. Given that both a browser program and a media player program hosted by the browser program are configured to detect an event of a certain type, there may be a contention of whether the browser program or the media player program may act first on the detected event. The disclosed systems and techniques enable interpretation of a user's intent when the user interacts with a webpage hosting media content and when the user's input occurs over media content rendered by the media player program. Similar advantages may also be realized within the context of another execution environment, or other program, different than a browser program. | 06-28-2012 |
20130009986 | Event Handling In An Integrated Execution Environment - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for handling input received from a common interface of a program and a runtime environment when both the program and the runtime environment are configured to consume the received input. Given that both a browser program and a media player program hosted by the browser program are configured to detect an event of a certain type, there may be a contention of whether the browser program or the media player program may act first on the detected event. The disclosed systems and techniques enable interpretation of a user's intent when the user interacts with a webpage hosting media content and when the user's input occurs over media content rendered by the media player program. Similar advantages may also be realized within the context of another execution environment, or other program, different than a browser program. | 01-10-2013 |
20130012262 | Interrupting and Resuming a Media Player - In an embodiment, a method is provided. The method includes playing a content file with a media player on a cellular telephone. Also, the method includes receiving an interrupt event. Moreover, the method includes saving state of the media player on the cellular telephone in the media player. | 01-10-2013 |
20130211566 | Using Local Codecs - In one embodiment, a method is provided. The method includes evaluating local codecs of a cellular telephone. The method further includes playing a content file with a media player on the cellular telephone. The method also includes accessing encoded media referred to by the content file in a format determined based on local codecs of the cellular telephone. | 08-15-2013 |
Patent application number | Description | Published |
20110138106 | EXTENDING SSD LIFETIME USING HYBRID STORAGE - A hybrid storage device uses a write cache such as a hard disk drive, for example, to cache data to a solid state drive (SSD). Data is logged sequentially to the write cache and later migrated to the SSD. The SSD is a primary storage that stores data permanently. The write cache is a persistent durable cache that may store data of disk write operations temporarily in a log structured fashion. A migration policy may be used to determine how long to cache the data in the write cache before migrating the data to the SDD. The migration policy may be implemented using one or more migration triggers that cause the contents of the write cache to be flushed to the SSD. Migration triggers may include a timeout trigger, a read threshold trigger, and a migration size trigger, for example. | 06-09-2011 |
20110208958 | COMMUNICATING USING A CLOUD INFRASTRUCTURE - A cloud infrastructure that communicates with computing devices is provided. The computing devices install filters on other computing devices that they wish to receive items from including pictures, messages, and documents. The filters include criteria that are evaluated on the computing devices, rather than at a server, to determine if an item may be sent to another computing device. The computing devices may then send items that match the criteria to the cloud infrastructure, and the items may be stored and queued for delivery to other computing devices. The items may be encrypted before being provided to the cloud infrastructure, and decrypted when received by the computing devices. | 08-25-2011 |
20110295969 | TOTALLY ORDERED LOG ON APPENDABLE STORAGE - Computers are provided with a totally ordered, durable shared log. Shared storage is used and can be directly accessed by the computers over a network. Append-log operations are made atomic in the face of failures by committing provisional append ordering information onto a log. The log may comprise multiple flash packages or non-volatile memory devices, referred to as segments, although any shared storage device(s) may be used. Each log record is a multi-page stripe, where each page of a stripe is written to a different segment. Fault-tolerant protocol variants append stripes to the log, such that stripes are totally ordered in the log and each stripe is written atomically. | 12-01-2011 |
Patent application number | Description | Published |
20120130196 | Mood Sensor - In particular embodiments, a method includes receiving and recording inputs identifying a mood of a person, a mood intensity level of the mood, an activity of the person coinciding with the mood, and time of the mood. | 05-24-2012 |
20120289790 | Continuous Monitoring of Stress Using Self-Reported Psychological or Behavioral Data - In particular embodiments, a method includes accessing data streams from a mood sensor and one or more of a heart-rate monitor, a blood-pressure monitor, a pulse oximeter, or an accelerometer monitoring a person, analyzing data sets collected from the person when the person is stressed and unstressed, analyzing the data sets, and determining a current stress index of the person based on the analysis. | 11-15-2012 |
20120289791 | Calculating and Monitoring the Efficacy of Stress-Related Therapies - In particular embodiments, a method includes accessing data streams from at least two of an accelerometer, a heart-rate monitor, a blood-pressure monitor, a pulse oximeter, or a mood sensor monitoring a person, analyzing data sets collected from the person when the person is engage and not engaged in a therapy, and determining a current stress factor for the therapy on the person based on the analysis. | 11-15-2012 |
20120289793 | Continuous Monitoring of Stress Using Accelerometer Data - In particular embodiments, a method includes accessing data streams from an accelerometer and one or more of a heart-rate monitor, a blood-pressure monitor, a pulse oximeter, or a mood sensor monitoring a person, analyzing data sets collected from the person when the person is engaged in various activities, and determining a current stress index of the person based on the analysis. | 11-15-2012 |
20120290215 | Calculating and Monitoring a Composite Stress Index - In particular embodiments, a method includes accessing data streams from a first group of physiological sensors monitoring a person, a second group of deconfounding sensors monitoring the person, and a third group of sensors monitoring a stressor, analyzing data sets collected from the person when the person is exposed and not exposed to the stressor, and determining a current stress factor for the stressor with respect to the person based on the analysis. | 11-15-2012 |
20120290266 | Data Aggregation Platform - In particular embodiments, a method includes accessing an original data stream from a sensor, associating a timestamp with each of the samples in the data stream based on a system clock, and recording the original data stream with the associated timestamps. | 11-15-2012 |
20140006493 | SYSTEM AND METHOD OF RECOMMENDING ACTIONS BASED ON SOCIAL CAPITAL OF USERS IN A SOCIAL NETWORK | 01-02-2014 |
20150268641 | DYNAMIC ENVIRONMENT ADAPTATION - A method of dynamically adapting an environment may include collecting sensor data from a biological sensor and an environmental sensor. The method may also include, based on the sensor data, determining whether an optimal environmental state exists in an environment. The optimal environmental state may be defined in a health and wellness policy and may be configured to promote an optimal biological state of an individual in the environment. In response to the optimal environmental state not existing in the environment, the method may include identifying an environmental condition that differs from the optimal environmental state and generating a command configured to alter an operational state of an environmental device that affects the environmental condition. | 09-24-2015 |
Patent application number | Description | Published |
20120197852 | Aggregating Sensor Data - In particular embodiments, a method includes accessing sensor data from sensor nodes in a sensor network and aggregating the sensor data for communication to an indexer in the sensor network. The aggregation of the sensor data includes deduplicating the sensor data; validating the sensor data; formatting the sensor; generating metadata for the sensor data; and time-stamping the sensor data. The metadata identifies one or more pre-determined attributes of the sensor data. The method also includes communicating the aggregated sensor data to the indexer in the sensor network. The indexer is configured to index the aggregated sensor data according to a multi-dimensional array for querying of the aggregated sensor data along with other aggregated sensor data. One or more first ones of the dimensions of the multi-dimensional array include time and one or more second ones of the dimensions of the multi-dimensional include one or more of the pre-determined sensor-data attributes. | 08-02-2012 |
20120197856 | Hierarchical Network for Collecting, Aggregating, Indexing, and Searching Sensor Data - In particular embodiments, a system includes a sensor-data-collection network layer including multiple sensors. The sensor-data-collection network layer is a first logical layer of a sensor network. The system includes an aggregation network layer including one or more aggregators configured to access sensor data from the sensors and aggregate the sensor data. The aggregation network layer is a second logical layer residing logically above the first logical layer. The system includes an indexing network layer including one or more indexers that are configured to access the aggregated sensor data and generate an index of the aggregated sensor data according to a multi-dimensional array. The indexing network layer is a third logical layer residing logically above the second logical layer. The system includes a search network layer including one or more search engines. The search network layer is a fourth logical layer residing logically above the third logical layer. | 08-02-2012 |
20120197898 | Indexing Sensor Data - In particular embodiments, a method includes, from an indexer in a sensor network, accessing a set of sensor data that includes sensor data aggregated together from sensors in the sensor network, one or more time stamps for the sensor data, and metadata for the sensor data identifying one or more pre-determined attributes of the sensor data. The method includes, at the indexer, generating an index of the set of sensor data according to a multi-dimensional array configured for querying of the set of sensor data along with a plurality of other sets of sensor data. One or more first ones of the dimensions of the multi-dimensional array include time, and one or more second ones of the dimensions of the multi-dimensional array include one or more of the pre-determined sensor-data attributes. The method includes, from the indexer, communicating the index of the set of sensor data for use in responding to one or more queries of the set of sensor data along with a plurality of other sets of sensor data. | 08-02-2012 |
20120197911 | Searching Sensor Data - In particular embodiments, a method includes receiving a query for particular sensor data among multiple sensor data from multiple sensors. The plurality of sensor data has been indexed according to a multi-dimensional array. One or more first ones of the dimensions include time, and one or more second ones of the dimensions include one or more pre-determined sensor-data attributes. The method includes translating the query to correspond to the indexing of the plurality of sensor data. The translated query includes one or more values for one or more of the dimensions of the multi-dimensional array. The method includes communicating the translated query to search among the plurality of sensor data according to its indexing to identify the particular sensor data. | 08-02-2012 |
20150365382 | METHOD AND APPARATUS FOR ENFORCING STORAGE ENCRYPTION FOR DATA STORED IN A CLOUD - In one embodiment, a method includes providing a request to store at least a first piece of data. The request to store the first piece of data is a request to store the first piece of data in a first encrypted form on a cloud associated with the cloud application provider. The method also includes determining whether the cloud application provider is capable of encrypting the first piece of data, and providing the first piece of data to the cloud application provider if it is determined that the cloud application provider is capable of encrypting the first piece of data. If it is determined that the cloud application provider is not capable of encrypting the first piece of data, the method further includes encrypting the first piece of data to create the first encrypted form and providing the first encrypted form to the cloud application provider. | 12-17-2015 |
Patent application number | Description | Published |
20140122994 | EVENT-BASED CONTENT ITEM VIEW - Systems, methods, and computer-readable storage media for an event-based photo view in a browser are disclosed. The system can receive a request to display a set of content items associated with a user account. The system can generate a web page based on a size of the set of files, the web page providing a continuous presentation of the set of files at the web page on a device, wherein a visible portion of the web page includes a presentation of files, and wherein the files are mapped to an area in the web page that is associated with a current position within the web page. The web page can include an events-based navigation feature. The system can transmit the web page to device for display at the device. | 05-01-2014 |
20140122995 | CONTINUOUS CONTENT ITEM VIEW ENHANCED THROUGH SMART LOADING - Systems, methods, and computer-readable storage media for a continuous photo view on a browser-type application are disclosed. The system can receive a request to display a set of images associated with a user account. The system can generate a web page based on a size of the content items, the web page having a respective placeholder for each of the content items in an area of the web page that is relative to a visible portion of the web page, wherein the web page can provide a continuous presentation of the content items on a device, and wherein the web page can be configured to dynamically load and unload content items based on a current position of the web page. | 05-01-2014 |
20140181014 | PRESERVING CONTENT ITEM COLLECTION DATA ACROSS INTERFACES - Systems, methods, and computer-readable storage media for preserving collection data across interfaces are disclosed. The system can generate, for a collection of content items stored in multiple user accounts in a synced online content management system, an index of the content items in the collection. The index can store, a content item identifier and a file location, for each content item. Upon detecting that a content item in the collection is moved to a new file location, the system can retrieve a collection identifier from metadata associated with the content item. The system can then locate the index for the collection associated with the collection identifier based on the collection identifier retrieved from the metadata associated with the content item. The system can then update the file location stored at the index for the content item to identify the new file location. | 06-26-2014 |
20140181159 | SYSTEM AND METHOD FOR ORGANIZING FILES BASED ON AN IDENTIFICATION CODE - A system for determining a time that a file was created and associating an ID with the file based on the file creation time is disclosed. The system adjusts the creation time by a time zone offset. In the case of image files, the file creation time may be based on information associated with the image: (1) by the camera that took the picture (exchangeable image file data); (2) when the photo was last modified in memory (file modification time data); (3) based on the raw date and time the photo file was created (file date-time data); and (4) when the photo was imported onto a client device. The system may rename the file with this adjusted creation time to create a standardized name. As a result, the standardized name provides a filename nomenclature that is based on the actual or estimated time of when the file was created. | 06-26-2014 |
20140181935 | SYSTEM AND METHOD FOR IMPORTING AND MERGING CONTENT ITEMS FROM DIFFERENT SOURCES - Systems, methods, and computer-readable storage media for importing and merging photos from different sources are disclosed. The system receives credentials from a user, who has an account with a content management system. The credentials are associated with content item storage entities such as photo repositories. The system accesses the photo repositories, using the plurality of credentials if authorization is required for data access. The system identifies source photo data in each of the photo repositories, and duplicates the source photo data in the content management system account to create consolidated photo data. | 06-26-2014 |
20140195516 | SYSTEMS AND METHODS FOR PRESENTING CONTENT ITEMS IN A COLLECTIONS VIEW - Systems, methods, and computer-readable media are provided for managing, creating, and presenting a virtual collection. In some embodiments, a content management system can receive a request to display a virtual collection of content items from a first user account, whereupon at least one content identifier stored for the virtual collection can be retrieved. The at least one content identifier can identify at least one content item in data storage. Subsequently, updated information can retrieved for the at least one content item, including at least one of an updated location within a file system hierarchy or a modification to the at least one content item by a second user account, for example. An updated content item can then be selectively provided for display with the virtual collection in accordance with accessibility to the content item permitted by the second user account. | 07-10-2014 |
20140195550 | ACCESSING AUDIO FILES FROM AN ONLINE CONTENT MANAGEMENT SYSTEM - The disclosed embodiments relate to a system that facilitates accessing audio files associated with a user from an online content management system. During operation, the online content management system receives a function call from a client to list audio files associated with the user. In response to the function call, the system filters through operations for files associated with the user to identify audio files. Next, the system returns metadata for the identified audio files associated with the user to the client. In some embodiments, filtering through the operations involves filtering an operation log to identify operations performed on audio files associated with the user, wherein the operations occurred since a preceding call to the function. | 07-10-2014 |
20140379643 | PRESERVING CONTENT ITEM COLLECTION DATA ACROSS INTERFACES - Systems, methods, and computer-readable storage media for preserving collection data across interfaces are disclosed. The system can generate, for a collection of content items stored in multiple user accounts in a synced online content management system, an index of the content items in the collection. The index can store, a content item identifier and a file location, for each content item. Upon detecting that a content item in the collection is moved to a new file location, the system can retrieve a collection identifier from metadata associated with the content item. The system can then locate the index for the collection associated with the collection identifier based on the collection identifier retrieved from the metadata associated with the content item. The system can then update the file location stored at the index for the content item to identify the new file location. | 12-25-2014 |
20150026257 | MUSIC BOX - Embodiments are provided for a media player. In some embodiments, locally stored media player data is obtained from a first device on at least one of a device setting, a media player setting, and a media player state of a media player module of a web application, the data is stored in a data store of a content management system for a first account, and based on the media player data, locally stored data is selectively synchronized on a second device associated with the first account to provide a continued experience with media on the second device. | 01-22-2015 |
20150134679 | LOCATION-INDEPENDENT LINKS TO CONTENT AT ONLINE CONTENT MANAGEMENT SYSTEMS - The disclosed embodiments provide a system that facilitates access to content. During operation, the system tracks a content item at an online content management system using an identifier for the content item. Next, the system uses the identifier to provide a link to the content item, wherein the link enables access to the content item from an electronic device independently of a location of the content item within the online content management system. | 05-14-2015 |
20150180914 | SYSTEMS AND METHODS FOR CREATING SHARED VIRTUAL SPACES - Systems and methods are provided for creating shared virtual spaces (“rooms”). A room may be created when a user first shares images with another user. A user may send a request to a content management system to share one or more images with various contacts. In response, a room is created by the content management system in which a copy of each image is stored. Images added to a room are copied to a separate “rooms” database, and “locked,” being saved in the room for a period of time, which may be indefinitely. Changes made by the user to a room via a user device may be displayed as soon as indicated, without waiting for the information to be sent to a system server or its state to be made consistent with that of the user device. Room activity notifications may be sent to members in various ways. | 06-25-2015 |
20150180980 | SYSTEMS AND METHODS FOR PRESERVING SHARED VIRTUAL SPACES ON A CONTENT MANAGEMENT SYSTEM - Systems and methods are provided for creating shared virtual spaces (“rooms”). In some embodiments, a share request to share a content item from a sharer to at least one sharee may be received. In response, a first virtual space may be created on the sharer's user account and each of the at least one sharee's user accounts on the content management system. A first identifier may be assigned to the content item, where the first identifier associates the sharer and each sharee as a member of the first virtual space. The first shared virtual space may then be preserved in a second shared virtual space stored on the content management system. | 06-25-2015 |
20150242110 | NAVIGATING GALLERIES OF DIGITAL CONTENT - One or more embodiments of the present disclosure include a content navigation system that allows a user to search, browse, and otherwise experience a collection of digital content items. For example, the content navigation system can provide a graphical user interface including a scroll element. One or more embodiments of the scroll element can include various navigational functions that provide a user-friendly interface for browsing and experiencing a collection of digital content items. Furthermore, the content navigation system can provide methods and systems for a user to easily configure the way in which the digital content items are organized within the user interface, thereby customizing the user's browsing experience. | 08-27-2015 |
20150242111 | ACTIVATING A CAMERA FUNCTION WITHIN A CONTENT MANAGEMENT APPLICATION - One or more embodiments of the present disclosure include a content management system that allows a user to easily activate a camera while viewing digital content. For example, a content management system can provide a graphical user interface that includes a scroll element that allows a user to navigate through digital content. In addition, a user can interact with the scroll element to activate a camera. For instance, a user can activate a camera by scrolling the scroll element to and/or beyond a particular position. | 08-27-2015 |
20150242404 | SELECTIVELY EMPHASIZING DIGITAL CONTENT - One or more embodiments increase the visual appeal and organization of presenting digital content items. In particular, one or more embodiments improve the visual appeal of a presentation of digital content items by emphasizing one or more digital content items within the presentation of digital content items. For instance, one or more digital content items may be emphasized within a graphical user interface including a gallery of digital content items. The emphasized digital content items can be selected based on a score reflecting a particular characteristic of the digital content item and/or a metric of user interest in the digital content item. Digital content items with relatively high scores as compared to other digital content items may be emphasized when presented in conjunction with the other digital content items. | 08-27-2015 |
20160078048 | SYSTEM AND METHOD FOR ORGANIZING FILES BASED ON A UNIQUE IDENTIFICATION CODE - A system for determining a time that a file was created and associating an ID with the file based on the file creation time is disclosed. The system adjusts the creation time by a time zone offset. In the case of image files, the file creation time may be based on information associated with the image: (1) by the camera that took the picture (exchangeable image file data); (2) when the photo was last modified in memory (file modification time data); (3) based on the raw date and time the photo file was created (file date-time data); and (4) when the photo was imported onto a client device. The system may rename the file with this adjusted creation time to create a standardized name. As a result, the standardized name provides a filename nomenclature that is based on the actual or estimated time of when the file was created. | 03-17-2016 |
Patent application number | Description | Published |
20080215299 | Asynchronous Hidden Markov Model Method and System - A system, method and program storage device implementing a method for modeling a data generating process, wherein the modeling comprises observing a data sequence comprising irregularly sampled data, obtaining an observation sequence based on the observed data sequence, assigning a time index sequence to the data sequence, obtaining a hidden state sequence of the data sequence, and decoding the data sequence based on a combination of the time index sequence and the hidden state sequence to model the data sequence. The method further comprises assigning a probability distribution over time stamp values of the observation sequence, wherein the decoding comprises using a Hidden Markov Model. The method further comprises using an expectation maximization methodology to learn the Hidden Markov Model. | 09-04-2008 |
20090070100 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR SPOKEN LANGUAGE GRAMMAR EVALUATION - A method, system, and computer program product for spoken language grammar evaluation are provided. The method includes playing a recorded question to a candidate, recording a spoken answer from the candidate, and converting the spoken answer into text. The method further includes comparing the text to a grammar database, calculating a spoken language grammar evaluation score based on the comparison, and outputting the spoken language grammar evaluation score. | 03-12-2009 |
20090070111 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR SPOKEN LANGUAGE GRAMMAR EVALUATION - A method, system, and computer program product for spoken language grammar evaluation are provided. The method includes playing a recorded question to a candidate, recording a spoken answer from the candidate, and converting the spoken answer into text. The method further includes comparing the text to a grammar database, calculating a spoken language grammar evaluation score based on the comparison, and outputting the spoken language grammar evaluation score. | 03-12-2009 |
20090125805 | METHODS FOR OBTAINING IMPROVED TEXT SIMILARITY MEASURES - The embodiments of the invention provide methods for obtaining improved text similarity measures. More specifically, a method of measuring similarity between at least two electronic documents begins by identifying similar terms between the electronic documents. This includes basing similarity between the similar terms on patterns, wherein the patterns can include word patterns, letter patterns, numeric patterns, and/or alphanumeric patterns. The identifying of the similar terms also includes identifying multiple pattern types between the electronic documents. Moreover, the basing of the similarity on patterns identifies terms within the electronic documents that are within a category of a hierarchy. Specifically, the identifying of the terms reviews a hierarchical data tree, wherein nodes of the tree represent terms within the electronic documents. Lower nodes of the tree have specific terms; and, wherein higher nodes of the tree have general terms. | 05-14-2009 |
20100250580 | SEARCHING DOCUMENTS USING A DYNAMICALLY DEFINED IGNORE STRING - Systems, methods and articles of manufacture are disclosed for searching a plurality of documents using a dynamically defined ignore string. The ignore string may be specified by a user. An overlay index may be generated over the plurality of documents. The overlay index may include a posting list for each term in the ignore string. Each posting list may specify the documents of the plurality of documents in which the respective term occurs outside of the ignore string. The overlay index may also include a posting list that specifies all occurrences of the ignore string in the plurality of documents. Once generated, a user may search the plurality of documents while occurrences of the ignore string in the plurality of documents are ignored in text-based searches. | 09-30-2010 |
20100306238 | PARALLEL SEGMENTED INDEX SUPPORTING INCREMENTAL DOCUMENT AND TERM INDEXING - Techniques are disclosed for generating an index that supports both incremental document indexing and incremental term indexing. Documents and search terms may be received for which an index is to be generated. From this information, an index may be generated, partitioned in a first dimension by documents to create master segments and in a second dimension by search terms to create slave segments. A request to update the index to include a new document or a new search term may be received. The new document or new search term may be added to the index without modifying the entire index. Further, document identifiers may be synchronized across all segments. Synchronization refers to maintaining consistency of document identifiers across segments, despite renumbering of document identifiers during certain operations such as merging segments. | 12-02-2010 |
Patent application number | Description | Published |
20090299681 | METHODS AND SYSTEMS FOR GENERATING INFORMATION TO BE USED FOR SELECTING VALUES FOR ONE OR MORE PARAMETERS OF A DETECTION ALGORITHM - Methods and systems for generating information to be used for selecting values for parameter(s) of a detection algorithm are provided. One method includes without user intervention performing a scan of an area of a wafer using an inspection system and default values for parameter(s) of a detection algorithm to detect defects on the wafer. The method also includes selecting a portion of the defects from results of the scan based on a predetermined maximum number of total defects to be used for selecting values for the parameter(s) of the detection algorithm. The method further includes storing information, which includes values for the parameter(s) of the detection algorithm determined for the defects in the portion. The information can be used to select the values for the parameter(s) of the detection algorithm to be used for the inspection recipe without performing an additional scan of the wafer subsequent to the scan. | 12-03-2009 |
20130346596 | METHODOLOGY FOR INTELLIGENT PATTERN DETECTION AND ANOMALY DETECTION IN MACHINE TO MACHINE COMMUNICATION NETWORK - The present invention relates generally to network communications, and more particularly to machine-to-machine (M2M) data communications. The present invention provides for a method, apparatus and computer program product for detecting performance event data across a machine-to-machine (M2M) network indicative of anomalous performance of data and thereafter alerting users of performance issues in real-time or near real-time. | 12-26-2013 |
20140269444 | ADAPTIVE M2M BILLING - A computer implemented method is disclosed. The computer implemented method comprises providing a guaranteed price plan to a customer for a predetermined time period and learning about network element usage over the predetermined time period to provide a learned price plan. The computer implemented method also comprises determining a new price plan based on the learned price plan. Finally, the computer implemented method comprises utilizing the new price plan with customer's network elements. | 09-18-2014 |
20140273936 | CONTEXT ORIENTED BILLING - The present invention is directed toward networks and more particularly to a method and system for providing information related to context-oriented billing in such networks. In one more embodiments, a computer implemented method provides for billing invoices in response to one or more of a customer's network elements which have been correlated with detailed network data, classified into one or more billing event categories, and rated in accordance with a predetermined hierarchy. | 09-18-2014 |
20160044483 | CONTEXT ORIENTED BILLING - The present invention is directed toward networks and more particularly to a method and system for providing information related to context-oriented billing in such networks. In one more embodiments, a computer implemented method provides for billing invoices in response to one or more of a customer's network elements which have been correlated with detailed network data, classified into one or more billing event categories, and rated in accordance with a predetermined hierarchy. | 02-11-2016 |
Patent application number | Description | Published |
20120329410 | Thermal-based flow control - Methods, devices, and apparatuses are provided for detecting that a temperature of at least a portion of a mobile device is above a mitigation threshold, adjusting transmit power, used on a first channel by said mobile device, by a first backoff amount during a first backoff interval, based, at least in part, on said detected temperature. Further included is suppressing a transmission during a response interval used on a second channel by said mobile device. | 12-27-2012 |
20130329556 | FLOW CONTROL FOR NETWORK PACKETS FROM APPLICATIONS IN ELECTRONIC DEVICES - The disclosed embodiments provide a system that processes network packets on an electronic device. During operation, the system obtains, on the electronic device, an outgoing rate of the network packets from a network interface queue on the electronic device to a network link. Next, upon detecting a transmission of the network packets from an application on the electronic device to the network interface queue, the system uses the electronic device to allocate a proportion of the outgoing rate to the application based on a number of applications transmitting network packets from the electronic device to the network link. Finally, the system uses the allocated proportion of the outgoing rate and the network interface queue to transmit network packets from the application to the network link. | 12-12-2013 |
20140044046 | REDUCING PACKET LOSS AT A WIRELESS COMMUNICATION DEVICE DUE TO A CONNECTION INTERRUPTION - A method for reducing packet loss during data transfer from a network to a wireless communication device over a connection is disclosed. The method can include the wireless communication device signaling a first receive window size for a data transfer; determining occurrence of an event resulting in an interruption of the connection; and, in response to determining occurrence of the event, signaling a second receive window size for the data transfer prior to the event to trigger an adjustment of a data rate of the data transfer in preparation for the event. | 02-13-2014 |
20140066055 | NETWORK RESELECTION FOR A WIRELESS COMMUNICATION DEVICE - A network reselection procedure, of a wireless communication device, that occurs following a network detachment event, such as a device sleep event or a device power savings mode event. The wireless communication device attempts to acquire a first wireless network to which the wireless communication device was most recently attached, immediately preceding the network detachment event. Then, in response to an unsuccessful acquisition of the first wireless network, the wireless communication device attempts an alternate network acquisition utilizing a Most Recently Used List (MRUL) that is stored at the wireless communication device and includes information about one or more frequency bands allocated to a primary service provider with which the wireless communication device is affiliated. After determining whether the alternate network acquisition attempt was successful, the wireless communication device attaches to a second network and stores information associated with the second network. | 03-06-2014 |
20140073307 | DEVICE WITH REDUCED COMMUNICATION-PROTOCOL TRANSITION TIME - In order to reduce the time delay when transitioning between different communication protocols used to communicate information via a cellular-telephone network, an electronic device (such as a cellular telephone) may only partially disable a software stack associated with a current communication protocol. In particular, after receiving an indicator that there is a message to be communicated using a second communication protocol while the electronic device is currently configured to communicate using a first communication protocol, the electronic device may disable a portion of a software stack associated with the first communication protocol and may enable a software stack associated with the second communication protocol. Then, the electronic device communicates the message using the second communication protocol. Next, the electronic device: may disable the software stack associated with the second communication protocol and may enable the portion of the software stack associated with the first communication protocol. | 03-13-2014 |
20140098693 | TRIGGERING CELL TRANSITION IN AN UPLINK POWER LIMITED CONDITION - A method for triggering cell transition in an uplink power limited condition is disclosed. The method can include a wireless communication device determining that the wireless communication device is experiencing an uplink power limited condition; deriving a modified downlink channel quality measurement by adjusting a measured downlink channel quality to indicate a lower downlink channel quality than the measured downlink channel quality; generating a measurement report including the modified downlink channel quality measurement; and sending the measurement report to the serving cell to trigger transition of the wireless communication device from the serving cell to a second cell. | 04-10-2014 |
20140128074 | CELL LOADING-BASED CELL TRANSITION - A method for making a cell transition decision based on cell loading is provided. The method can include a wireless communication device receiving a message sent by a base station associated with a serving cell for the wireless communication device. The message can include loading information indicative of a loading factor for each of at least one neighbor cell. The method can further include the wireless communication device reading at least a portion of the loading information from the message; and selecting a target cell for transition from the at least one neighbor cell based on the read loading information. | 05-08-2014 |
20140200002 | REDUCING POWER CONSUMPTION THROUGH REDUCED MEASUREMENT FREQUENCY - A method for reducing power consumption by a wireless communication device is disclosed. The method can include the wireless communication device performing a first measurement of an alternative cell during a first measurement gap; sending a first measurement report generated based on the first measurement to the serving cell; storing the first measurement report; determining a mobility state of the wireless communication device; comparing the mobility state to a mobility threshold criterion; resending the first measurement report to the serving network as a report for a second measurement gap in an instance in which the mobility state satisfies the mobility criterion; and performing a second measurement of the alternative cell during the second measurement gap and sending a second measurement report generated based on the second measurement to the serving cell in an instance in which the mobility state does not satisfy the mobility threshold criterion. | 07-17-2014 |
Patent application number | Description | Published |
20140080479 | APPARATUS AND METHODS FOR STATE SUSPENSION IN HYBRID NETWORKS - Methods and apparatus for suspending session state during hybrid network operation. In one exemplary embodiment, a cellular device uses a single-radio solution to support circuit-switched calls on a CDMA 1× network and packet-switched calls on LTE. Periodically, the cellular device tunes away from LTE and monitors CDMA 1× activity, and vice versa. During these tuned-away periods, the client device may suspend operation on the tuned away network for extended tune away intervals. | 03-20-2014 |
20150181472 | ESR Extension for LTE TDD to FDD Redirection for VoLTE - This application presents techniques for an LTE user equipment (UE) to use an extended service request (ESR) extension for LTE TDD to FDD redirection for mobile originated and mobile terminated VoLTE calls. These techniques include the UE informing the network that it supports the particular features of the ESR extensions presented. Once the UE attaches to the network, a radio resource control (RRC) message can be sent to indicate that the UE supports the new ESR extension, after which the UE can use the new ESR extension to facilitate an LTE TDD to FDD redirection for the VoLTE call. | 06-25-2015 |
20150181483 | VoLTE Call Establishment in TD and FDD LTE Networks - This application discloses various techniques for call establishment using voice-over LTE (VoLTE) in networks supporting time division (TD) and frequency division duplexed (FDD) LTE communication systems. Such techniques can include systems and methods for mobile-originated calls for a UE in a TD-LTE cell, systems and methods for mobile-terminated calls for a connected UE in a TD-LTE cell and systems and methods for mobile-terminated calls for an idle UE in a TD-LTE cell. These methods and systems can leverage component carriers from a carrier aggregating capable UE to facilitate more efficient and/or effective UE call establishment. | 06-25-2015 |
20150350971 | System and Method for Network Selection to Transfer Call Session - A method performed by stations to transfer call sessions between different access networks. The methods include transmitting, by a first station to a second station, an invite to join a voice call on a first radio access network (RAN), receiving, by the second station, the invite, generating, by the second station, a response to the invite, determining, by the second station, that the response cannot be successfully transmitted to the first station, associating, by the second station, with a second RAN, generating, by the second station, a message indicating the second station has associated with the second RAN, transmitting, by the second station, the message to the first station, retransmitting, by the first station, the invite to join the voice call, receiving, by the second station, the invite on the second RAN and setting up the voice call between the first station and the second station. | 12-03-2015 |
20160095020 | Systems and Methods for Improved Network Scanning for Quality of Service Applications - A user equipment (“UE”) that performs methods to connect to multiple radio access networks (RAN) including a home network RANs and roaming RANs to perform communications. An exemplary method performed by a UE initially connected to a Long Term Evolution radio access network (LTE-RAN) of a home network and registered with a voice over LTE (VoLTE) service of the home network to perform voice communications via the LTE-RAN, includes detecting a service disrupting event preventing VoLTE communication with the LTE-RAN, deregistering from the VoLTE service of the home network, scanning for available bands in the LTE-RAN of the home network and while scanning for the available bands in the LTE-RAN of the home network, connecting to a further radio access network (RAN) of the home network that allows circuit-switched communications with the home network, wherein the UE performs voice communications as circuit-switched communications via the further RAN. | 03-31-2016 |
Patent application number | Description | Published |
20140112172 | Load Estimation in 3GPP Networks - Loading estimation of 3GPP networks. One or more metrics relating to a cell of a 3GPP network may be measured. Loading of the cell may be estimated based on the one or more metrics. The metrics may include metrics measured, estimated, or derived at multiple layers, possibly including one or more of physical layer, radio link control layer, radio resource control layer, or application layer metrics. | 04-24-2014 |
20140113630 | Wireless Device Based Inter Radio Access Technology Handover Initiation - User Equipment (UE) based forced inter radio access technology (iRAT) handover. A connection to a network may be established via a first cell operating according to a first radio access technology (RAT). It may be determined to initiate a handover of the UE from the first cell to a second cell operating according to a second RAT. An indication may be transmitted to the network to initiate a handover of the UE from the first cell to the second cell. An indication may be received from the network to perform handover of the UE from the first cell to the second cell in response to the indication to initiate the handover. Handover of the UE from the first cell to the second cell may be performed in response to the indication to perform the handover. Handover may include releasing the connection to the network via the first cell and establishing a connection to the network via the second cell. | 04-24-2014 |
20140200040 | Enabling Receive Diversity During Paging Channel Timeline Operation - Enabling receive diversity based on detecting incorrect paging message length. A paging channel may be monitored. An indication of a paging message may be received on the paging channel. The paging message may include a message length field indicating a message length of the paging message. The message length field of the paging message may be received on the paging channel and decoded. It may be determined that the message length indicated in the message length field is incorrect. Receive diversity may be enabled for at least one subsequent paging occasion in response to determining that the message length indicated in the message length field is incorrect. | 07-17-2014 |
20160073331 | Circuit Switched Fallback Optimization In Wireless Devices - Instead of barring an LTE network for the Long Bar Time duration (LBT) if the LTE cell doesn't support CSFB, a wireless communication device may perform a scan for LTE networks before expiration of the LBT if the UE has changed its location. When the UE is in LTE acquisition mode, or the necessary information about a CS network for CSFB is unavailable, the UE may maintain its state on both the LTE and CS network, and check CS paging messages to see if the UE can decode any status. Unlike for CSFB, checking for overhead messages may be performed over the LTE system, and the UE may wake up on CS pages to determine if a suitable network is available. By maintaining its state on both types of networks, the UE may use LTE for data services which would otherwise be provided by different systems for the CS networks when messages transmitted over LTE do not include CS registration information. | 03-10-2016 |