Patent application number | Description | Published |
20090282101 | MECHANISM FOR PROVIDING VIRTUAL MACHINES FOR USE BY MULTIPLE USERS - According to one aspect of the invention, a request to generate a state checkpoint of a computer is initiated within a user-level software entity, such as a virtual machine. Upon sensing the request, a checkpointing mechanism generates and stores at least one checkpoint, each checkpoint comprising a representation of the total state of the computer system. Upon sensing a state restoration request corresponding to one of the checkpoints, the checkpointing mechanism restores the checkpointed state in the computer, which can then resume operation from the restored total state. According to another aspect of the invention, a total checkpointed state is exported to another computer, where the state can be modified, for example, debugged, and then loaded into either the originally checkpointed computer (which, again, may be a virtual machine), or some other computer. | 11-12-2009 |
20110023030 | On-Line Replacement and Changing of Virtualization Software - In a virtualized system running one or more virtual machines on a first hypervisor, a second hypervisor is installed and control of the hardware resources of the physical computer supporting the virtualized system is migrated from the first hypervisor to the second hypervisor without interrupting the operation of the first hypervisor and the virtual machines. Initially a minimal set of hardware resources is hot-removed from control by the first hypervisor, and the second hypervisor is launched on the minimal set of hardware resources. Both the remaining hardware resources and the virtual machines are then migrated from the first hypervisor to the second hypervisor until all the virtual machines have been migrated over to the second hypervisor, while the virtual machines and the first hypervisor continue running largely unaffected by the migration process. | 01-27-2011 |
20130024862 | On-Line Replacement and Changing of Virtualization Software - In a virtualized system running one or more virtual machines on a first hypervisor, a second hypervisor is installed and control of the hardware resources of the physical computer supporting the virtualized system is migrated from the first hypervisor to the second hypervisor without interrupting the operation of the first hypervisor and the virtual machines. Initially a minimal set of hardware resources is hot-removed from control by the first hypervisor, and the second hypervisor is launched on the minimal set of hardware resources. Both the remaining hardware resources and the virtual machines are then migrated from the first hypervisor to the second hypervisor until all the virtual machines have been migrated over to the second hypervisor, while the virtual machines and the first hypervisor continue running largely unaffected by the migration process. | 01-24-2013 |
20140310708 | MECHANISM FOR PROVIDING VIRTUAL MACHINES FOR USE BY MULTIPLE USERS - According to one aspect of the invention, a request to generate a state checkpoint of a computer is initiated within a user-level software entity, such as a virtual machine. Upon sensing the request, a checkpointing mechanism generates and stores at least one checkpoint, each checkpoint comprising a representation of the total state of the computer system. Upon sensing a state restoration request corresponding to one of the checkpoints, the checkpointing mechanism restores the checkpointed state in the computer, which can then resume operation from the restored total state. According to another aspect of the invention, a total checkpointed state is exported to another computer, where the state can be modified, for example, debugged, and then loaded into either the originally checkpointed computer (which, again, may be a virtual machine), or some other computer. | 10-16-2014 |
Patent application number | Description | Published |
20080284167 | LOW-VOLUME FITTINGS - Fitting that is compatible with standard fittings is described. In one embodiment, the end of one of a matched set of fittings is provided with an elastomeric material. The elastomeric material deforms when the matched fittings are coupled, resulting in a reduced volume. In certain embodiments, a tube is provided through the tube which is attached at a proximal end and extends to the distal end of the elastomeric material. When the fitting are coupled the tube protrudes past the end of the elastomeric material and into the coupled fitting. In certain embodiments the fitting otherwise conforms to International Standard ISO 594. | 11-20-2008 |
20090036764 | FLUID INJECTION AND SAFETY SYSTEM - Various medical systems and methods are described, including a medical monitoring system. The medical monitoring system can have a fluid system configured to receive bodily fluid and optically analyze said fluid to determine analyte concentration. The fluid system can have a removable portion. The removable portion can have an opening with a port. The system can also have a container configured to contain anticoagulant. The container can have a portion configured to mate with the port of the removable portion. The container can be further configured to not fit into a conventional luer fitting. An anti-coagulant insertion apparatus is also described. The apparatus can have a syringe, a dock with a port, and an adapter configured to connect the syringe to the port. The dock can also have a tab configured to move with the port. | 02-05-2009 |
20130114068 | SAMPLE CELL FOR FLUID ANALYSIS SYSTEM - Systems and method are disclosed for determining a concentration of an analyte (e.g., glucose) in a fluid (e.g., blood). The system can draw blood from a patient and deliver the blood to a sample cell. A centrifuge motor can spin the sample cell to separate the fluid into a plurality of components (plasma, red blood cells, etc.). A particular component of the fluid (e.g., plasma) may be positioned at a sample portion of the sample cell after centrifuging such that the concentration of the analyte is measured in the particular component of the fluid (e.g., plasma). The sample cell can include a cuvette that has two window pieces sandwiched between two clamshell pieces, and where the sample portion of the sample cell is defined by a gap between the window pieces. | 05-09-2013 |
20130160532 | FLUID INJECTION AND SAFETY SYSTEM - Various medical systems and methods are described, including a medical monitoring system. The medical monitoring system can have a fluid system configured to receive bodily fluid and optically analyze said fluid to determine analyte concentration. The fluid system can have a removable portion. The removable portion can have an opening with a port. The system can also have a container configured to contain anticoagulant. The container can have a portion configured to mate with the port of the removable portion. The container can be further configured to not fit into a conventional luer fitting. An anti-coagulant insertion apparatus is also described. The apparatus can have a syringe, a dock with a port, and an adapter configured to connect the syringe to the port. The dock can also have a tab configured to move with the port. | 06-27-2013 |
20140236047 | ADJUSTABLE CONNECTOR, IMPROVED FLUID FLOW AND REDUCED CLOTTING RISK - Methods and systems for determining the concentration of one or more analytes from a sample such as blood or plasma are described. The systems described herein can be configured to withdraw a sample from a source of fluid, direct a first portion of the withdrawn sample to an analyte monitoring system and return a second portion of the sample. The analyte monitoring system can be connected to the fluid source via a connector that is configured to improve fluid flow and reduce blood clotting risk. These goals can be accomplished, for example, by employing coatings in or on a connector, positioning a resilient substance at or near the junction, by reducing dead space volume, by using resiliency to improve fit, by extending a portion of one connector to better mate with a portion of another connector, etc. | 08-21-2014 |
Patent application number | Description | Published |
20100057879 | RETRIEVING AND SNOOZING CATEGORIZED CONVERSATIONS IN A CONVERSATION-BASED EMAIL SYSTEM - A method and system for processing messages includes receiving a plurality of messages directed to a user. Each of the plurality of messages is associated with a respective conversation and list of conversations is displayed in an order determined in accordance with second predefined criteria, as a set of rows, where each row corresponds to one of the listed conversations and includes at least a sender list, a conversation topic and a date/time value. A user is enabled to identify one or more conversations in the list of conversations, to mark the identified conversations as belonging to a particular category, and to display another list of conversations comprising conversations marked as belonging to the particular category. A user may cause a conversation to be removed from certain displays, but to become visible again after the passage of a certain amount of time or the occurrence of an event. | 03-04-2010 |
20100064017 | Labeling Messages of Conversations and Snoozing Labeled Conversations in a Conversation-Based Email System - A method system for labeling messages of conversations, where each conversation has a respective conversation identifier and comprises one or more messages sharing a common set of characteristics. A selected conversation has a plurality of messages associated with a first label. In response to an action specifying a second label to be associated with the selected conversation, the second label is associated with the messages of the selected conversation, such that the plurality of messages are each associated with both the first and second labels. An index entry for the second label is modified to account for the association of the second label with the messages. In some embodiments, a set of predetermined conditions is associated with the conversation; the first label is removed from the plurality of messages and is prevented from being automatically associated with newly received messages of the conversation until the predetermined conditions are satisfied. | 03-11-2010 |
20100281397 | Displaying Conversation Views in a Conversation-Based Email System - A method and system of processing messages is described that includes receiving a plurality of messages directed to a user, wherein each message has a unique message identifier. Each of the received messages is associated with a respective conversation to which it belongs. Each conversation includes a respective conversation identifier and a set of one or more messages which share a common set of characteristics that meet certain predefined criteria. A list of conversations to which the various messages belong is displayed in an order determined in accordance with other predefined criteria, such as ordering the conversations by the last date a message was received in a particular conversation. Each conversation is represented as a single item in the list. Other information displayed relating to the conversation includes labels, senders, date/time values, recipients, number of message in a conversation, and whether or not the conversation contains any unread messages. | 11-04-2010 |
20100293242 | Conversation-Based E-Mail Messaging - A method and system for searching messages is disclosed that includes searching a message repository to identify a plurality of conversations that each include at least one message that is relevant to a search query. Alternatively, conversations as a whole may be relevant to a search query rather than individual messages. Each of the plurality of the identified conversations includes one or more messages sharing a common set of characteristics that meet predefined criteria and a conversation identifier. A list of conversations is created representing at least a subset of the identified conversations and a conversation is selected from that list. In that selected conversation, first messages are differentiated from second messages which may differentiate portions of text or messages that are relevant to the search query from those that are not. | 11-18-2010 |
20110314391 | Method, System, and Graphical User Interface for Dynamically Updating Transmission Characteristics in a Web Mail Reply - A method, system and graphical user interface for dynamically updating transmission characteristics in a web mail reply are described. In one embodiment of the invention, a graphical user interface includes a web mail reply form that includes: one or more address fields; an input area for inputting a reply message; and a plurality of response options selectable by a user. In response to selection of a response option by a user, one or more of the address fields in the reply form are changed while maintaining the reply message in the input area. | 12-22-2011 |
20130013634 | Retrieving Conversations That Match a Search Query - A server having one or more processors and memory receives a search query from a client. The server identifies a conversation relevant to the search query, where the conversation has two or more messages sharing a common set of characteristics that meet predefined criteria and a respective conversation identifier. Identifying a conversation relevant to the search query comprises identifying a conversation that, as a whole, is relevant to the search query. The server returns to the client for display, as a search result for the search query, conversation information corresponding to the identified conversation. | 01-10-2013 |
20130013716 | Labeling Messages with Conversation Labels and Message Labels - A server having one or more processors and memory stores a conversation including a plurality of messages, where the conversation is associated with a first label and a respective message of the plurality of messages is associated with a second label. The server receives a predefined request from a remotely located client system and responds to the predefined request by producing and sending to the client system a list of conversations. When the predefined request corresponds to a request for conversations associated with the first label, the server sends, to the client system, a first list of conversations associated with the first label. When the predefined request corresponds to a request for conversations including messages associated with the second label, the server sends, to the client system, a second list of conversations that include at least one message to which the second label has been assigned. | 01-10-2013 |
20130013717 | Compacted Mode for Displaying Messages in a Conversation - A server having one or more processors and memory receives a plurality of messages organized as conversations associated with a user. The server receives, from a client, a request for a selected conversation that is associated with a first message, a second message that was sent after the first message and a plurality of interstitial messages that were sent at times between when the first message was sent and when the second message was sent. The server sends, to the client, display information for displaying content of the selected conversation that includes a representation of the second message in an expanded mode, a representation of the first message in a first compacted mode and a representation of the plurality of interstitial messages in a second compacted mode that is different from the first compacted mode. | 01-10-2013 |
20130013718 | Primary and Secondary Recipient Indicators for Conversations - A server having one or more processors and memory receives a plurality of messages organized as conversations associated with a user. The server receives, from a client, a request for a list of conversations associated with the user and sends, to the client, display information for displaying a list of conversations comprising a set of rows, each conversation in the list of conversations being represented as a single row. The list of conversations includes a first row representing a first conversation and a second row representing a second conversation. The first row includes a first recipient indicator that indicates that the user is a primary recipient of a message in the first conversation. The second row includes a second recipient indicator, different from the first recipient indicator, that indicates that the user is a secondary recipient of a message in the second conversation. | 01-10-2013 |
20130103792 | Methods and Systems for Transferring Client Device Data Over a Network - Systems and methods for the transfer of client device data on a network are described. One described method comprises causing non-time-sensitive client device data to be identified on a client device, causing the non-time-sensitive client device data to be prepared for output and stored by the client device, and causing the non-time-sensitive client device data to be output with a request signal upon satisfaction of a condition. | 04-25-2013 |
20130262605 | Retrieving and Snoozing Categorized Conversations in a Conversation-Based Email System - A method and system for processing messages includes receiving a plurality of messages directed to a user. Each of the plurality of messages is associated with a respective conversation and list of conversations is displayed in an order determined in accordance with second predefined criteria, as a set of rows, where each row corresponds to one of the listed conversations and includes at least a sender list, a conversation topic and a date/time value. A user is enabled to identify one or more conversations in the list of conversations, to mark the identified conversations as belonging to a particular category, and to display another list of conversations comprising conversations marked as belonging to the particular category. A user may cause a conversation to be removed from certain displays, but to become visible again after the passage of a certain amount of time or the occurrence of an event. | 10-03-2013 |
20140046961 | SYSTEMS AND METHODS FOR RE-RANKING DISPLAYED CONVERSATIONS - System and method for storing a plurality of conversations are provided. Each such conversation has a corresponding conversation identifier and one or more messages sharing a common set of characteristics that meet predefined criteria. Information is sent to a remote computer identifying the conversations and providing sufficient information to rank them in accordance with a date/time value of a most recently received message of each conversation thereby causing a first conversation to be ordered before a second conversation. Subsequently, a first message that is deemed to belong to the second conversation is obtained and added to the second conversation. Information is resent to a remote computer identifying the plurality of conversations and providing sufficient information to rank the plurality of conversations in accordance with a date/time value of a most recently received message of each respective conversation thereby causing the first conversation to be ordered after the second conversation. | 02-13-2014 |
Patent application number | Description | Published |
20080294586 | Enforcing Application and Access Control Policies in an Information Management System with Two or More Interactive Enforcement Points - A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server. | 11-27-2008 |
20080301760 | Enforcing Universal Access Control in an Information Management System - A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server. | 12-04-2008 |
20100223287 | Techniques and System to Deploy Policies Intelligently - In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant. | 09-02-2010 |
20100306179 | Using Information Usage Data to Detect Behavioral Patterns and Anomalies - Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile. | 12-02-2010 |
20120017000 | Preventing Conflicts of Interests Between Two or More Groups Using Applications - To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not circulate freely between these groups. The system has policies to implement an “ethical wall” to separate users or groups of users. The user or groups of user may be organized in any arbitrary way, and may be in the same organization or different organizations. The two groups (or two or more users) will not be able to access information belonging to the other, and users in one group may not be able to pass information to the other group. The system may manage access to documents, e-mail, files, and other forms of information. | 01-19-2012 |
20120017261 | Enforcing Universal Access Control in an Information Management System - A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server. | 01-19-2012 |
20120036370 | Protecting Documents Using Policies and Encryption - A system protects documents at rest and in motion using declarative policies and encryption. A document at rest includes documents on a device such as the hard drive of a computer. A document in motion is a document that is passing through a policy enforcement point. The policy enforcement point can be a server (e.g., mail server, instant messenger server, file server, or network connection server). | 02-09-2012 |
20120191677 | Policy Performance in an Information Management System - In an information management system, policies are optimized before they are associated to a device in order to increase evaluation speed or reduce space requirements, or both. Optimization techniques may include common subexpression elimination, constant folding, constant propagation, comparison optimization, dead code or subexpression removal, map or lookup table generation, policy rewriting, redundant policy elimination, heuristic-based policy ordering, or policy-format transformation, and combinations of these. | 07-26-2012 |
20120198516 | Inspecting Code and Reducing Code Size Associated to a Target - Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time and then transferred or otherwise associated to a target based on the target's profile. A code component may be a policy of an information management system. | 08-02-2012 |
20120233216 | Intelligent Policy Deployment - In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant. | 09-13-2012 |
20120311665 | Analyzing Usage Information of an Information Management System - In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data may be organized as entries including information on user, application, machine, action, object or document, time, and location. When checking for patterns in the activity or historical data, techniques may include inferencing, frequency checking, location and distance checking, and relationship checking, and any combination of these. Analyzing the activity data may include comparing like types or categories of information for two or more entries. | 12-06-2012 |
20130086261 | Detecting Behavioral Patterns and Anomalies Using Activity Profiles - Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile. | 04-04-2013 |
20130097421 | Protecting Information Using Policies and Encryption - A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with policy enforcers installed at a system. A system can protect information or documents from: (i) insider theft; (ii) ensure confidentiality; and (iii) prevent data loss, while enabling collaboration both inside and outside of a company. | 04-18-2013 |
20130263210 | Enforcing Application and Access Control Policies in an Information Management System with Two or More Interactive Enforcement Points - A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server. | 10-03-2013 |
20130283343 | Enforcing Universal Access Control in an Information Management System - A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server. | 10-24-2013 |
20140020054 | Techniques of Transforming Policies to Enforce Control in an Information Management System - In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be transferred to the target, which may be a device or user. Relevant policies may be transferred while not relevant policies are not. The policies may have policy abstractions. | 01-16-2014 |
20140090012 | Enforcing Policy-based Application and Access Control in an Information Management System - A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server. | 03-27-2014 |
20140143830 | Inspecting Code and Reducing Code Size Associated to a Target - Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time and then transferred or otherwise associated to a target based on the target's profile. A code component may be a policy of an information management system. | 05-22-2014 |
20140208381 | Analyzing Usage Information of an Information Management System - In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data may be organized as entries including information on user, application, machine, action, object or document, time, and location. When checking for patterns in the activity or historical data, techniques may include inferencing, frequency checking, location and distance checking, and relationship checking, and any combination of these. Analyzing the activity data may include comparing like types or categories of information for two or more entries. | 07-24-2014 |
20140310423 | Preventing Conflicts of Interests Between Two or More Groups Using Applications - To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not circulate freely between these groups. The system has policies to implement an “ethical wall” to separate users or groups of users. The user or groups of user may be organized in any arbitrary way, and may be in the same organization or different organizations. The two groups (or two or more users) will not be able to access information belonging to the other, and users in one group may not be able to pass information to the other group. The system may manage access to documents, e-mail, files, and other forms of information. | 10-16-2014 |
20140379673 | Techniques and System to Monitor and Log Access of Information Based on System and User Context Using Policies - An information management system approves or denies user requests to access information of the system. The information includes all types of information including documents and e-mail. The information management system is driven using a policy language having policies and policy abstractions. The information management system may approve or deny many different types of requests including opening a document or file, copying a file, printing a file, sending an e-mail, reading an e-mail, cut and paste of a portion of a document, saving a document, executing an application on a file, and many others. | 12-25-2014 |
20150019762 | Analyzing Activity Data of an Information Management System - In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data may be organized as entries including information on user, application, machine, action, object or document, time, and location. When checking for patterns in the activity or historical data, techniques may include inferencing, frequency checking, location and distance checking, and relationship checking, and any combination of these. Analyzing the activity data may include comparing like types or categories of information for two or more entries. | 01-15-2015 |
20150033288 | Detecting Behavioral Patterns and Anomalies Using Activity Data - Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile. | 01-29-2015 |
20150052577 | Deploying Policies and Allowing Off-Line Policy Evaluations - In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be transferred to the target, which may be a device or user. Relevant policies may be transferred while not relevant policies are not. The policies may have policy abstractions. | 02-19-2015 |
20150089584 | Inspecting Code and Reducing Code Size Associated to a Target - Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time and then transferred or otherwise associated to a target based on the target's profile. A code component may be a policy of an information management system. | 03-26-2015 |
Patent application number | Description | Published |
20080235368 | SYSTEM AND METHOD FOR MONITORING NETWORK TRAFFIC - Described herein are systems and methods for matching clicks of links on a webpage with page views by a user. The method may comprise identifying a link on a webpage requested by a client device, generating a link identifier for the link and attaching the link identifier to the link. Upon receiving a request for data associated with the link, the link identifier is stored in a log file. | 09-25-2008 |
20080250136 | ACCELERATED AND REPRODUCIBLE DOMAIN VISITOR TARGETING - A device, system, and method are directed towards managing and tracking of cross-domain user activities through use of a beacon. As a user of a client device requests content from different domain services managed by a common entity, they may receive a Uniform Resource Locator (URL) to a beacon in at least one of the different domains. In one embodiment, the beacon is a single pixel image. The client device may also receive a Match-ID. A beacon server in one of the other domains may receive the request for the beacon, and store in a domain log the Match-ID, and other information about the client device, which domain service provided the URL, and/or other related user activities. The different domain logs may then be employed for use in searching for matching Match-IDs, joining common user or client device activities, and for tracking other cross-domain user activities. | 10-09-2008 |
20090313371 | ACCELERATED AND REPRODUCIBLE DOMAIN VISITOR TARGETING - A device, system, and method are directed towards managing and tracking of cross-domain user activities through use of a beacon. As a user of a client device requests content from different domain services managed by a common entity, they may receive a Uniform Resource Locator (URL) to a beacon in at least one of the different domains. In one embodiment, the beacon is a single pixel image. The client device may also receive a Match-ID. A beacon server in one of the other domains may receive the request for the beacon, and store in a domain log the Match-ID, and other information about the client device, which domain service provided the URL, and/or other related user activities. The different domain logs may then be employed for use in searching for matching Match-IDs, joining common user or client device activities, and for tracking other cross-domain user activities. | 12-17-2009 |
20110307579 | ACCELERATED AND REPRODUCIBLE DOMAIN VISITOR TARGETING - A device, system, and method are directed towards managing and tracking of cross-domain user activities through use of a beacon. As a user of a client device requests content from different domain services managed by a common entity, they may receive a Uniform Resource Locator (URL) to a beacon in at least one of the different domains. In one embodiment, the beacon is a single pixel image. The client device may also receive a Match-ID. A beacon server in one of the other domains may receive the request for the beacon, and store in a domain log the Match-ID, and other information about the client device, which domain service provided the URL, and/or other related user activities. The different domain logs may then be employed for use in searching for matching Match-IDs, joining common user or client device activities, and for tracking other cross-domain user activities. | 12-15-2011 |
Patent application number | Description | Published |
20120007598 | MICROMACHINED MAGNETIC FIELD SENSORS - A micromachined magnetic field sensor integrated with electronics is disclosed. The magnetic field sensors utilize Hall-effect sensing mechanisms to achieve 3-axis sensing. A Z axis sensor can be fabricated either on a device layer or on a conventional IC substrate with the design of conventional horizontal Hall plates. An X and Y axis sensor are constructed on the device layer. In some embodiments, a magnetic flux concentrator is applied to enhance the performance of the magnetic field sensor. In some embodiments, the magnetic field sensors are placed on slope sidewalls to achieve 3-axis magnetic sensing system. In some embodiments, a stress isolation structure is incorporated to lower the sensor offset. The conventional IC substrate and device layer are connected electrically to form a 3-axis magnetic sensing system. The magnetic field sensor can also be integrated with motion sensors that are constructed in the similar technology. | 01-12-2012 |
20120235251 | WAFER LEVEL PACKAGING OF MEMS DEVICES - A MEMS device is disclosed. The MEMS device comprises a MEMS substrate and a CMOS substrate having a front surface, a back surface and one or more metallization layers. The front surface being bonded to the MEMS substrate. The MEMS device includes one or more conductive features on the back surface of the CMOS substrate and electrical connections between the one or more metallization layers and the one or more conductive features. | 09-20-2012 |
20120235297 | WAFER LEVEL PACKAGING OF MEMS DEVICES - A MEMS device is disclosed. The MEMS device comprises a MEMS substrate and a CMOS substrate having a front surface, a back surface and one or more metallization layers. The front surface being bonded to the MEMS substrate. The MEMS device includes one or more conductive features on the back surface of the CMOS substrate and electrical connections between the one or more metallization layers and the one or more conductive features. | 09-20-2012 |
20120313189 | METHOD OF PREVENTING STICTION OF MEMS DEVICES - A method and apparatus are disclosed for reducing stiction in MEMS devices. The method comprises patterning a CMOS wafer to expose Titanium-Nitride (TiN) surface for a MEMS stop and patterning the TiN to form a plurality of stop pads on the top metal aluminum surface of the CMOS wafer. The method is applied for a moveable MEMS structure bonded to a CMOS wafer. The TiN surface and/or plurality of stop pads minimize stiction between the MEMS structure and the CMOS wafer. Further, the TiN film on top of aluminum electrode suppresses the formation of aluminum hillocks which effects the MEMS structure movement. | 12-13-2012 |
20120326248 | METHODS FOR CMOS-MEMS INTEGRATED DEVICES WITH MULTIPLE SEALED CAVITIES MAINTAINED AT VARIOUS PRESSURES - A Microelectromechanical systems (MEMS) structure comprises a MEMS wafer. A MEMS wafer includes a handle wafer with cavities bonded to a device wafer through a dielectric layer disposed between the handle and device wafers. The MEMS wafer also includes a moveable portion of the device wafer suspended over a cavity in the handle wafer. Four methods are described to create two or more enclosures having multiple gas pressure or compositions on a single substrate including, each enclosure containing a moveable portion. The methods include: A. Forming a secondary sealed enclosure, B. Creating multiple ambient enclosures during wafer bonding, C. Creating and breaching an internal gas reservoir, and D. Forming and subsequently sealing a controlled leak/breach into the enclosure. | 12-27-2012 |
20130001710 | PROCESS FOR A SEALED MEMS DEVICE WITH A PORTION EXPOSED TO THE ENVIRONMENT - A method and system for providing a MEMS device with a portion exposed to an outside environment are disclosed. The method comprises bonding a handle wafer to a device wafer to form a MEMS substrate with a dielectric layer disposed between the handle and device wafers. The method includes lithographically defining at least one standoff on the device wafer and bonding the at least one standoff to an integrated circuit substrate to form a sealed cavity between the MEMS substrate and the integrated circuit substrate. The method includes defining at least one opening in the handle wafer, standoff, or integrated circuit substrate to expose a portion of the to expose a portion of the device wafer to the outside environment. | 01-03-2013 |
20130001765 | INTEGRATED HEATER ON MEMS CAP FOR WAFER SCALE PACKAGED MEMS SENSORS - A system and method for controlling temperature of a MEMS sensor are disclosed. In a first aspect, the system comprises a MEMS cap encapsulating the MEMS sensor and a CMOS die vertically arranged to the MEMS cap. The system includes a heater integrated into the MEMS cap. The integrated heater is activated to control the temperature of the MEMS sensor. In a second aspect, the method comprises encapsulating the MEMS sensor with a MEMS cap and coupling a CMOS die to the MEMS cap. The method includes integrating a heater into the MEMS cap. The integrated heater is activated to control the temperature of the MEMS sensor. | 01-03-2013 |
20140145244 | MEMS DEVICE AND PROCESS FOR RF AND LOW RESISTANCE APPLICATIONS - MEMS device for low resistance applications are disclosed. In a first aspect, the MEMS device comprises a MEMS wafer including a handle wafer with one or more cavities containing a first surface and a second surface and an insulating layer deposited on the second surface of the handle wafer. The MEMS device also includes a device layer having a third and fourth surface, the third surface bonded to the insulating layer of the second surface of handle wafer; and a metal conductive layer on the fourth surface. The MEMS device also includes CMOS wafer bonded to the MEMS wafer. The CMOS wafer includes at least one metal electrode, such that an electrical connection is formed between the at least one metal electrode and at least a portion of the metal conductive layer. | 05-29-2014 |
20140151869 | INTEGRATED HEATER ON MEMS CAP FOR WAFER SCALE PACKAGED MEMS SENSORS - A system and method for controlling temperature of a MEMS sensor are disclosed. In a first aspect, the system comprises a MEMS cap encapsulating the MEMS sensor and a CMOS die vertically arranged to the MEMS cap. The system includes a heater integrated into the MEMS cap. The integrated heater is activated to control the temperature of the MEMS sensor. In a second aspect, the method comprises encapsulating the MEMS sensor with a MEMS cap and coupling a CMOS die to the MEMS cap. The method includes integrating a heater into the MEMS cap. The integrated heater is activated to control the temperature of the MEMS sensor. | 06-05-2014 |
20140213007 | INTERNAL ELECTRICAL CONTACT FOR ENCLOSED MEMS DEVICES - A method of fabricating electrical connections in an integrated MEMS device is disclosed. The method comprises forming a MEMS wafer. Forming a MEMS wafer includes forming one cavity in a first semiconductor layer, bonding the first semiconductor layer to a second semiconductor layer with a dielectric layer disposed between the first semiconductor layer and the second semiconductor layer, and etching at least one via through the second semiconductor layer and the dielectric layer and depositing a conductive material on the second semiconductor layer and filling the at least one via. Forming a MEMS wafer also includes patterning and etching the conductive material to form one standoff and depositing a germanium layer on the conductive material, patterning and etching the germanium layer, and patterning and etching the second semiconductor layer to define one MEMS structure. The method also includes bonding the MEMS wafer to a base substrate. | 07-31-2014 |
20140239353 | METHOD FOR MEMS STRUCTURE WITH DUAL-LEVEL STRUCTURAL LAYER AND ACOUSTIC PORT - A method for fabricating a MEMS device includes depositing and patterning a first sacrificial layer onto a silicon substrate, the first sacrificial layer being partially removed leaving a first remaining oxide. Further, the method includes depositing a conductive structure layer onto the silicon substrate, the conductive structure layer making physical contact with at least a portion of the silicon substrate. Further, a second sacrificial layer is formed on top of the conductive structure layer. Patterning and etching of the silicon substrate is performed stopping at the second sacrificial layer. Additionally, the MEMS substrate is bonded to a CMOS wafer, the CMOS wafer having formed thereupon a metal layer. An electrical connection is formed between the MEMS substrate and the metal layer. | 08-28-2014 |
20140264645 | INTEGRATED STRUCTURE WITH BIDIRECTIONAL VERTICAL ACTUATION - A Micro-Electro-Mechanical Systems (MEMS) device includes a first substrate with a first surface and a second surface, the first substrate including a base layer, a moveable beam disposed on the base layer, at least one metal layer, and one or more standoffs disposed on the base layer such that one or more metal layers are situated on the top surface of the one or more standoffs. The MEMS device further includes a second substrate including one or more metal layers bonded to the one or more standoffs resulting in an electrical connection between at least a portion of the one or more metal layers of the second substrate and one or more of the at least one electrode on the bottom surface and the at least one electrode on the top surface. | 09-18-2014 |
20140264652 | ACOUSTIC SENSOR WITH INTEGRATED PROGRAMMABLE ELECTRONIC INTERFACE - An integrated MEMS acoustic sensor has a MEMS transducer and a programmable electronic interface. The programmable electronic interface includes non-volatile memory and is coupled to the MEMS transducer. Using programmable electrical functions, the programmable electronic interface is operable to sense variations in the MEMS transducer caused by application of an acoustic pressure to the MEMS transducer. | 09-18-2014 |
20140264655 | SURFACE ROUGHENING TO REDUCE ADHESION IN AN INTEGRATED MEMS DEVICE - In an integrated MEMS device, moving silicon parts with smooth surfaces can stick together if they come into contact. By roughening at least one smooth surface, the effective area of contact, and therefore surface adhesion energy, is reduced and hence the sticking force is reduced. The roughening of a surface can be provided by etching the smooth surfaces in gas, plasma, or liquid with locally non-uniform etch rate. Various etch chemistries and conditions lead to various surface roughness. | 09-18-2014 |
20140264656 | MEMS ACOUSTIC SENSOR WITH INTEGRATED BACK CAVITY - A MEMS device is disclosed. The MEMS device comprises a first plate with a first surface and a second surface; and an anchor attached to a first substrate. The MEMS device further includes a second plate with a third surface and a fourth surface attached to the first plate. A linkage connects the anchor to the first plate, wherein the first plate and second plate are displaced in the presence of an acoustic pressure differential between the first and second surfaces of the first plate. The first plate, second plate, linkage, and anchor are all contained in an enclosure formed by the first substrate and a second substrate, wherein one of the first and second substrates contains a through opening to expose the first surface of the first plate to the environment. | 09-18-2014 |
20140349434 | INTERNAL ELECTRICAL CONTACT FOR ENCLOSED MEMS DEVICES - A method of fabricating electrical connections in an integrated MEMS device is disclosed. The method comprises forming a MEMS wafer. Forming a MEMS wafer includes forming one cavity in a first semiconductor layer, bonding the first semiconductor layer to a second semiconductor layer with a dielectric layer disposed between the first semiconductor layer and the second semiconductor layer, and etching at least one via through the second semiconductor layer and the dielectric layer and depositing a conductive material on the second semiconductor layer and filling the at least one via. Forming a MEMS wafer also includes patterning and etching the conductive material to form one standoff and depositing a germanium layer on the conductive material, patterning and etching the germanium layer, and patterning and etching the second semiconductor layer to define one MEMS structure. The method also includes bonding the MEMS wafer to a base substrate. | 11-27-2014 |
20140361388 | CAPACITIVE SENSING STRUCTURE WITH EMBEDDED ACOUSTIC CHANNELS - A MEMS device includes a dual membrane, an electrode, and an interconnecting structure. The dual membrane has a top membrane and a bottom membrane. The bottom membrane is positioned between the top membrane and the electrode and the interconnecting structure defines a spacing between the top membrane and the bottom membrane. | 12-11-2014 |
Patent application number | Description | Published |
20110188281 | Local bit lines and methods of selecting the same to access memory elements in cross-point arrays - Embodiments relate generally to semiconductors and memory technology, and more particularly, to systems, integrated circuits, and methods to implement a memory architecture that includes local bit lines for accessing subsets of memory elements, such as memory elements based on third dimensional memory technology. In at least some embodiments, an integrated circuit includes a cross-point memory array formed above a logic layer. The cross-point memory array includes X-lines and Y-lines, of which at least one Y-line includes groups of Y-line portions. Each of the Y-line portions can be arranged in parallel with other Y-line portions within a group of the Y-line portions. Also included are memory elements disposed between a subset of the X-lines and the group of the Y-line portions. In some embodiments, a decoder is configured to select a Y-line portion from the group of Y-line portions to access a subset of the memory elements. | 08-04-2011 |
20110188283 | Circuits and techniques to compensate data signals for variations of parameters affecting memory cells in cross-point arrays - Embodiments of the invention relate generally to semiconductors and memory technology, and more particularly, to systems, integrated circuits, and methods to implement circuits configured to compensate for parameter variations that affect the operation of memory elements, such as memory elements based on third dimensional memory technology. In at least some embodiments, an integrated circuit includes a cross-point array comprising memory elements disposed among word lines and bit lines, where a parameter can affect the operating characteristics of a memory element. The integrated circuit further includes a data signal adjuster configured to modify the operating characteristic to compensate for a deviation from a target value for the operating characteristic based on the parameter. In some embodiments, the memory element, such as a resistive memory element, is configured to generate a data signal having a magnitude substantially at the target value independent of variation in the parameter. | 08-04-2011 |
20110188284 | Circuits and techniques to compensate memory access signals for variations of parameters in multiple layers of memory - Embodiments of the invention relate generally to semiconductors and memory technology, and more particularly, to systems, integrated circuits, and methods to implement circuits configured to compensate for parameter variations in layers of memory by adjusting access signals during memory operations. In some embodiments, memory cells are based on third dimensional memory technology. In at least some embodiments, an integrated circuit includes multiple layers of memory, a layer including sub-layers of semiconductor material. The integrated circuit also includes an access signal generator configured to generate an access signal to facilitate an access operation, and a characteristic adjuster configured to adjust the access signal for each layer in the multiple layers of memory. | 08-04-2011 |
20120307542 | LOCAL BIT LINES AND METHODS OF SELECTING THE SAME TO ACCESS MEMORY ELEMENTS IN CROSS-POINT ARRAYS - Embodiments relate generally to semiconductors and memory technology, and more particularly, to systems, integrated circuits, and methods to implement a memory architecture that includes local bit lines for accessing subsets of memory elements, such as memory elements based on third dimensional memory technology. In at least some embodiments, an integrated circuit includes a cross-point memory array formed above a logic layer. The cross-point memory array includes X-lines and Y-lines, of which at least one Y-line includes groups of Y-line portions. Each of the Y-line portions can be arranged in parallel with other Y-line portions within a group of the Y-line portions. Also included are memory elements disposed between a subset of the X-lines and the group of the Y-line portions. In some embodiments, a decoder is configured to select a Y-line portion from the group of Y-line portions to access a subset of the memory elements. | 12-06-2012 |
20130215667 | Circuits And Techniques To Compensate Data Signals For Variations Of Parameters Affecting Memory Cells In Cross-Point Arrays - Embodiments of the invention relate generally to semiconductors and memory technology, and more particularly, to systems, integrated circuits, and methods to implement circuits configured to compensate for parameter variations that affect the operation of memory elements, such as memory elements based on third dimensional memory technology. In at least some embodiments, an integrated circuit includes a cross-point array comprising memory elements disposed among word lines and bit lines, where a parameter can affect the operating characteristics of a memory element. The integrated circuit further includes a data signal adjuster configured to modify the operating characteristic to compensate for a deviation from a target value for the operating characteristic based on the parameter. In some embodiments, the memory element, such as a resistive memory element, is configured to generate a data signal having a magnitude substantially at the target value independent of variation in the parameter. | 08-22-2013 |
20130229856 | CIRCUITS AND TECHNIQUES TO COMPENSATE MEMORY ACCESS SIGNALS FOR VARIATIONS OF PARAMETERS IN MULTIPLE LAYERS OF MEMORY - Embodiments of the invention relate generally to semiconductors and memory technology, and more particularly, to systems, integrated circuits, and methods to implement circuits configured to compensate for parameter variations in layers of memory by adjusting access signals during memory operations. In some embodiments, memory cells are based on third dimensional memory technology. In at least some embodiments, an integrated circuit includes multiple layers of memory, a layer including sub-layers of semiconductor material. The integrated circuit also includes an access signal generator configured to generate an access signal to facilitate an access operation, and a characteristic adjuster configured to adjust the access signal for each layer in the multiple layers of memory. | 09-05-2013 |
20140071766 | REFERENCE CELL CIRCUIT AND METHOD OF PRODUCING A REFERENCE CURRENT - The present invention discloses a reference cell circuit which is applied to a non-volatile memory. The reference cell circuit includes a reference cell array, a first current mirror circuit, and a second current mirror circuit. The reference cell array includes at least one row of floating gate transistors. The first current mirror circuit is arranged to generate a mirror current according to a reference current generated by the reference cell array. The second current mirror circuit is arranged to receive the mirror current and generate an adjusted reference current according to the mirror current and a selected one of a plurality of enable signals, wherein the plurality of enable signals correspond to a plurality operations of the non-volatile memory and the adjusted reference current is arranged to determine logical state of a plurality of memory cells of the non-volatile memory. | 03-13-2014 |
20150055425 | CIRCUITS AND TECHNIQUES TO COMPENSATE MEMORY ACCESS SIGNALS FOR VARIATIONS OF PARAMETERS IN MULTIPLE LAYERS OF MEMORY - Embodiments of the invention relate generally to semiconductors and memory technology, and more particularly, to systems, integrated circuits, and methods to implement circuits configured to compensate for parameter variations in layers of memory by adjusting access signals during memory operations. In some embodiments, memory cells are based on third dimensional memory technology. In at least some embodiments, an integrated circuit includes multiple layers of memory, a layer including sub-layers of semiconductor material. The integrated circuit also includes an access signal generator configured to generate an access signal to facilitate an access operation, and a characteristic adjuster configured to adjust the access signal for each layer in the multiple layers of memory. | 02-26-2015 |
Patent application number | Description | Published |
20110007000 | CONTROL OF COMPUTER WINDOW SYSTEMS AND APPLICATIONS USING HIGH DIMENSIONAL TOUCHPAD USER INTERFACE - A high dimensional touchpad (HDTP) controls a variety of computer windows systems and applications by detecting a user's finger movement in the left-right, forward-backward, roll, pitch, yaw, and downward pressure directions. One or more of the detected finger movements are then used to control specific computer applications including focusing a user's attention to one of several web pages, gesture recognition, magnification control, 3D-polyhedral menu selection, Internet browsers, navigation applications, games, media players, spreadsheets, and controlling the functions of mobile devices. | 01-13-2011 |
20120034978 | High-Dimensional Touchpad Game Controller with Multiple Usage and Networking Modalities - A device comprising a High Dimensional Touch Parameter (HDTP) touch capability that can selectively function, as desired by the user, as one or more of a game controller that connects to a game console via network connections, an independent portable/mobile game device with limited but sufficient capacity of processor/memory, a controller for a game console connected remotely through the internet and or a storage device/media player that can store gaming history, personal information, or media files. In an embodiment the device comprises at least one processor for executing at least one algorithm, the algorithm including at least a game, at least one touch sensor providing real-time tactile information to at least one algorithm, the algorithm implementing at least on HDTP function, and at least one networking element configured to network the device to at least the internet. | 02-09-2012 |
20120194461 | ADVANCED TOUCH CONTROL OF INTERACTIVE MAP VIEWING VIA FINGER ANGLE USING A HIGH DIMENSIONAL TOUCHPAD (HDTP) TOUCH USER INTERFACE - High Dimensional Touchpad (HDTP) or other user interface technology implemented in touch screens used on computers, smartphones, or other mobile devices provides advanced touch control of a variety of interactive map applications using one or more of a user's finger position or movement in one or more of the roll angle, pitch angle, yaw angle, and downward pressure directions. Implementations also can be responsive to a user's finger position or movement in the left-right and forward-backward directions. Implementations can also use HDTP or other user interface technology implemented on the back of a mouse. Also, the interactive map imaging application may use a connection over the internet or other network. | 08-02-2012 |
20120194462 | ADVANCED TOUCH CONTROL OF INTERACTIVE IMMERSIVE IMAGING APPLICATIONS VIA FINGER ANGLE USING A HIGH DIMENSIONAL TOUCHPAD (HDTP) TOUCH USER INTERFACE - High Dimensional Touchpad (HDTP) or other user interface technology, implemented in touch screens used on computers, smartphones, or other mobile devices provides advanced touch control a variety of interactive immersive imaging applications using one or more of a user's finger position or movement in one or more of the roll angle, pitch angle, yaw angle, and downward pressure directions. Implementations also can be responsive to a user's finger position or movement in the left-right and forward-backward directions. Implementations can also use HDTP or other user interface technology implemented on the back of a mouse. Also, an interactive immersive imaging application can employ a connection over the internet or other network. | 08-02-2012 |
20120317509 | INTERACTIVE WYSIWYG CONTROL OF MATHEMATICAL AND STATISTICAL PLOTS AND REPRESENTATIONAL GRAPHICS FOR ANALYSIS AND DATA VISUALIZATION - The invention provides interactive adjustment of plot and data visualization through clicks, rollovers, menus, and other familiar types of rapid user-machine interaction. In an implementation, such interactive adjustments also modify associated software code used to generate the underlying plot or data visualization. In some implementations this feature may be always active. In other embodiments, this feature can be enabled, disabled, overridden, precluded, etc. The invention supports simple mice and their equivalents, advanced mice, gesture-based touch interfaces advanced High-Dimensional Touch Pads and associated touch screens, game controllers, 6D-mice, and extended hyperlink objects. The invention can be implemented in the context of web browsers and spreadsheets, and can be used for Business intelligence, simple plots, and a wide range of data visualization applications. The invention also provides related features to more general programming languages not involved in plots or visualization, allowing programmers on software code and invoke various options via interactive GUIs. | 12-13-2012 |
20130179810 | ADVANCED TOUCH CONTROL OF INTERNET BROWSER VIA FINGER ANGLE USING A HIGH DIMENSIONAL TOUCHPAD (HDTP) TOUCH USER INTERFACE - A method for controlling an internet browser executing on a computing device is disclosed. A user interface touch sensor is configured to be responsive to at least one angle of contact with at least one finger. A change in an angle of the finger with respect to the surface of the touch sensor is measured by the touch sensor to produce measured data. Real-time calculations on the measured data are performed to produce a measured-angle value. The measured-angle value is used to control the value of at least one user interface parameter of the internet browser. At least one aspect of the internet browser changes in response to the angle of the position of the finger with respect to the surface of the touch sensor. | 07-11-2013 |
20130181926 | ADVANCED TOUCH CONTROL OF A FILE BROWSER VIA FINGER ANGLE USING A HIGH DIMENSIONAL TOUCHPAD (HDTP) TOUCH USER INTERFACE - A method for controlling a file browser executing on a computing device is disclosed. A user interface touch sensor is configured to be responsive to at least one angle of contact with at least one finger. A change in an angle of the finger with respect to the surface of the touch sensor is measured by the touch sensor to produce measured data. Real-time calculations on the measured data are performed to produce a measured-angle value. The measured-angle value is used to control the value of at least one user interface parameter of the file browser. At least one aspect of the file browser changes in response to the angle of the position of the finger with respect to the surface of the touch sensor. | 07-18-2013 |
20130185636 | ADVANCED TOUCH CONTROL OF A MEDIA PLAYER APPLICATION VIA FINGER ANGLE USING A HIGH DIMENSIONAL TOUCHPAD (HDTP) TOUCH USER INTERFACE - A method for controlling a media player executing on a computing device is disclosed. A user interface touch sensor is configured to be responsive to at least one angle of contact with at least one finger. A change in an angle of the finger with respect to the surface of the touch sensor is measured by the touch sensor to produce measured data. Real-time calculations on the measured data are performed to produce a measured-angle value. The measured-angle value is used to control the value of at least one user interface parameter of the media player. At least one aspect of the media player changes in response to the angle of the position of the finger with respect to the surface of the touch sensor. | 07-18-2013 |
20130187883 | ADVANCED TOUCH CONTROL OF GRAPHICS DESIGN APPLICATION VIA FINGER ANGLE USING A HIGH DIMENSIONAL TOUCHPAD (HDTP) TOUCH USER INTERFACE - A method for controlling a graphics design application executing on a computing device is disclosed. A user interface touch sensor is configured to be responsive to at least one angle of contact with at least one finger. A change in an angle of the finger with respect to the surface of the touch sensor is measured by the touch sensor to produce measured data. Real-time calculations on the measured data are performed to produce a measured-angle value. The measured-angle value is used to control the value of at least one user interface parameter of the graphics design application. At least one aspect of the graphics design application changes in response to the angle of the position of the finger with respect to the surface of the touch sensor. | 07-25-2013 |
20130217497 | CONTROL OF THE OPERATING SYSTEM ON A COMPUTING DEVICE VIA FINGER ANGLE USING A HIGH DIMENSIONAL TOUCHPAD (HDTP) TOUCH USER INTERFACE - System and method for using 3D and 6D parameter capture, gesture recognition, and symbol events provided a high dimensional touchpad (HDTP) to control a variety of computer and other applications via spatial metaphors visual user interfaces. | 08-22-2013 |
20140195907 | TOUCH USER INTERFACE SUPPORTING GLOBAL AND CONTEXT-SPECIFIC TOUCH GESTURES THAT ARE RESPONSIVE TO AT LEAST ONE FINGER ANGLE - A user interface method for use with a touch gesture user interface in a system implementing global or universal gestures and application-specific gestures for the control of software executing on a device comprising a touch user interface and a computational processor wherein the touch gestures are responsive to at least one finger angle. In an example implementation, wherein when a gesture with an application-specific association is recognized, the user interface operation is determined by the software application that has a currently active user-interface focus. In an example implementation, a global or universal gesture is used to control the system. In an example implementation, a global or universal gesture is used to control a software application executing on the system. In an example implementation, the user interface operation is context-specific. | 07-10-2014 |