Patent application number | Description | Published |
20110191362 | COMPOSING VIEWS WITH AUTOMATIC CREATION OF LINKS - The present invention extends to methods, systems, and computer program products for composing views with automatic creation of links. Generally, views receive data through a query. Views also can have bindings to variables, for example, to represent what is selected in the view. Analyzing these queries can be used to determine whether a composition is valid, and how to compute a new query for a composed second view. In a composite view, a selection variable is utilized, and is bound to the selection parameter of the new first view. The data query for the second new view is re-written to refer to the selection variable in the composite. | 08-04-2011 |
20120167039 | XML Application Framework - The present invention relates to an XML application framework (XAF). XAF applications are data driven such that all operations with the computer system are data focused. In addition, the components used in the XAF application are instantiated and connected according to how the data is displayed and what type of data is used. Applications within XAF comprise a user interface (UI) connector, an action module, and a data connector. UI connectors receive UI events and connect the UI event to an action module. The action module generates a standard format action from the UI event and sends it to the data connector. The data connector translates the standard format action into a data-specific action that changes data in a data store. A data connector then sends a standard format data representation corresponding to the changed data back to the UI connector to provide the changed data to the UI. | 06-28-2012 |
Patent application number | Description | Published |
20090100084 | GENERIC MODEL EDITING FRAMEWORK - In one embodiment, a computer system generates a view of entities associated with varying data types for presentation on a generic viewer. The entities and data types have relationships as defined in a corresponding schema. The schema is stored as data in a repository with the data types. The computer system receives an edit request configured to change various selected entities, where each entity has an associated data type, queries the repository to determine various properties of the selected entities corresponding to the received edit request including the data type, and determines, based on the schema, that the edit is valid based on relationship information stored in the schema. The computer system also sends the validated edit information to the generic viewer for presentation. The generic viewer has no prior knowledge of how to handle the selected entities and corresponding data types. | 04-16-2009 |
20090112570 | DECLARATIVE MODEL INTERPRETATION - Embodiments described herein are directed to the constructing software applications based on data models and automatically reconfiguring runtime object graphs according to data model edits input by a user. In one embodiment, a computer system performs a method for constructing at least a portion of a software application based on a data model. The computer system accesses a data model that includes user-configurable construction information indicating how at least a portion of a software application is to be constructed. The declarative interpreter is configured to construct an application based on the construction information in the data model. The computer system interprets the construction information in the data model to determine how to construct at least a portion of the software application. The computer system also constructs at least a portion of the software application based on the interpretation of the construction information in the data model. | 04-30-2009 |
20090204944 | GENERIC XAD PROCESSING MODEL - Embodiments are directed to dynamically building software applications and dynamically updating software applications based on changed data values. In one embodiment, a computer system receives an indication that a software application is to be initiated. The computer system also receives an application description including tags describing software objects that are to be included in the software application, automatically maps portions of the application description identified by the tags to software objects using reflection, where the reflecting includes accessing properties associated with the software objects, and automatically binds properties of the software objects to the portions of the application description based declarative rules included in the software object properties associated with the software object. | 08-13-2009 |
20090287724 | Data Viewer Management - Embodiments described herein are directed to generating a customized data viewer, where the viewer is configured to display data at any level in a data model. In one embodiment, a computer system receives a user request indicating that portions of data are to be displayed in a user-customized manner using a data viewer. The computer system accesses the requested data portions that are to be displayed with the data viewer. The computer system generates a dynamic data viewer configured to display the accessed data portions in the user-customized manner indicated in the received user request. The computer system also applies the generated dynamic data viewer to the accessed data portions, such that the generated viewer displays the requested data portions in the user-customized manner. | 11-19-2009 |
20090288069 | Dynamic Declarative Application Description - Embodiments described herein are directed to dynamically reconfiguring at least a portion of an operating software application. In one embodiment, a computer system receives an edit indicating that at least one portion of an operating software application is to be edited, where the edit includes changes that are to be dynamically applied to the application. The computer system instantiates dynamic configuration builders designed to implement application changes as indicated by the received edit and determines which portions of the application are to be suspended while the changes to the application are implemented. The computer system suspends the determined application portions until the application changes are implemented and implements the changes indicated by the edit on the suspended portion of the application, while the remainder of the application continues operating. The computer system also dynamically reconfigures the application with the implemented changes, where the reconfiguring includes reinitializing the suspended application portions. | 11-19-2009 |
20100250623 | GENERIC EDITOR FOR DATABASES - Facilitating generic database editing to allow for data to be received from a user for entry into a database without requiring the data to conform to schema constraints for the database. A method includes examining a first schema for a first database. The first schema including a first set of constraints specified in the first schema on data to be entered into the first database. The method further includes, based on the examination, constructing a second database corresponding to the first database. The second database is associated with a second schema with a second set of constraints. The second set of constraints is a relaxed version of the first set of constraints specified in the first schema. | 09-30-2010 |
20130173672 | GENERIC EDITOR FOR DATABASES - Facilitating generic database editing to allow for data to be received from a user for entry into a database without requiring the data to conform to schema constraints for the database. A method includes examining a first schema for a first database. The first schema including a first set of constraints specified in the first schema on data to be entered into the first database. The method further includes, based on the examination, constructing a second database corresponding to the first database. The second database is associated with a second schema with a second set of constraints. The second set of constraints is a relaxed version of the first set of constraints specified in the first schema. | 07-04-2013 |
20140012883 | METADATA DRIVEN REPORTING AND EDITING OF DATABASES - Embodiments described herein are directed to providing enhanced database editing and reporting capabilities. In one scenario, a computer system receives a data item request that identifies which data items are to be reported. The computer system accesses a relational data store to determine which information sets are to be used for reporting the requested data items. Based on the determination, the computer system accesses those information sets that are to be used in the reporting the requested data items. The computer system then determines that metadata has been provided for at least one of the accessed information sets. The metadata includes instructions at least partially indicating how the data items are to be reported. The computer system also reports the data items according to the instructions in the provided metadata, regardless of how the data items are to be reported using the existing information sets. | 01-09-2014 |
Patent application number | Description | Published |
20080223918 | PAYMENT TOKENS - Systems and methods of payment processing via employing a payment token(s) that is supplied to smart portable devices, which are carried by customers. Such a token can be in form of a unique identifier(s) (which is generated by an issuing bank and received by the smart portable devices), and is associated with a payment amount for a merchant. Moreover, the point of sale (POS) terminal can accept the token offline, and hence a requirement for availability of communication between the POS and a payment processor/issuing bank can be mitigated. | 09-18-2008 |
20080228566 | PROCESSING COUPONS WITH PAYMENTS - Systems and methods that combine coupon processing with payment processing (e.g., a credit/debit card transaction). Payment processing entities can function as the coupon clearinghouse between coupon issuers and merchants. Accordingly, processing costs can be mitigated as coupons are no longer processed separately from other tenders, (e.g., coupons can be processed same manner electronic transactions related to payments are processed, and by the same service provider. | 09-18-2008 |
20080228567 | ONLINE COUPON WALLET - Systems and methods that electronically redeem coupons via an online storage component, which stores coupon data for a consumer and regardless of which issuer has issued the coupon. Such online storage medium can store coupons online (e.g., in a single location) without being tied to a particular service, and can readily provide redemption (e.g., an automatic redemption). The consumer and other retail entities (e.g., coupon issuers, merchants, and the like) can populate the online storage medium periodically, or in response to predetermined events (e.g., physical location of consumer, associated demographics, and the like.) | 09-18-2008 |
20080228568 | DELIVERY OF COUPONS THROUGH ADVERTISEMENT - Systems and methods that supply associations between advertisements—and—relevance of coupons for customers. Accordingly, the customer is empowered to interact with an advertising system, and the coupons obtained are considered desirable by the customer (e.g., non-spam). The advertisement system includes a presentation component (which presents advertisement to customers); a contextualization component (which analyzes context of purchase related to the advertisement such as location, profile, and basket of the customer), and a dispenser component (which dispenses the coupons based on customer initiation—e.g., pressing a button). | 09-18-2008 |
20090055322 | REMOVABLE MODULE IN PERSONAL HANDHELD DEVICES FOR PERSONAL INFORMATION EXCHANGE - A personal information exchange module in a standardized form is used as a plug-in to a personal handheld device for information exchange such as financial transactions, facility access, medical information exchange, and the like while protecting sensitive code and data associated with the module by separating those from the operating environment of the personal handheld device. Functional capabilities of the module may also be adjusted based on available power from the personal handheld device. | 02-26-2009 |
20090083189 | SECURING PAYMENT DATA - The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties. | 03-26-2009 |
20110264587 | SECURING PAYMENT DATA - The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties. | 10-27-2011 |
Patent application number | Description | Published |
20100146466 | METHODS AND SYSTEMS FOR WIRING SYSTEMS ANALYSIS AND VERIFICATION - A method for visually verifying an implementation of a design is described. The method includes integrating logical design data, physical design data, and physical implementation data into a common data format and graphically displaying the commonly formatted data to provide a visualization of the design, the visualization including a spatial context component associated with the physical implementation data. | 06-10-2010 |
20130167022 | LARGE COLUMNAR TEXT FILE EDITOR - The different advantageous embodiments provide a method for loading and editing text files. A text file is identified as input. A determination is made as to whether the text file is a columnar text file. If the text file is columnar, data information is retrieved for the text file. Pre-defined cache settings are identified. A determination is made as to whether the data information retrieved fits within the pre-defined cache settings. If the data information retrieved fits within the pre-defined cache settings, a determination is made as to whether the first row of the text file is a header row in a view. If the first row of the text file is not a header row, the text file is normalized. A view mode is selected for load and edit operations of the text file. | 06-27-2013 |
20150066870 | Correlation of Maximum Configuration Data Sets - A method of correlating data for multiple product configurations is provided comprising enhancing, by a processor, data set definition to accommodate data models of data sets describing multiple product configurations. The method also comprises comparing, by the processor, values of the data sets utilizing at least one matching algorithm and effectivity expressions identifying relevant rows for comparison in the data sets. The method also comprises enhancing, by the processor, the at least one matching algorithm to identify perfect and partial matches between the data sets wherein values of all data contained in the data sets are compared in one single operation comprising simultaneous validation of engineering data for the multiple product configurations. | 03-05-2015 |
Patent application number | Description | Published |
20110188645 | Telephone call handling system - A telephone call handling system wherein a user is provided with caller I.D. information. For responding to the information, the system affords the user a plurality of call handling options beyond the simple option of answering the call or not. The user can instruct the system to implement any one of the plurality of options. One option can send a call back message to the caller. Another option can send a hold message to the caller and then places the caller on hold. A third option can send entertainment to the caller such that user and caller can simultaneously enjoy the entertainment. | 08-04-2011 |
20110190012 | Telephone call handling system - A telephone call handling system includes a text selector to enable a user to select a text message prior to an incoming call. The text message can be stored in a text storage and sent by a text sender from the text storage for receipt at a caller's telephone during and/or after the incoming call. A delivery trigger can trigger the text sender to send the text message. The delivery trigger can be linked to delivery of an audio message, an audio content, an image or a video. The delivery trigger can be linked to call detection, call answer or call hang up. The user can be enabled to trigger the sending of the text message. The system can further include caller I.D. information. The user can employ the caller I.D. information in making a trigger decision. | 08-04-2011 |
20110319104 | Telephone call handling system - A telephone call handling system includes a text selector to enable a user to select a text message prior to an incoming call. The text message can be stored in a text storage and sent by a text sender from the text storage to a calling telephone. A delivery trigger can initiate the text sender to send the text message at the time of the telephone call. The delivery trigger can be linked to delivery of an audio message, an audio content, an image or a video. The delivery trigger can be linked to call detection, call answer or call hang up. The user can be enabled to initiate the sending of the text message. The system can further include caller I.D. information. The user can employ the caller I.D. information in making a decision to initiate the sending of the text message. | 12-29-2011 |
20120128138 | Telephone call handling system - A telephone call handling system includes a sendings receiver configured to receive sendings sent from the telephones of other party's via a telephone service. A sendings registry automatically inventories each received sending and forwards the inventoried sending to a storage where the sending is stored. Subsequently, a delivery trigger is triggered. The triggered trigger initiates a sendings provider to provide one or more of the inventoried and stored sendings to a deliverer. The deliverer then delivers the provided sending or sendings to one or more of: a speaker, a display, a text message display, an image display, a video display, an email delivery, an web-site poster, a service provider delivery, a delivery port, a ring-back delivery, a ring-back forward delivery and a ring-tone. | 05-24-2012 |
Patent application number | Description | Published |
20100131420 | APPARATUS, SYSTEMS AND METHODS FOR ONLINE, MULTI-PARCEL, MULTI-CARRIER, MULTI-SERVICE PARCEL RETURNS SHIPPING MANAGEMENT - The present invention provides a computer system (the “System”, or the “Return System”) that is configured and programmed to provide online stores with a fast, simple, convenient way for eCommerce customers of an online store to return merchandise purchased from that store from within that online store. The Return System provides multi-carrier shipment rating, shipment labeling, shipment tracking, shipment tracking management reports, returns analysis and returns management reporting In an exemplary embodiment, the Return System has three major components: 1.) A Returns Manager Subsystem that provides a user interface to each Merchant to setup the Merchant's account, setup the Merchant's return policy and rules, and to monitor the status and movement of return shipments; 2.) A Consumer Returns Subsystem (also sometimes referred to as a “Customer Returns Subsystem”) that provides each consumer using the Returns System with an online user interface that leads the consumer through the returns process, displays the return policies and rules to the consumer, provides shipping document to ship the return package if appropriate, and permits the consumer to track their return shipments; and 3.) a Returns Processing Subsystem that, in the exemplary embodiment, provides background shipping and tracking functionality. In one exemplary embodiment of the present invention, the Online Merchant integrates the Merchant's online system with the Returns Processing Subsystem. In another exemplary embodiment, the Returns Processing Subsystem is provided as an independent web-based application service (referred to as a “Return Merchant Service System”) operated by a common provider. In such an embodiment, the Merchant's system interacts with the Return Merchant Service System through Application Program Interfaces (“API”). | 05-27-2010 |
20110246384 | Apparatus, Systems and Methods For Online, Multi-Parcel, Multi-Carrier, Multi-Service Enterprise Parcel Shipping Management - The present invention provides a plurality of Enterprises with a single online user interface with which the Enterprise can provide Enterprise Shippers, shipping origination users and shipping intermediary users with an automated parcel management system for a plurality of supported Carriers for a plurality of services. The present invention provides for the hierarchical definition of users, including the establishment of at least one user for each Enterprise as a Super-Administrator with the highest level of privileges and authority for the Enterprise, and the identification of other users as Sub-Administrators, Desktop Users and Shipping Station Users. The present invention also provides for the hierarchical definition of organizational units within each Enterprise, including the definition of sites, groups within a site, and users within a group. The present invention further provides for a distinct definition of policies, privileges, and other types of specifications for each user level, each user, and each organizational unit. The present invention applies the user and organizational policies, privileges and other specifications as they apply to each particular user to drive the interactive interface with each particular user and to provide among other things, shipping options, shipping services, shipping rates, traveler and/or shipping label preparation, and shipment tracking. | 10-06-2011 |
20130179361 | Apparatus, Systems and Methods for Online, Multi-Parcel, Multi-Carrier, Multi-Service Enterprise Parcel Shipping Management - The present invention provides a plurality of Enterprises with a single online user interface with which the Enterprise can provide Enterprise Shippers, shipping origination users and shipping intermediary users with an automated parcel management system for a plurality of supported Carriers for a plurality of services. The present invention provides for the hierarchical definition of users, including the hierarchical definition of organizational units within each Enterprise. The present invention further provides for a distinct definition of policies, privileges, and other types of specifications for each user level, each user, and each organizational unit. The present invention applies the user and organizational policies, privileges and other specifications as they apply to each particular user to drive the interactive interface with each particular user and to provide among other things, shipping options, shipping services, shipping rates, traveler and/or shipping label preparation, and shipment tracking. | 07-11-2013 |
20140337246 | Apparatus, Systems and Methods for Online, Multi-Parcel, Multi-Carrier, Multi-Service Enterprise Parcel Shipping Management - The present invention provides a plurality of Enterprises with a single online user interface with which the Enterprise can provide Enterprise Shippers, shipping origination users and shipping intermediary users with an automated parcel management system for a plurality of supported Carriers for a plurality of services. The present invention provides for the hierarchical definition of users, including the hierarchical definition of organizational units within each Enterprise. The present invention further provides for a distinct definition of policies, privileges, and other types of specifications for each user level, each user, and each organizational unit. The present invention applies the user and organizational policies, privileges and other specifications as they apply to each particular user to drive the interactive interface with each particular user and to provide among other things, shipping options, shipping services, shipping rates, traveler and/or shipping label preparation, and shipment tracking. | 11-13-2014 |
Patent application number | Description | Published |
20090075634 | DATA BUDDY - Multi-modal, multi-lingual devices can be employed to consolidate numerous items including, but not limited to, keys, remote controls, image capture devices, audio recorders, cellular telephone functionalities, location/direction detectors, health monitors, calendars, gaming devices, smart home inputs, pens, optical pointing devices or the like. For example, a corner of a cellular telephone can be used as an electronic pen. Moreover, the device can be used to snap multiple pictures stitching them together to create a panoramic image. A device can automate ignition of an automobile, initiate appliances, etc. based upon relative distance. The device can provide for near to eye capabilities for enhanced image viewing. Multiple cameras/sensors can be provided on a single device to provide for stereoscopic capabilities. The device can also provide assistance to blind, privacy, etc. by consolidating services. | 03-19-2009 |
Patent application number | Description | Published |
20110035701 | FOCAL POINT ZOOM - Various embodiments provide a focal point zoom component that is configured to perform a focal point zoom operation. In at least some embodiments, the focal point zoom component receives a request to perform a zoom operation at a focal point of an element in a page displayed in a display area. The focal point zoom component then performs the zoom operation on the page so that a location of the focal point relative to the element and to the display area is retained. | 02-10-2011 |
20110035702 | TARGET ELEMENT ZOOM - Various embodiments provide a target element zoom component that is configured to perform a focal point zoom operation on a target element using an appropriate zoom factor. In at least some embodiments, the target element zoom component receives a request to perform a zoom operation at a focal point of a target element in a page displayed in a display area. In at least some embodiments, the request is received via two-finger tap input on a screen of a touch enabled device. The target element zoom component then determines an appropriate zoom factor for the zoom operation. Responsive to determining the appropriate zoom factor, the target element zoom component performs the zoom operation on the page using the appropriate zoom factor so that the target element remains within the display area with the focal point retained. | 02-10-2011 |
20120311489 | Target Element Zoom - Various embodiments provide a target element zoom component that is configured to perform a focal point zoom operation on a target element using an appropriate zoom factor. In at least some embodiments, the target element zoom component receives a request to perform a zoom operation at a focal point of a target element in a page displayed in a display area. In at least some embodiments, the request is received via two-finger tap input on a screen of a touch enabled device. The target element zoom component then determines an appropriate zoom factor for the zoom operation. Responsive to determining the appropriate zoom factor, the target element zoom component performs the zoom operation on the page using the appropriate zoom factor so that the target element remains within the display area with the focal point retained. | 12-06-2012 |
Patent application number | Description | Published |
20090094221 | QUERY SUGGESTIONS FOR NO RESULT WEB SEARCHES - Presenting one or more suggested search-engine queries based on an initial search-engine query is described herein. Once the initial query is received, a search engine determines whether any web content is relevant thereto. If not, a query-suggestion service determines whether any suggested queries can be substituted for the initial query. If not, the query is spell-corrected, if necessary, and parsed into individual terms. Each parsed term is then checked to see whether it can be associated with alternative search terms. Terms than can are combined and their combination is also checked for alternative search terms. All of the alternative search terms are scored and then assembled into a list of suggested search terms that is presented to the user. | 04-09-2009 |
20090182725 | DETERMINING ENTITY POPULARITY USING SEARCH QUERIES - Systems, methods, and computer-readable media for determining the Internet search popularity of an entity are provided. Embodiments of the present invention include receiving a group of Internet search records and assigning a popularity ranking based on the number of times an entity descriptor associated with an entity occurs within the group of Internet search records created over a designated time period. An entity descriptor is one or more terms commonly used to identify an entity. The trend in an entity's popularity rank may also be calculated. An entity's popularity rank and trend in popularity rank may be presented in a graph or in a list. | 07-16-2009 |
20100146012 | PREVIEWING SEARCH RESULTS FOR SUGGESTED REFINEMENT TERMS AND VERTICAL SEARCHES - An embodiment of the current invention is directed to presenting a preview of search results for a suggested search. A search engine query is received. One or more search results are generated. One or more suggested, search terms are generated. A search engine results page is generated, including the one or more search results and the one or more suggested, search terms. An indication is received, indicating that a preview of search results related to a selected, suggested, search term is to be displayed. A preview window including a results section and a menu-bar section is generated. One or more search results related to the selected, suggested, search term are acquired. The one or more search results are presented in the preview window. The preview window allows interaction with the one or more search results. | 06-10-2010 |
20100293178 | PROVIDING TOOLS FOR NAVIGATIONAL SEARCH QUERY RESULTS - Methods and computer-readable media are provided for displaying a target search result and relevant information on a search results page in response to a user-inputted query on a search page. The target search result and relevant information are identified in a database as having been previously determined to be most relevant to the query, and may be based on past user behavior, for example. The relevant information may include functional tools that include input boxes allowing for the user to interact with a webpage associated with the target search result via the search results page. Once the target search result and relevant information have been determined, the search results page is displayed. | 11-18-2010 |
20120260159 | HANDLING EXTERNAL CONTENT IN WEB APPLICATIONS - A media and method for detecting third-party content in web pages is provided. Computer software operates on a server or a client-side computer to identify and analyze third-party links and contents in web pages to determine if a third-party content sill exists, is available, has changed, or disrupts a web browser. A third-party link or content can be removed, changed, or replaced. A user can be notified or given an option to handle changed third-party content. The server may remove the third-party link or content by changing an HTML file for the web page. The client-side computer may remove the third-party link or content by dynamically changing the rendered web page before it is displayed to the user. | 10-11-2012 |
20130268482 | DETERMINING ENTITY POPULARITY USING SEARCH QUERIES - Systems, methods, and computer-readable media for determining the Internet search popularity of an entity are provided. Embodiments of the present invention include receiving a group of Internet search records and assigning a popularity ranking based on the number of times an entity descriptor associated with an entity occurs within the group of Internet search records created over a designated time period. An entity descriptor is one or more terms commonly used to identify an entity. The trend in an entity's popularity rank may also be calculated. An entity's popularity rank and trend in popularity rank may be presented in a graph or in a list. | 10-10-2013 |
Patent application number | Description | Published |
20110000854 | USE OF A DUAL POLYMER SYSTEM FOR ENHANCED WATER RECOVERY AND IMPROVED SEPARATION OF SUSPENDED SOLIDS AND OTHER SUBSTANCES FROM AN AQUEOUS MEDIA - A method uses anionic and cationic polymers added in, any order or simultaneously, to aqueous media for the removal of substances. The sequential addition of the two biopolymers, anionic xanthan, followed by cationic chitosan, causes the rapid formation of very large and cohesive fibrillar aggregates that may exhibit high solids to liquid ratios and that quickly settle out from the aqueous media. The aqueous media can be easily separated from the large fibrillar aggregates by settling under gravity or by filtration through a porous containment device, such as a synthetic or non-synthetic woven or non-woven fabric including a geotextile fabric or a solid containment device containing a solid mesh screen. | 01-06-2011 |
20110006013 | METHOD FOR THE REMOVAL OF SUBMICRON PARTICULATES FROM CHLORINATED WATER BY SEQUENTIALLY ADDING A CATIONIC POLYMER FOLLOWED BY ADDING AN ANIONIC POLYMER - A method for removing submicron colloidal particulates, such as hydrocarbons, from water. The method includes first adding a soluble, cationic polymer, such as chitosan, a salt, or solution of chitosan to water containing the submicron particulates and a halogenating agent, followed by adding a soluble, anionic polymer or anionic salt to the water. The resulting flocs are filtered to remove the submicron particulates. | 01-13-2011 |
20120217197 | END OF WATER PURIFICATION CARTRIDGE LIFE APPARATUS - End-of-life apparatus for use in water purification cartridges are disclosed. The apparatus includes a water-disintegrable tablet configured to disintegrate a predetermined amount after contacting a predetermined volume of water flow. The tablet prevents the stoppage of water until the tablet has been contacted by the predetermined amount of water. The various end-of-life apparatus use different means to stop the water flow when the tablet has disintegrated a predetermined amount. | 08-30-2012 |
20140117273 | USE OF A DUAL POLYMER SYSTEM FOR ENHANCED WATER RECOVERY AND IMPROVED SEPARATION OF SUSPENDED SOLIDS AND OTHER SUBSTANCES FROM AN AQUEOUS MEDIA - A method uses anionic and cationic polymers added in, any order or simultaneously, to aqueous media for the removal of substances. The sequential addition of the two biopolymers, anionic xanthan, followed by cationic chitosan, causes the rapid formation of very large and cohesive fibrillar aggregates that may exhibit high solids to liquid ratios and that quickly settle out from the aqueous media. The aqueous media can be easily separated from the large fibrillar aggregates by settling under gravity or by filtration through a porous containment device, such as a synthetic or non-synthetic woven or non-woven fabric including a geotextile fabric or a solid containment device containing a solid mesh screen. | 05-01-2014 |
20140124454 | WATER TREATMENT COMPOSITION AND METHOD OF USING SAME - A water treatment composition includes a water soluble film formed into a sealed pouch. The pouch contains a composite of a phosphate removing substance, a polymer flocculant, or an enzyme, or any combination. The phosphate removing substance, the polymer flocculant, and the enzyme are bound to each other within the composite. The pouch is added to a body of water. The pouch dissolves to release the compounds and treat the water. | 05-08-2014 |
20140158629 | USE OF A DUAL POLYMER SYSTEM FOR ENHANCED WATER RECOVERY AND IMPROVED SEPARATION OF SUSPENDED SOLIDS AND OTHER SUBSTANCES FROM AN AQUEOUS MEDIA - A method uses anionic and cationic polymers added in, any order or simultaneously, to aqueous media for the removal of substances. The sequential addition of the two biopolymers, anionic xanthan, followed by cationic chitosan, causes the rapid formation of very large and cohesive fibrillar aggregates that may exhibit high solids to liquid ratios and that quickly settle out from the aqueous media. The aqueous media can be easily separated from the large fibrillar aggregates by settling under gravity or by filtration through a porous containment device, such as a synthetic or non-synthetic woven or non-woven fabric including a geotextile fabric or a solid containment device containing a solid mesh screen. | 06-12-2014 |
20140319069 | METHOD FOR THE REMOVAL OF SUBMICRON PARTICULATES FROM CHLORINATED WATER BY SEQUENTIALLY ADDING A CATIONIC POLYMER FOLLOWED BY ADDING AN ANIONIC POLYMER - A method for removing submicron colloidal particulates, such as hydrocarbons, from water. The method includes first adding a soluble, cationic polymer, such as chitosan, a salt, or solution of chitosan to water containing the submicron particulates and a halogenating agent, followed by adding a soluble, anionic polymer or anionic salt to the water. The resulting flocs are filtered to remove the submicron particulates. | 10-30-2014 |
Patent application number | Description | Published |
20080209552 | IDENTIFYING POTENTIALLY OFFENDING CONTENT USING ASSOCIATIONS - Methods for identifying potentially harmful, malicious, or unwanted content based upon associations with known offenders are provided. Executable content associated with a domain is identified. The executable content URL and the domain are compared to URLs/domains known to be associated with malicious content. If the URL and/or the domain has been identified as associated with offending code, the remaining domain contents and any available associated information are examined to identify any referencing domains, referenced domains, linking domains, affiliated entities, etc. Each identified domain, affiliate, etc. is subsequently examined in a similar manner to identify any domain, entity, etc. having an association with malicious content. Each identified domain, entity, etc. is assigned a suspicion level based upon proximity to the source of the offending code. If desired, relationships among the domains, entities, and the like may be relationally mapped to render associations easier to identify. | 08-28-2008 |
20080209557 | SPYWARE DETECTION MECHANISM - A system and method that facilitates and effectuates detection of malware secreted and/or hidden in plain sight on a machine. The system and method in order to achieve its aims generates a list of all loaded modules, identifies from the list a set of modules common to more than a threshold number of processes, and eliminates from the list those modules included in an authentication list. The resultant list is prioritized based, in one instance, on the number of occurrences a particular module makes in the resultant list, and thereafter the list is distributed analyst workstations. | 08-28-2008 |
20100211658 | DYNAMIC FIREWALL CONFIGURATION - A method is disclosed that includes detecting a network entity and determining a type of the detected network entity. The method includes retrieving firewall configuration information based on at least the type of the network entity. Based on the firewall configuration information, a configuration of a firewall at a host is automatically and dynamically modified. | 08-19-2010 |
20110173699 | NETWORK INTRUSION DETECTION WITH DISTRIBUTED CORRELATION - A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be indicated and protective action may be taken. | 07-14-2011 |
20130305371 | NETWORK INTRUSION DETECTION WITH DISTRIBUTED CORRELATION - A network security system employing multiple levels of processing to identify security threats. Multiple host machines may each contain an agent that detects possibilities of security threats based on raw data sensed locally at that host. The hosts may share information obtained from local analysis and each host may use information generated at one or more other hosts, in combination with information generated locally, to identify a security concern, indicating with greater certainty that a security threat exists. Based on security concerns generated by multiple hosts, a security threat may be to indicated and protective action may be taken. | 11-14-2013 |
Patent application number | Description | Published |
20090216778 | ACCESSING DIFFERENT APPLICATION DATA VIA A COMMON DATA STRUCTURE - A common data type structure can be used to correlate access requests between applications that implement data in accordance with different types or type structures. In one implementation, a common data structure includes schemes for operations, sequences, records, and atoms (i.e., undefined). The system can then map any type structure to the schemes of the common data structure. In operation, a request for data by an application can involve identifying one or more proxies used by an application to map the data to the common data structure. The proxies map the data to the common data structure based on the shape of the data (to the extent it can be identified). The proxies then can return one or more data structures that comprise the identified mapping information. The application can then perform operations directly on the received data structures. | 08-27-2009 |
20090216782 | OBSERVING AND REPORTING CHANGES IN COMPLEX SOFTWARE DEPENDENCIES - An observation system includes mechanisms for efficiently tracking the state of source components, which include functions, arguments, or values, etc. In one implementation, an observing component requests that a source component processes a request. The observation system then identifies all possible components in a dependency chain for the request, and all such components that are configured for change notifications. A dependency registry stores a representation of each identified component that is configured for change notifications. Any time any component configured for change notifications changes, including indirectly related components, the observing component can be immediately notified of the change, without having to reprocess the entire set of component dependencies. | 08-27-2009 |
20090216791 | EFFICIENTLY CORRELATING NOMINALLY INCOMPATIBLE TYPES - A nominal type framework can be configured to efficiently correlate different nominal types together based on a minimum set of common type shapes or structures. In one implementation, a developer identifies a number of different nominal types of interest (source types), and identifies the minimum set of common type shapes to be accessed by an application program. The minimum set of common type shapes can then be used to create an intermediate type (target type) to which each of the other different source types can be mapped. For example, one or more proxies can be created that map shapes of the one or more source types to corresponding shapes of the created target type. The application program created by the developer, in turn, can access, operate on, or otherwise use the mapped data of each different source type through a single target type. | 08-27-2009 |
20090216793 | CONSISTENTLY SIGNALING STATE CHANGES - A signaling system of the present invention provides a synchronized approach to delivering, reporting, and/or otherwise processing status changes in a software dependency chain. In a first phase, the signaling system identifies all dependencies between software components, and further sets a binary indicator of each node in a first representation. After identifying any changes in a source node, the system (e.g., a value is updated), the system updates each binary indicator to a second setting. In a second phase, the system initiates all listeners in the dependency chain in an essentially progressive order from source node, to intermediate node, and end-node, etc. Once all listeners have had a chance to perform one or more processes based on the updated value, the system can discard the dependency graph, allowing a new dependency graph to be built for subsequent value changes. | 08-27-2009 |
20110131191 | OBSERVING AND REPORTING CHANGES IN COMPLEX SOFTWARE DEPENDENCIES - An observation system includes mechanisms for efficiently tracking the state of source components, which include functions, arguments, or values, etc. In one implementation, an observing component requests that a source component processes a request. The observation system then identifies all possible components in a dependency chain for the request, and all such components that are configured for change notifications. A dependency registry stores a representation of each identified component that is configured for change notifications. Any time any component configured for change notifications changes, including indirectly related components, the observing component can be immediately notified of the change, without having to reprocess the entire set of component dependencies. | 06-02-2011 |
20130066925 | ACCESSING DIFFERENT APPLICATION DATA VIA A COMMON DATA STRUCTURE - A common data type structure can be used to correlate access requests between applications that implement data in accordance with different types or type structures. In one implementation, a common data structure includes schemes for operations, sequences, records, and atoms (i.e., undefined). The system can then map any type structure to the schemes of the common data structure. In operation, a request for data by an application can involve identifying one or more proxies used by an application to map the data to the common data structure. The proxies map the data to the common data structure based on the shape of the data (to the extent it can be identified). The proxies then can return one or more data structures that comprise the identified mapping information. The application can then perform operations directly on the received data structures. | 03-14-2013 |
Patent application number | Description | Published |
20090193093 | REDUCING UNWANTED AND UNSOLICITED ELECTRONIC MESSAGES BY EXCHANGING ELECTRONIC MESSAGE TRANSMISSION POLICIES AND SOLVING AND VERIFYING SOLUTIONS TO COMPUTATIONAL PUZZLES - The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document. | 07-30-2009 |
20120259936 | DOCUMENT OBJECT MODEL API FOR MIME - The claimed subject matter provides systems and/or methods that facilitate interpreting Multipurpose Internet Mail Extensions (MIME) data. An interface can obtain MIME data. For instance, a stream of MIME data can be obtained, MIME data can be loaded from a static file, etc. Moreover, any disparate type of RFC 822 data can additionally or alternatively be received by the interface. Also, a MIME reader can analyze the MIME data (and/or normalized RFC 822 data) to interpret encoded structural information and generate at least one primitive based on the encoded structural information. Further, a hierarchical model can be built utilizing the at least one primitive. | 10-11-2012 |
20140052800 | DOCUMENT OBJECT MODEL API FOR MIME - The claimed subject matter provides systems and/or methods that facilitate interpreting Multipurpose Internet Mail Extensions (MIME) data. An interface can obtain MIME data. For instance, a stream of MIME data can be obtained, MIME data can be loaded from a static file, etc. Moreover, any disparate type of RFC 822 data can additionally or alternatively be received by the interface. Also, a MIME reader can analyze the MIME data (and/or normalized RFC 822 data) to interpret encoded structural information and generate at least one primitive based on the encoded structural information. Further, a hierarchical model can be built utilizing the at least one primitive. | 02-20-2014 |
Patent application number | Description | Published |
20100070875 | INTERACTIVE PROFILE PRESENTATION - Techniques, systems, and graphical user interfaces for presenting an interactive profile of a second entity to a first entity in an electronic communication (e.g., email, instant messaging, chat-room, etc.) application are disclosed herein. Data associated with a second entity is extracted from one or more non-dedicated sources external to the electronic communication. The extracted data is presented to a first entity as the interactive profile of the second entity in the electronic communication application. The interactive profile is also capable of acting as an electronic communication channel through which the first and second entities may communicate. | 03-18-2010 |
20110010182 | ELECTRONIC MESSAGE ORGANIZATION VIA SOCIAL GROUPS - A mechanism for automatically organizing electronic messages is described herein. Social groups of a particular user that may be representative of topics, people, projects, and the like can be automatically learned based at least in part upon historical correspondence of the user. Moreover, messages can be automatically prioritized based at least in part upon historical correspondence patterns. Electronic messages may be presented to the user in accordance with group information and how important the messages are to the user. | 01-13-2011 |
20110314044 | FLEXIBLE CONTENT ORGANIZATION AND RETRIEVAL - Among other things, one or more techniques and systems are disclosed for saving and retrieving browser-based content or portions thereof for browser-based interactions. Metadata is generated for a selection of a portion or an entire browser page, when a user selects content for the page. The selected content, comprising at least a portion of the browser page, is stored in a database in a remote data store, where the database is indexed by the associated metadata. The selection is presented in a multi-level representation in a user interface (UI) by using the associated metadata to organize the selection(s) in the UI. | 12-22-2011 |
20140325005 | ELECTRONIC MESSAGE ORGANIZATION VIA SOCIAL GROUPS - A mechanism for automatically organizing electronic messages is described herein. Social groups of a particular user that may be representative of topics, people, projects, and the like can be automatically learned based at least in part upon historical correspondence of the user. Moreover, messages can be automatically prioritized based at least in part upon historical correspondence patterns. Electronic messages may be presented to the user in accordance with group information and how important the messages are to the user. | 10-30-2014 |
Patent application number | Description | Published |
20090100109 | AUTOMATIC DETERMINATION OF ITEM REPLICATION AND ASSOCIATED REPLICATION PROCESSES - Architecture for replicating and sharing of data (e.g., different types) by analyzing the type and source of the data, analyzing the recipient entities (e.g., users, other devices or systems) that will receive the data, setting access to the data, and configuring rules and defaults for replication and security/access controls. For example, a user can share data with recipient entities such as another user or group of users or another system. The data can be uploaded to a server for access and sharing by the intended recipients or made accessible directly from the recipient computing system. Thus, the intended recipient can access the data directly without being required to register, for example. The architecture automatically and transparently makes the data accessible to the intended recipients based on a number of criteria. | 04-16-2009 |
20090112806 | QUERY VIEW INFERRED FROM DATASOURCE AND QUERY - The disclosed technique analyzes the source of the query and the query itself, to automatically determine the results view presented to the user. This view can be inferred or authored. Before the query is displayed, the query and the source can be analyzed, the results of which are then passed as view control information to the view control component. In addition, analysis can be performed on the type of items in the result set, number of items in the result set, and/or previously selected views of the user and/or from a community of users. For example, if the results are all images, the view is for images, and if the result set is very large, the results can be shown in a grouped view. The user can be provided the option to override the default view. | 04-30-2009 |
20090150347 | SEARCH CONTROL AND AUTHORING ENVIRONMENT - A technique for adding a search control by a user to a file, webpage, desktop, or mobile device, for example. The control lets the end user create documents, webpages, or dashboards with static and/or dynamic content as easily as inserting pictures. The technique also facilitates the imbedding of control access to the search information via this control. When a document is created, the control allows for adding a search into the document, authoring the default view of the query (e.g., thumbnail, details, extended view, slideshow, timeline, etc.), setting the scope (e.g., local computer, website, company human resources database, etc.), and “publishing” states (e.g., dynamically update, static-fixed, query run on local machine, etc). The technique also facilitates the adding of views such as via a user interface control for “adding a search” and standard “search list view control.” | 06-11-2009 |
20100251165 | INFORMATION-ENHANCED USER INTERFACE PRESENTATION - An approach is described for supplementing a scrolling region of an item user interface (UI) presentation with scrolling-region information. For example, the scrolling region can be enhanced by presented information regarding a flattened list of containers. The approach may also involve varying a representation of a collection of items displayed in an item presentation region of the item UI presentation based on at least one emphasis-related attribute associated with the collection of items. The various features of the item UI presentation facilitate a user's navigation through a large collection of items. | 09-30-2010 |
Patent application number | Description | Published |
20080259070 | ACTIVE LIQUID CRYSTAL DISPLAY DRIVERS AND DUTY CYCLE OPERATION - A liquid crystal display (LCD) driving system includes a reference voltage generator to generate a plurality of reference voltages. The LCD driving system also includes a plurality of drive buffers to generate drive voltages according to at least one of the reference voltages, and to drive at least a portion of a liquid crystal display to present data according to the drive voltages. | 10-23-2008 |
20080259702 | STATE-MONITORING MEMORY ELEMENT - Embodiments of the invention relate to a state-monitoring memory element. The state-monitoring memory element may have a reduced ability to retain a logic state than other regular memory elements on an IC. Thus, if the state-monitoring memory elements fails or loses state during testing, it may be a good indicator that the IC's state retention may be in jeopardy, possibly requiring the IC to be reset. The state-monitoring memory element may be implemented by degrading an input voltage supply to the state-monitoring memory element across a diode and/or a transistor. One or more current sources may be used to stress the state-monitoring memory element. A logic analyzer may be used to analyze the integrity of the state-monitoring memory element and trigger appropriate actions in the IC, e.g., reset, halt, remove power, interrupt, responsive to detecting a failure in the state-monitoring memory element. Multiple state-monitoring memory elements may be distributed in different locations on the IC for better coverage. | 10-23-2008 |
20080263328 | ORTHOGONAL REGISTER ACCESS - Embodiments of the invention relate to a method and system for accessing a set of parallel registers orthogonally. A decoder may be used to select a particular row or column of the set of parallel registers to perform register operations in a parallel fashion corresponding to the selected row or in an orthogonal fashion corresponding to the selected column. Thus, when a particular row is selected, a register operation may be carried out for each bit of the selected row to produce a parallel register output, such as by reading/writing each bit of the selected row to a parallel register. On the other hand, when a particular column is selected, a register operation may be carried out for each bit of the selected column, such as by reading/writing each bit of the selected column to an orthogonal register. The orthogonal register access allows for fast and efficient access to a particular bit in the set of parallel registers. | 10-23-2008 |
20110026519 | DYNAMICALLY RECONFIGURABLE ANALOG ROUTING CIRCUITS AND METHODS FOR SYSTEM ON A CHIP - An integrated circuit device may include a reconfigurable analog signal switching fabric comprising a plurality of global buses that are selectively connected to external pins by pin connection circuits in response to changeable analog routing data, and a plurality of local buses that are selectively connected to analog blocks and/or global buses by routing connection circuits in response to the analog routing data; and at least one processor circuit that executes predetermined operations in response to instruction data. | 02-03-2011 |
20120176854 | STATE-MONITORING MEMORY ELEMENT - Embodiments of the invention relate to a state-monitoring memory element. The state-monitoring memory element may be implemented by degrading an input voltage supply to the state-monitoring memory element across a diode and/or a transistor. One or more current sources may be used to stress the state-monitoring memory element. A logic analyzer may be used to analyze the integrity of the state-monitoring memory element and trigger appropriate actions in the IC, e.g., reset, halt, remove power, interrupt, responsive to detecting a failure in the state-monitoring memory element. Multiple state-monitoring memory elements may be disturbed in different locations on the IC for better coverage. | 07-12-2012 |
20140368960 | OVER-VOLTAGE TOLERANT CIRCUIT AND METHOD - Over-voltage tolerant circuits and methods are provided. In one embodiment, the circuit includes a pull-up transistor coupled to an I/O pad, a sensing circuit coupled to the I/O pad and to a voltage supply (Vcc), the sensing circuit configured to sense a voltage applied to the pad (Vpad), a latch coupled to the sensing circuit to retain an output of the sensing circuit, and a selection circuit coupled to the sensing circuit through the latch. The selection circuit includes a first bias circuit to apply Vcc to a well and gate of the pull-up transistor, a second bias circuit to apply Vpad to the gate and the well of the pull-up transistor, and a non-overlap circuit configured to ensure the gate and the well of the pull-up transistor is substantially always driven by either the first or the second bias circuit depending on the output of the sensing circuit. | 12-18-2014 |
Patent application number | Description | Published |
20080203977 | Boost buffer aid for reference buffer - A circuit for charging a capacitive load to a reference voltage in a capacitive sensor measurement circuit includes a reference buffer, a boost buffer, and drive logic. The reference buffer and the boost buffer are coupled with the capacitive load to be charged. The boost buffer first charges the capacitive load towards the reference voltage at a first rate of charging, and then ceases charging. The reference buffer subsequently continues charging at a slower second rate to settle the voltage across the capacitive load to within a tolerable range of the reference voltage. | 08-28-2008 |
20100283647 | PROGRAMMABLE DIGITAL-TO-ANALOG CONVERTER - A multi-mode digital-to-analog converter (DAC) configured to operate in a plurality of modes. | 11-11-2010 |
20130336081 | STATE-MONITORING MEMORY ELEMENT - Embodiments of the invention relate to a state-monitoring memory element. The state-monitoring memory element may have a reduced ability to retain a logic state than other regular memory elements on an IC. Thus, if the state-monitoring memory elements fails or loses state during testing, it may be a good indicator that the IC's state retention may be in jeopardy, possibly requiring the IC to be reset. The state-monitoring memory element may be implemented by degrading an input voltage supply to the state-monitoring memory element across a diode and/or a transistor. One or more current sources may be used to stress the state-monitoring memory element. A logic analyzer may be used to analyze the integrity of the state-monitoring memory element and trigger appropriate actions in the IC, e.g., reset, halt, remove power, interrupt, responsive to detecting a failure in the state-monitoring memory element. Multiple state-monitoring memory elements may be distributed in different locations on the IC for better coverage. | 12-19-2013 |