Patent application number | Description | Published |
20090090299 | Apparatus for Holding a Medical Device During Coating - The present invention is directed towards the holding of medical devices during manufacture to enable the application of therapeutic and/or protective coatings. More specifically, the present invention provides medical device holders that securely retain stents and other medical devices during the application of a coating while minimizing compressive and tensile forces applied to the stents. The invention avoids disruptions to coating quality due to holder blockage during coating deposition. The invention discloses an improved device containing a mandrel and frame that may improve coating uniformity by eliminating shadowing from the frame of the medical device holder when applying coatings to stents and other medical devices. | 04-09-2009 |
20090093870 | Method for Holding a Medical Device During Coating - The present invention is directed towards the holding of medical devices during manufacture to enable the application of therapeutic and/or protective coatings. More specifically, the present invention provides medical device holders that securely retain stents and other medical devices during the application of a coating while minimizing compressive and tensile forces applied to the stents. The invention avoids disruptions to coating quality due to holder blockage during coating deposition. The invention discloses an improved device containing a mandrel and frame that may improve coating uniformity by eliminating shadowing from the frame of the medical device holder when applying coatings to stents and other medical devices. | 04-09-2009 |
20090222037 | ULTRASONIC VASCULAR CLOSURE DEVICE - The present invention relates to the use of a low frequency ultrasonic device for the delivery and activation of collagen based foam sealants to a human and/or animal patient for sealing puncture wounds in vascular tissues. The ultrasonic vascular closure device comprises an ultrasonic generator, an ultrasound transducer, a chamber containing a foam sealant, a transducer tip, a radiation surface, an orifice located at the distal end of the chamber. The foam sealant is ejected into a puncture wound and activated with ultrasonic waves emitting from the radiation surface. The ultrasonic waves induce vibrations within the foam sealant, slightly warming the foam sealants to assist the rapid sealing the puncture. The ultrasonic waves also provide and anesthetic effect for the pain and discomfort from the puncture site. | 09-03-2009 |
Patent application number | Description | Published |
20100100514 | SENSOR UNIT FOR ENVIRONMENT OBSERVATION COMPRISING A NEURAL PROCESSOR - A sensor unit comprising a sensor, a neural processor and a communication device, wherein the sensor unit is adapted to perform pattern recognition by means of the neural processor and to transfer the result of the pattern recognition via the communication device. | 04-22-2010 |
20110052011 | Monolithic Image Perception Device and Method - The present invention is directed to an apparatus which can acquire, readout and perceive a scene based on the insertion, or embedding of photosensitive elements into or on a transparent or semi-transparent substrate such as glass or plastic. The substrate itself may act as the optical device which deflects the photons of an incident image into the photosensitive elements. A digital neural memory can be trained to recognize patterns in the incident photons. The photosensitive elements and digital neural memory elements may be arranged with light elements controlled in accordance with the patterns detected. In one application, intelligent lighting units provide light while monitoring surroundings and/or adjusting light according to such surroundings. In another application, intelligent displays display images and/or video while monitoring surroundings and/or adjusting the displayed images and/or video in accordance with such surroundings. | 03-03-2011 |
20140029870 | Monolithic Image Perception Device and Method - The present invention is directed to an apparatus which can acquire, readout and perceive a scene based on the insertion, or embedding of photosensitive elements into or on a transparent or semi-transparent substrate such as glass or plastic. The substrate itself may act as the optical device which deflects the photons of an incident image into the photosensitive elements. A digital neural memory can be trained to recognize patterns in the incident photons. The photosensitive elements and digital neural memory elements may be arranged with light elements controlled in accordance with the patterns detected. In one application, intelligent lighting units provide light while monitoring surroundings and/or adjusting light according to such surroundings. In another application, intelligent displays display images and/or video while monitoring surroundings and/or adjusting the displayed images and/or video in accordance with such surroundings. | 01-30-2014 |
Patent application number | Description | Published |
20130315906 | Activatable Antibodies That Bind Epidermal Growth Factor Receptor And Methods Of Use Thereof - The invention relates generally to activatable antibodies that include a masking moiety (MM), a cleavable moiety (CM), and an antibody (AB) that specifically binds to epidermal growth factor receptor (EGFR), and to methods of making and using these anti-EGFR activatable antibodies in a variety of therapeutic, diagnostic and prophylactic indications. | 11-28-2013 |
20140010810 | Anti-Jagged 1/Jagged 2 Cross-Reactive Antibodies, Activatable Anti-Jagged Antibodies And Methods Of Use Thereof - This invention relates generally to the generation of antibodies, e.g., monoclonal antibodies including fully human monoclonal antibodies, that recognize Jagged 1 and/or Jagged 2, to antibodies, e.g., monoclonal antibodies including fully human antibodies that recognize Jagged 1 and/or Jagged 2, and nucleic acid molecules that encode antibodies, e.g., nucleic acid molecules that encode monoclonal antibodies including fully human cross-reactive antibodies that recognize both Jagged 1 and Jagged 2, and to methods of making the anti-Jagged antibodies and methods of using the anti-Jagged antibodies as therapeutics, prophylactics, and diagnostics. The invention also relates generally to activatable antibodies that include a masking moiety (MM), a cleavable moiety (CM), and an antibody (AB) that specifically bind to Jagged 1 and Jagged 2, and to methods of making and using these activatable anti-Jagged antibodies in a variety of therapeutic, diagnostic and prophylactic indications. | 01-09-2014 |
20140255313 | Compositions and Methods for Detecting Protease Activity in Biological Systems - The invention relates generally to compositions and methods for detecting protease activity in a subject or a biological sample using activatable antibodies, and the use of these compositions and methods in a variety of diagnostic indications. | 09-11-2014 |
Patent application number | Description | Published |
20090150534 | Load balancing technique implemented in a data network device utilizing a data cache - Techniques for implementing a load balanced server system are described which may be used for effecting electronic commerce over a data network. The system comprises a load balancing system and a plurality of servers in communication with the load balancing system. Each of the plurality of servers may include a respective data cache for storing state information relating to client session transactions conducted between the server and a particular client. The load balancing system can be configured to select, using a load balancing protocol, an available first server from the plurality of servers to process an initial packet received from a source device such as, for example, a client machine of a customer. The load balancing system can also configured to route subsequent packets received from the source device to the first server. Before generating its response, the first server may verify that the state information relating to a specific client session stored in the data cache is up-to-date. If the first server determines that the state information stored in the data cache is not up-to-date, then the first server may be configured to retrieve the desired up-to-date state information from a database which is configured to store all state information relating to client sessions which have been initiated with the server system. | 06-11-2009 |
20110173090 | Load balancing technique implemented in a data network device utilizing a data cache - Techniques for implementing a load balanced server system are described which may be used for effecting electronic commerce over a data network. The system comprises a load balancing system and a plurality of servers in communication with the load balancing system. Each of the plurality of servers may include a respective data cache for storing state information relating to client session transactions conducted between the server and a particular client. The load balancing system can be configured to select, using a load balancing protocol, an available first server from the plurality of servers to process an initial packet received from a source device such as, for example, a client machine of a customer. The load balancing system can also configured to route subsequent packets received from the source device to the first server. Before generating its response, the first server may verify that the state information relating to a specific client session stored in the data cache is up-to-date. If the first server determines that the state information stored in the data cache is not up-to-date, then the first server may be configured to retrieve the desired up-to-date state information from a database which is configured to store all state information relating to client sessions which have been initiated with the server system. | 07-14-2011 |
Patent application number | Description | Published |
20130185214 | System and Method For Secure Offline Payment Transactions Using A Portable Computing Device - Disclosed is a system and method that provides a merchant associated with a point of sale (“POS”) system and a consumer associated with a portable computing device (“PCD”) to complete a purchase transaction without transmitting or presenting confidential payment credentials. In an exemplary embodiment, sound is used to transmit data between the POS and the PCD. A payment request is rendered on the PCD. The consumer reviews and authorizes via a unique cryptographic signature. The merchant approves via addition of its unique cryptographic signature. A remote service in communication with the POS verifies the signatures via previously registered public keys. The transaction is then settled to a consumer account. Confirmation is returned to the POS and PCD. Advantageously, the transaction is commenced and completed without the PCD being online. Further, the consumer payment credentials are not stored on the PCD or transmitted from the PCD to the merchant POS system. | 07-18-2013 |
20130217332 | Platform for Wireless Identity Transmitter and System Using Short Range Wireless Broadcast - Methods, systems and devices for locating a wireless identity transmitter with a central server connected with one or more proximity broadcast receivers, such as stationary receivers or mobile devices operating as wireless receivers. The wireless identity transmitter may be a compact device configured to broadcast messages, such as through Bluetooth® advertisements, including an identification code. When within proximity, a proximity broadcast receiver may receive broadcast messages from the wireless identity transmitter and relay location information along with the wireless identity transmitter's identification code to a central server as sighting messages. The proximity broadcast receiver's own location may provide an approximate location for the wireless identity transmitter. The central server may process sighting messages, which may include signal strength information, to accurately locate the wireless identity transmitter. The central server may transmit data to third-party devices and/or mobile devices of users in response to receiving sightings messages. | 08-22-2013 |
20130316679 | SYSTEMS AND METHODS FOR MANAGING CONCURRENT AUDIO MESSAGES - A system for receiving multiple conversations or messages and for playing the multiple conversations or messages with a mobile device and wireless earpieces. The system may determine various presentation parameters based on various characteristics of the received messages and may play the messages such that audio appears at distinguishing locations around the user. The system may change how messages and/or conversations are played in response to recognize a change in the focus of the user based on detected user inputs, such as body movement gestures. | 11-28-2013 |
20130316746 | PERSONAL HUB PRESENCE AND RESPONSE - Methods, devices, and systems for transmitting convenient messages to a recipient for rendering based on the recipient's device availabilities. A recipient's mobile device may be connected to a personal hub and/or earpiece devices configured to render various incoming communications, such as audio messages and visual messages. The incoming messages may be delivered to the recipient's mobile device and other connected devices that may render the contents of the incoming messages. A delivery confirmation message that describes the receipt and use of incoming messages may be generated and returned to a sender's computing device. In an embodiment, the recipient's devices may generate status information for describing the status of devices to a sender's computing device. In an embodiment, the sender's computing device may generate and transmit outgoing messages formatted based on the received status information and including metadata that instructs the recipient's devices to render message content in particular manners. | 11-28-2013 |
20140337098 | SYSTEM AND METHOD FOR TIME OF PURCHASE CONSUMER SURVEY - A method and system are described for conducting a consumer survey during a checkout process at a retailer location with a consumer who is associated with a portable computing device (“PCD”). A survey ID associated with a time of purchase (“TOP”) survey is presented as a QR code to the consumer during the checkout process. Based on the survey ID, provision of a TOP survey is initiated. Survey content is selected and pushed to the PCD. The survey content may have been preselected or may be dynamically selected based on factors including, but not limited to, recognition of items being scanned during the checkout process, responses to previously pushed survey content, historical purchasing patterns of the consumer, time of day, etc. Provisioning of a TOP survey may end at the conclusion of the checkout process so that the consumer can complete payment and leave the retail location. | 11-13-2014 |
20150019320 | SYSTEM AND METHOD FOR DETERMINING A DEFAULT ACCOUNT IN A MOBILE WALLET WHILE PROVIDING AN INCENTIVE TO ESTABLISH A DEFAULT ACCOUNT IN THE MOBILE WALLET - A method and system for determining a default account in a mobile wallet of a portable computing device while providing an incentive to establish a default account in the mobile wallet includes receiving a confirmation that the mobile wallet exists in the portable computing device, such as a mobile phone. Communications may be established with the mobile wallet over a communications network so that it can be determined which financial account in the mobile wallet is the default account. Subsequently, a reward may be transmitted over the communications network if a default account matches an account of a financial service provider that is trying to determine their financial account in the mobile wallet is the default account. According to one embodiment, determining which financial account in the mobile wallet is the default account may include transmitting a request for a payment over the communications network to the portable computing device. | 01-15-2015 |
Patent application number | Description | Published |
20120246071 | SYSTEM AND METHOD FOR PRESENTMENT OF NONCONFIDENTIAL TRANSACTION TOKEN IDENTIFIER - In an exemplary embodiment, a method for leveraging a payment token comprising a non-confidential number (i.e., “cellcard number”), such as a phone number associated with a user's portable computing device (“PCD”), to effect purchase transactions against one of possibly a plurality of value accounts associated with the non-confidential number comprises presenting a cellcard number for purchase of goods, requesting that a value account associated with the cellcard number be debited and, before debiting the value account and completing the purchase transaction, transmitting a request for authorization of the transaction to the user's PCD. | 09-27-2012 |
20120278236 | SYSTEM AND METHOD FOR PRESENTMENT OF NONCONFIDENTIAL TRANSACTION TOKEN IDENTIFIER - A method and system for completing a purchase transaction includes receiving the non-confidential number to effect a purchase transaction from a caller identifier and requesting that a value account associated with the non-confidential number be debited, wherein the debit amount is associated with the purchase transaction. A request for authorization is transmitted to an operator of at least one of portable computing device and a landline phone, wherein the request seeks authorization to debit the value account. The at least one value account may comprise a credit account in which the telephone number may form part of the primary account number (PAN) governed by the ISO/IEC 7812 card number standard. | 11-01-2012 |
20130019304 | Method and apparatus for detecting and dealing with a lost electronics deviceAANM CAI; LukaiAACI Redondo BeachAAST CAAACO USAAGP CAI; Lukai Redondo Beach CA USAANM Menendez; Jose R.AACI San DiegoAAST CAAACO USAAGP Menendez; Jose R. San Diego CA USAANM Silverstein; Roy BenjaminAACI San DiegoAAST CAAACO USAAGP Silverstein; Roy Benjamin San Diego CA USAANM Parameswaran; RajkrishnanAACI San DiegoAAST CAAACO USAAGP Parameswaran; Rajkrishnan San Diego CA US - Techniques for detecting and dealing with a lost electronics device are disclosed. In one design, the device may autonomously determine whether it is lost. The device may destroy at least one component to render it inoperable and may perform other actions in response to determining that it is lost. In another design, the device may determine available battery power of the device upon determining that it is lost, select at least one action in a list of possible actions based on the available battery power, and perform the selected action(s). In yet another design, upon determining that it is lost, the device may prevent access to information on the device based on a secondary security key, which is not used for encrypting information during normal operation. In yet another design, the device may notify at least one contact and may perform at least one additional action upon determining that it is lost. | 01-17-2013 |
20130166390 | CROWD-DETERMINED FILE SIZE UPLOADING METHODS, DEVICES AND SYSTEMS - Various embodiments include methods for uploading files to a social media website, including reformatting the selected files to reduce the amount of bandwidth required in the upload, uploading the reformatted files to a social media website server, receiving an indication of the popularity of certain identified files, and uploading from to the server the identified popular files in full or larger format. The social media website server may determine the popularity of files based on user interactions with the files, and request greater resolution versions of the files when the interactions exceed a popularity threshold. | 06-27-2013 |
20130166391 | CROWD-DETERMINED FILE UPLOADING METHODS, DEVICES, AND SYSTEMS - Various embodiments include methods for uploading files to a social media website, including receiving in a computing device a user input identifying files for upload to a social media website, selecting one or more files representative of the selected files, uploading the representative files to a social media website server, receiving in the computing device from the social media website server a request for upload of files similar to identified particular representative files, and uploading the additional files that are similar to the identified particular representative files. The social media website server may determine the popularity of files based on user interactions with the files, and request additional files similar to the particular uploaded files when the interactions exceed a popularity threshold. | 06-27-2013 |
20130244633 | SYSTEMS AND METHODS FOR PROVIDING NOTIFICATIONS - A personal hub for managing notifications across mobile devices and for separating the notification from the content. By separately managing the manner of notification provided to the user from its associated content, the personal hub may give a user more control over a number of mobile devices by allowing the user to escalate or dismiss different notifications across one or more mobile devices. Notifications may be managed based on device settings, priority settings, privilege settings, urgency flags, and/or other factors. In an embodiment, the user may receive an unobtrusive user-perceptible notification of an incoming communication from a personal hub that is less obtrusive than notifications which may be generated by the mobile device receiving the incoming communication. | 09-19-2013 |
20130297926 | MOBILE DEVICE CONTROL BASED ON SURFACE MATERIAL DETECTION - A mobile device uses sensor data related to the type of surface in contact with the mobile device to determine an action to perform. The sensors, by way of example, may be one or more of a microphone and noise generator, a light based proximity sensor, and pressure sensors, such as dielectric elastomers, configured to detect a texture of the surface, and/or pressure waves produced by setting the mobile device down or by a noise generator and reflected by the surface. The mobile device may identify the type of surface and perform the action based on the type of surface. The mobile device may further determine its location based on the sensor data and use that location to identify the action to be performed. The location may be determined using additional data, e.g., data not related to determining the type of surface with which the mobile device is in contact. | 11-07-2013 |
20140089078 | SYSTEM AND METHOD FOR MANAGING CARBON EMISSION CREDITS AT A FUEL DISPENSING STATION USING VEHICLE ON-BOARD DIAGNOSTICS DATA - Systems and methods are provided for managing carbon emission credits associated with a vehicle fueling at a fuel dispensing station. An exemplary method comprises: receiving a request via a communications network for a vehicle fueling transaction at a fuel dispensing station; determining a pump identifier associated with the fuel dispensing station; sending a message to a store controller associated with the pump identifier for a fuel amount dispensed by the fuel dispensing station; receiving the fuel amount from the store controller; receiving on-board diagnostics (OBD) data associated with the vehicle; calculating a carbon emission adjustment based on the OBD data; and determining an estimated carbon emissions amount associated with the vehicle fueling transaction by applying the carbon emission adjustment to a predetermined carbon emissions amount for the fuel amount. | 03-27-2014 |
20140208387 | Device utilizing an optical signal to access an access point - Disclosed is a device that receives an optical signal having an authorization code that allows the device to utilize an access point to obtain access to the Internet and other networks. The device may include: a modem; a light sensor; and a processor. The light sensor may receive an optical signal from a light source. The processor may execute operations including: processing the received optical signal to identify an authorization code and to connect the device through the modem to the access point based upon the authorization code such that the device may obtain access to the Internet and other networks. | 07-24-2014 |
20150120442 | SYSTEMS AND METHODS FOR MOBILE ADVERTISING ON MULTI-SIM DEVICES - Systems and methods are disclosed for managing mobile advertisement in a smartphone that has multiple Subscriber Identification Module (SIM) capability to more effectively and more efficiently target mobile ads to smartphone users. Multi-SIM-capable devices such as DSDA devices have two subscriptions (e.g., two phone numbers) to one or more mobile telephony networks. One subscription may be used for personal use and the other subscription for work. The two SIM subscriptions and their characteristics may be considered when selecting the mobile ads to present to the users on the DSDA devices. Further, knowledge on the intended or actual use of the two subscriptions may be used to select, limit, adapt, or otherwise differentiate the mobile ads delivered to the user on the two subscriptions. The channel characteristics of the two SIM subscriptions may also be used to more efficiently deliver ads to the two SIM subscriptions. | 04-30-2015 |
Patent application number | Description | Published |
20130217333 | DETERMINING REWARDS BASED ON PROXIMITY OF DEVICES USING SHORT-RANGE WIRELESS BROADCASTS - Methods, systems and devices for presenting rewards to users based on proximity of short-range wireless devices. A wireless identity transmitter may periodically transmit wireless broadcast messages that include obscured identifiers. When within proximity, a proximity broadcast receiver, such as a mobile device carried by a user, may receive and relay the broadcast messages to a server which may process the included information. Based on decrypting the obscured identifiers, the central server may determine whether relayed messages relate to devices associated with a reward program, and may calculate rewards, such as coupons, money, or prizes. Rewards may be presented to users based on sensor data indicated within broadcast messages. In an embodiment, when the server receives a sighting message related to an active search for a target device, a reward is presented to the user of the proximity broadcast receiver that transmitted the sighting message. | 08-22-2013 |
20130282438 | SYSTEM FOR DELIVERING RELEVANT USER INFORMATION BASED ON PROXIMITY AND PRIVACY CONTROLS - Methods, systems and devices for providing relevant user information to devices within proximity of a user. A wireless identity transmitter associated with the user periodically broadcasts messages that include obscured identifiers. A proximate proximity broadcast receiver may receive and relay the broadcast messages to a central server which may process the included information. Based on categories related to the proximity broadcast receiver and the user, the central server may identify subsets of stored profile information about the user that are relevant to the proximity broadcast receiver. The central server may transmit relevant profile information to devices to assist in activities associated with the proximity broadcast receiver. In an embodiment, the central server may only transit relevant profile information that is authorized by the user via permissions associated with the profile. Further, the central server may transmit payment authentication profile information for use by point-of-sale devices within proximity of the user. | 10-24-2013 |
20140254434 | EXCHANGING A CONTACT PROFILE BETWEEN CLIENT DEVICES DURING A COMMUNICATION SESSION - In an embodiment, a client device (CD) maintains a contact profile for a user of the CD, the contact profile including a universal identifier (UID) for the user and a list of devices and addresses at which the user of the CD can be contacted. The CD establishes a communication session with a remote CD (RCD) via a given contact address from the set of contact addresses for the RCD. The CD shares, in response to the communication session establishment, at least a portion of the contact profile to the RCD. The RCD generates and/or updates a given contact profile for the user of the CD that is maintained on the RCD based on the shared contact profile. The RCD can also share its profile with the CD in response to the communication session establishment, causing the CD to generate and/or update a contact profile for the RCD. | 09-11-2014 |
20140254435 | ASSOCIATING A VOIP PROVIDER WITH A SET OF VOIP NETWORKS AS A PREFERRED OR DEFAULT VOIP PROVIDER - In an embodiment, a Voice over Internet Protocol (VoIP) bidder negotiates with a VoIP provider and/or a VoIP access network to establish the VoIP provider as a preferred or default VoIP provider for the VoIP access network (e.g., a set of particular WiFi APs, a non-roaming cellular access network, etc.). As the preferred or default VoIP provider, the VoIP access network gives preferential performance and/or contract terms (or VoIP opportunities) for providing VoIP service to user equipments (UEs) via the VoIP provider as compared to one or more other VoIP providers that are also configured to provide VoIP service to the UEs over the VoIP access network. In a further embodiment, one of the UEs connects to the VoIP access network and advertises, to a user of the UE, the preferential performance and/or contract terms available to the UE via the VoIP provider over the VoIP access network. | 09-11-2014 |
20140254478 | ENHANCED CALL CONTROL FOR DIRECTING A CONTENT PATH OVER MULTIPLE CONNECTIONS - Aspects for enhancing call control for directing a content path over multiple connections may include a method which includes establishing a first connection to a destination to use as a content path, receiving information from the destination for establishing an alternative connection, establishing as the alternative connection a background connection to the destination based on the information received, evaluating whether the background connection is preferable to the first connection for use as the content path, and switching the content path to the background connection when the background connection is preferable. Another method may include establishing a first connection as a content path and a background connection simultaneously to a destination for exchanging call traffic representing the same content, evaluating whether the background connection is preferable to the first connection for use as the content path, and switching the content path to the background connection when the background connection is preferable. | 09-11-2014 |
20140269497 | SYSTEM AND METHOD FOR ALLOWING MULTIPLE DEVICES TO COMMUNICATE IN A NETWORK - A method for allowing multiple devices to communicate includes initiating a multi-media communication session between a first device and a second device, each of the first and second device having access to at least one additional device, identifying at least a portion of the multi-media communication session to direct to the at least one additional device, the first device obtaining a unique identifier of the at least one additional device and directing the identified at least a portion of the multi-media communication session to the at least one additional device. | 09-18-2014 |
20140274031 | SHARING DATA AMONG PROXIMATE MOBILE DEVICES WITH SHORT-RANGE WIRELESS SIGNALS - Methods, systems and devices for promoting power conservation by sharing data between proximate mobile devices via short-range wireless signals. In an embodiment, a mobile device may determine whether to utilize long-range communications to obtain data, such as music track data. In an embodiment, the mobile device and/or a central server may evaluate load-balancing information, such as the frequency mobile devices within an area obtain data, to determine whether the mobile device should obtain the data. When the mobile device should not obtain data, the mobile device may instead receive data via short-range wireless signals from proximate devices. If the passive data is useful, the mobile device may use the passive data, such as by storing received data in an operating system table. Based on conditions, such as available battery power, the mobile device may also be configured to share obtained or received data by broadcasting short-range wireless signals. | 09-18-2014 |
20140280706 | SYSTEM AND METHOD FOR PRIORITIZING FILE TRANSFER - A method for prioritizing file delivery includes capturing content at a sending device, establishing a sending priority for the captured content, sending the captured content when at least one condition is true; and at a receiving device, receiving the captured content when the at least one condition is true. | 09-18-2014 |
Patent application number | Description | Published |
20150358808 | Exchanging A Contact Profile Between Client Devices During A Communication Session - In an embodiment, a client device (CD) maintains a contact profile for a user of the CD, the contact profile including a universal identifier (UID) for the user and a list of devices and addresses at which the user of the CD can be contacted. The CD establishes a communication session with a remote CD (RCD) via a given contact address from the set of contact addresses for the RCD. The CD shares, in response to the communication session establishment, at least a portion of the contact profile to the RCD. The RCD generates and/or updates a given contact profile for the user of the CD that is maintained on the RCD based on the shared contact profile. The RCD can also share its profile with the CD in response to the communication session establishment, causing the CD to generate and/or update a contact profile for the RCD. | 12-10-2015 |
20150381689 | Methods, Systems and Devices for Spoiler Alert and Prevention Using Networking Framework - Methods, systems and devices are provided for blocking spoiler content from being presented by a content presenting device to a user of a mobile computing device. The content presenting device and the mobile computing device may communicate using a networking framework. One or more spoiler alert events received by the content presenting device via the communication networking framework from the mobile computing device include information associated with content that has not been viewed by a user of the mobile computing device. The information associated with the content that has not been viewed is compared with the content to be presented. It may be determined whether the content to be presented by the content presenting device includes the spoiler content, and, if so, the presentation of the spoiler content by the content presenting device is restricted. | 12-31-2015 |
20160042255 | Method and Systems For Incorporating Advertisements In Objects Printed On Three-Dimensional Printers - Systems, methods, and devices of the various embodiments enable advertisements (e.g., promotions, signs, logos, samples, etc.) to be part of the 3-D printing process. In an embodiment, advertisements (i.e., “ads”), such as partial product samples, may be 3-D printed prior to 3-D printing a purchased 3-D printable good. In another embodiment, ads may be 3-D printed on a 3-D printable good itself (e.g., embossed, impressed, as a tag, etc.). In a further embodiment, users may select the ads to be 3-D printed on their goods in return for compensation from advertisers. | 02-11-2016 |
Patent application number | Description | Published |
20090116702 | Image Recognition of Content - Techniques are described to employ image recognition techniques to content. In an implementation, one or more images are identified in content using a signature derived from the one or more images. Metadata associated with the content is then supplemented based on the identified one or more images. | 05-07-2009 |
20120180081 | Image Recognition of Content - Techniques are described to employ image recognition techniques to content. In an implementation, one or more images are identified in content using a signature derived from the one or more images. Metadata associated with the content is then supplemented based on the identified one or more images. | 07-12-2012 |
20120185891 | Image Recognition of Content - Techniques are described to employ image recognition techniques to content. In an implementation, one or more images are identified in content using a signature derived from the one or more images. Metadata associated with the content is then supplemented based on the identified one or more images. | 07-19-2012 |
20130301916 | Image Recognition of Content - Techniques are described to employ image recognition techniques to content. In an implementation, one or more images are identified in content using a signature derived from the one or more images. Metadata associated with the content is then supplemented based on the identified one or more images. | 11-14-2013 |
20140282674 | Image Recognition of Content - Techniques are described to employ image recognition techniques to content. In an implementation, one or more images are identified in content using a signature derived from the one or more images. Metadata associated with the content is then supplemented based on the identified one or more images. | 09-18-2014 |
Patent application number | Description | Published |
20130204091 | ANTERIOR HIP REPLACEMENT RETRACTOR ASSEMBLY - A retractor assembly has a first clamp adapted to be mounted to a table, a first vertically oriented post supported by the clamp, a first main arm mounted for at least one of angular and lateral movement relative to the first post, and lockable in a selected position, and a tree assembly configured at one end of the second post. The tree assembly has at least two accessory arms, with each accessory arm having a first ball joint on a first end, and a pivot lock knob at an immediate portion, and each accessory arm having a second end configured to accept the mounting of a retractor to the accessory arm. The retractor assembly may also include a J-shaped hook mounted to a ratcheting linearly movable distractor assembly and trochanteric retractors mounted to the accessory arms for femoral elevation and exposure. | 08-08-2013 |
20130204262 | SURGICAL PROCESS FOR ANTERIOR HIP REPLACEMENT - Various exemplary embodiments relate to a method of performing an anterior approach hip replacement using a retractor assembly. The method may include: providing a retractor assembly including a first vertical post, a plurality of accessory arms mounted to the first post, a second vertical post, and a femur distractor mounted to the second post; exposing a surgical site including the femoral neck and acetabulum using a plurality of retractors secured to the accessory arms; cutting the femoral neck to remove the femoral head; preparing the acetabulum for insertion of an acetabular cup; preparing the femur for insertion of a femoral implant by lifting the femur using a femur hook and the femur distractor; and closing the surgical site. In various alternative embodiments, the retractors may include a lesser trochanteric retractor coming from a direct medial approach and a greater trochanteric retractor coming from a lateral, posterior, proximal approach. | 08-08-2013 |
20140358149 | SURGICAL PROCESS FOR ANTERIOR HIP REPLACEMENT - Various exemplary embodiments relate to a method of performing an anterior approach hip replacement. The method may include: exposing a surgical site including the femoral neck and acetabulum using a plurality of retractors secured to the plurality of accessory arms; cutting the femoral neck to remove the femoral head; preparing the acetabulum for insertion of an acetabular cup; preparing the femur for insertion of a femoral implant by lifting the femur using a femur hook and the femur distractor; and closing the surgical site. In various alternative embodiments, the method may include using a lesser trochanteric retractor corning from a direct medial approach and a greater trochanteric retractor coming from a lateral, posterior, proximal approach. | 12-04-2014 |
Patent application number | Description | Published |
20130227215 | PROVIDING RECORD LEVEL SHARING (RLS) TO INDIVIDUAL CATALOGS - In one embodiment, a storage system includes a server system having a processor and a local buffer pool for storing instances for use in catalog requests, and a Direct Access Storage Device (DASD) subsystem electrically coupled to the server system and to at least one DASD, wherein the at least one DASD is adapted for providing at least one catalog configured according to a Basic Catalog Structure (BCS), wherein the at least one catalog includes at least one of: a user catalog including information related to locations of user data sets and system data sets stored to the at least one DASD, and a tape volume catalog including information related to locations of user data sets and system data sets stored to at least one tape medium, and wherein the data storage system is adapted for providing Record Level Sharing (RLS) for the at least one catalog stored to the at least one DASD. | 08-29-2013 |
20130290271 | ASYNCHRONOUS SERIALIZATION FOR AGGREGATING PROCESS RESULTS - In one embodiment, a system includes logic adapted for receiving a first request to change a state of a first group of catalogs, determining which of a plurality of catalogs belong in the first group, adding a change request for each of the first group of catalogs to a queue for processing, causing processing of each change request in the queue to change the state of each of the first group of catalogs according to the first request, creating a first group result indicating successful or failed state change upon a catalog in the first group of catalogs finishing processing, passing the first group result to an adjacent catalog in the first group of catalogs, removing each catalog that has finished processing from the first group of catalogs, and outputting the group result when there are no adjacent catalogs available to pass the group result. | 10-31-2013 |
20140279859 | INDEX RECORD-LEVEL LOCKING FOR FILE SYSTEMS USING A B+TREE STRUCTURE - In one embodiment, a process includes determining a data node for a data record to be inserted and/or updated in an index structure of a record-oriented file system. A lock on the corresponding data node is created, and the data record in the corresponding data node is stored and/or updated. However, when the corresponding data node does not have free space sufficient to store and/or update the data record, the corresponding data node is split sequentially into two data nodes. The new data record is stored in one of the two data nodes. The process continues by creating a lock on and updating a parent node in a sequence set which includes information about the corresponding data node and any parent index nodes above the parent index node which are affected by splitting the parent index node. | 09-18-2014 |
20140279983 | PROVIDING RECORD-LEVEL ALTERNATE-INDEX UPGRADE LOCKING - In one embodiment, a method includes receiving a request to perform an update on a base data set in a record-oriented file system, locate all alternate index (AIX) records for the base data set, each AIX record including an alternate key field along with one or more relative byte address (RBA) values when the base data set is an entry sequenced data set (ESDS) or one or more primary keys when the base data set is a key sequenced data set (KSDS). Each RBA value/primary key corresponds to one record in the base data set. Individual record-level locks are acquired on each affected AIX record that includes alternate key field values and/or RBA values that are modified by the update. The affected AIX records may be updated after acquiring the individual record-level locks on each of the affected AIX records. Moreover, the affected AIX records may be updated in parallel with updating of unaffected AIX records, thereby greatly increasing performance. | 09-18-2014 |
20140289209 | PROVIDING RECORD-LEVEL SHARING (RLS) TO LOCAL DATA SETS - Systems, methods, and computer program products are described for providing record-level sharing (RLS) for data sets to local users of a system. In one embodiment, a process includes requesting access to a data set from a record-oriented file system in which the file system manages records on behalf of one or more users, and the access is requested for a first local user. The process proceeds by locking the data set in the file system such that no direct access of the data set is allowed. Read and/or write requests for the data set are processed using the representation of the data set in the designated server address space. The data set in the file system is updated with any changes made to the representation of the data set in the designated server address space. | 09-25-2014 |
20150154117 | PROVIDING RECORD LEVEL SHARING (RLS) TO INDIVIDUAL CATALOGS - In one embodiment, a data storage system includes a server system that includes a processor and a local buffer pool configured to store instances for use in catalog requests, and a direct access storage device (DASD) subsystem electrically coupled to the server system and to at least one DASD, where the at least one DASD includes an integrated catalog facility (ICF) configured to provide at least one catalog, and where the data storage system is configured to provide record level sharing (RLS) for the at least one catalog stored to the at least one DASD. | 06-04-2015 |
20150234858 | PROVIDING RECORD-LEVEL ALTERNATE-INDEX UPGRADE LOCKING - In one embodiment, a method includes receiving a request to perform an update on a base data set in a record-oriented file system, wherein one or more affected records within the base data set are modified by the update. Affected alternate index (AIX) records corresponding to the affected records are located, and individual record-level locks are acquired on each affected AIX record. Each of the affected AIX records is updated according to the update after acquiring the individual record-level locks on each of the affected AIX records. | 08-20-2015 |
Patent application number | Description | Published |
20100057741 | SOFTWARE RESOURCE ACCESS UTILIZING MULTIPLE LOCK TABLES - A computing system includes a plurality of coupled computing systems, a centralized server and a data set. The system also includes a data sharing controller which includes a primary lock structure that is coupled to the data set when an address space for the data set is allocated and a plurality of secondary lock tables. Each secondary lock table is assigned to a different portion of the data set. | 03-04-2010 |
20120151268 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ERROR CODE INJECTION - In one embodiment, a computer program product for injecting error code includes a computer readable storage medium having computer readable program code embodied therewith. The computer readable program code includes computer readable program code configured to determine critical points in executing code of software under test, computer readable program code configured to determine an appropriate response action for each critical point based on an error encountered at each critical point, computer readable program code configured to inject a critical point segment into the executing code at a corresponding critical point, and computer readable program code configured to output a unique identifier of each critical point segment. In another embodiment, a system includes a processor, and a computer readable storage medium having computer readable program code embodied therewith having the above described functionality. Other systems and computer program products are described according to more embodiments. | 06-14-2012 |
20140289567 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ERROR CODE INJECTION - In various embodiments, a method, system, and computer program product for injecting error code include logic and/or program instructions configured for determining critical points in executing code of software under test, building a testcase to invoke the software under test, determining an appropriate response action for each critical point based on an error encountered at each critical point, injecting a critical point segment into the executing code at a corresponding critical point, and outputting a unique identifier of each critical point segment, the testcase being configured to issue commands, with each command limiting which of one or more critical points remains active based on one of: a number of times the one or more critical points have been accessed in the executing code, a number of times a critical point has been skipped, and an amount of times a critical point has been accessed versus skipped. | 09-25-2014 |
20150161027 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ERROR CODE INJECTION - In various embodiments, a method, system, and computer program product for injecting error code include logic and/or program instructions configured to determine, by a local processor, critical points in executing code of software under test on a remote system, build, by the local processor, a testcase to invoke the software under test on the remote system, determine, by the local processor, an appropriate response action for each critical point based on an error encountered at each critical point as reported by a remote processor of the remote system, cause, by the local processor, the remote processor to inject a critical point segment into the executing code at a corresponding critical point, and receive, by the local processor, a unique identifier of each critical point segment output by the remote processor in response to injecting the critical point segment into the executing code. | 06-11-2015 |