Patent application number | Description | Published |
20090144410 | MONITORING NETWORK TRAFFIC BY TRACKING DATA PACKETS ON A PER PROCESS BASIS - Methods, apparatus, systems, and articles of manufacture directed to the monitoring and visualizing of network traffic are disclosed. The network monitoring can include tracking data packets on a per process basis. As a data packet traverses a communications interface, it can be correlated with the process responsible for that data packet and a local process address can be logged providing a record of the packet and an associated source, destination, and process identifier. The visualizing can include generating a visual representation of network traffic and packet-process correlations. | 06-04-2009 |
20130036311 | INTELLIGENT SENSOR AND CONTROLLER FRAMEWORK FOR THE POWER GRID - Disclosed below are representative embodiments of methods, apparatus, and systems for monitoring and using data in an electric power grid. For example, one disclosed embodiment comprises a sensor for measuring an electrical characteristic of a power line, electrical generator, or electrical device; a network interface; a processor; and one or more computer-readable storage media storing computer-executable instructions. In this embodiment, the computer-executable instructions include instructions for implementing an authorization and authentication module for validating a software agent received at the network interface; instructions for implementing one or more agent execution environments for executing agent code that is included with the software agent and that causes data from the sensor to be collected; and instructions for implementing an agent packaging and instantiation module for storing the collected data in a data container of the software agent and for transmitting the software agent, along with the stored data, to a next destination. | 02-07-2013 |
20160006569 | INTELLIGENT SENSOR AND CONTROLLER FRAMEWORK FOR THE POWER GRID - Disclosed below are representative embodiments of methods, apparatus, and systems for monitoring and using data in an electric power grid. For example, one disclosed embodiment comprises a sensor for measuring an electrical characteristic of a power line, electrical generator, or electrical device; a network interface; a processor; and one or more computer-readable storage media storing computer-executable instructions. In this embodiment, the computer-executable instructions include instructions for implementing an authorization and authentication module for validating a software agent received at the network interface; instructions for implementing one or more agent execution environments for executing agent code that is included with the software agent and that causes data from the sensor to be collected; and instructions for implementing an agent packaging and instantiation module for storing the collected data in a data container of the software agent and for transmitting the software agent, along with the stored data, to a next destination. | 01-07-2016 |
Patent application number | Description | Published |
20100053110 | SIMULTANEOUS INPUT ACROSS MULTIPLE APPLICATIONS - One or more users may interact simultaneously with different applications on the same device through an input system such as a touch-sensitive display screen. Simultaneous user input may be detected by a multiple input system and subsequently transmitted to an application using a single transmission frame. An application corresponding to the user input is determined based on an input location of the user input and a location and size of a corresponding application. Simultaneous user inputs are rendered simultaneously by each corresponding application. Each application may further include a secondary event processing thread that runs in parallel to traditional operating system event threads. The secondary event processing thread bypasses sequential processing limits of an operating system event thread, providing substantially simultaneous processing of input. | 03-04-2010 |
20130097561 | SIMULTANEOUS INPUT ACROSS MULTIPLE APPLICATIONS - One or more users may interact simultaneously with different applications on the same device through an input system such as a touch-sensitive display screen. Simultaneous user input may be detected by a multiple input system and subsequently transmitted to an application using a single transmission frame. An application corresponding to the user input is determined based on an input location of the user input and a location and size of a corresponding application. Simultaneous user inputs are rendered simultaneously by each corresponding application. Each application may further include a secondary event processing thread that runs in parallel to traditional operating system event threads. The secondary event processing thread bypasses sequential processing limits of an operating system event thread, providing substantially simultaneous processing of input. | 04-18-2013 |
20160085419 | SIMULTANEOUS INPUT ACROSS MULTIPLE APPLICATIONS - Processing multiple inputs received across simultaneously displayed applications. In an embodiment, a computing device displays a first application on a first portion of a display device, and simultaneously displays a second application on a second, different, portion of the display device. The computing device receives a first user input in connection with the first portion of the display device, and, at substantially the same time, also receives a second user input in connection with the second portion of the display device. The computing device routes the first user input to the first application based on the first user input having been received in connection with first portion of the display device, and, at substantially the same time, also routes the second user input to the second application based on the second user input having been received in connection with the second portion of the display device. | 03-24-2016 |
Patent application number | Description | Published |
20130147904 | PROCESSING MEDIA STREAMS DURING A MULTI-USER VIDEO CONFERENCE - Embodiments generally relate to processing media streams during a multi-user video conference. In one embodiment, a method includes obtaining at least one frame from a media stream, and determining a plurality of coordinates within the at least one frame. The method also includes obtaining at least one media content item, obtaining one or more parameters from a remote user, and adding the at least one media content item to the at least one frame based on the plurality of coordinates and the one or more parameters. | 06-13-2013 |
20130147905 | PROCESSING MEDIA STREAMS DURING A MULTI-USER VIDEO CONFERENCE - Embodiments generally relate to processing media streams during a multi-user video conference. In one embodiment, a method includes obtaining at least one audio file and obtaining one or more parameters from a remote user. The method also includes adding user-specified audio content from the at least one audio file to a media stream based on the one or more parameters. | 06-13-2013 |
20130242031 | MODIFYING AN APPEARANCE OF A PARTICIPANT DURING A VIDEO CONFERENCE - Implementations generally relate to modifying an appearance of a participant during a video conference. In some implementations, a method includes obtaining at least one frame from a media stream, where the at least one frame includes a first face, and where the first face is an image of a face associated with a user. The method also includes determining a plurality of coordinates within the at least one frame. The method also includes obtaining at least one media content item. The method also includes adding the at least one media content item to the at least one frame based on the plurality of coordinates. | 09-19-2013 |
20130308856 | Background Detection As An Optimization For Gesture Recognition - Methods and systems are provided allowing for background identification and gesture recognition in video images. A computer-implemented image processing method includes: receiving, using at least one processing circuit, a plurality of image frames of a video; constructing, using at least one processing circuit, a plurality of statistical models of the plurality of image frames at a plurality of pixel granularity levels; constructing, using at least one processing circuit, a plurality of probabilistic models of an input image frame at a plurality of channel granularity levels based on the plurality of statistical models; merging at least some of the plurality of probabilistic models based on a weighted average to form a single probability image; determining background pixels, based on a probability threshold value, from the single probability image; and determining whether the plurality of image frames, when examined in a particular sequence, conveys a gesture by the object. | 11-21-2013 |
20140056515 | AUTOMATIC BACKGROUND IDENTIFICATION IN VIDEO IMAGES - Methods and systems are provided allowing for background identification in video images. A computer-implemented image processing method includes: receiving, using at least one processing circuit, a plurality of image frames of a video; constructing, using at least one processing circuit, a plurality of statistical models of the plurality of image frames at a plurality of pixel granularity levels; constructing, using at least one processing circuit, a plurality of probabilistic models of an input image frame at a plurality of channel granularity levels based on the plurality of statistical models; merging at least some of the plurality of probabilistic models based on a weighted average to form a single probability image; and determining background pixels, based on a probability threshold value, from the single probability image. | 02-27-2014 |
20140078246 | BANDWIDTH REDUCTION SYSTEM AND METHOD - A method and computing system for receiving an indication of a first user participating in a videoconference. A determination is made concerning whether bandwidth compression is preferable for the first user of the videoconference. If bandwidth compression is preferable for the first user of the videoconference: an unprocessed video stream associated with the first user is processed to generate a reduced bandwidth video stream, and the reduced bandwidth video stream is provided to a video encoder. Processing the unprocessed video stream includes performing an edge detection procedure on the unprocessed video stream. | 03-20-2014 |
20140328548 | ENHANCING CONTENT APPEARANCE - Implementations generally relate to enhancing content appearance. In some implementations, a method includes receiving an image, selecting a reference object in the image. The method also includes determining one or more image parameter adjustments based on the selected reference object, and applying the one or more image parameter adjustments to the entire image. | 11-06-2014 |
20150189233 | FACILITATING USER INTERACTION IN A VIDEO CONFERENCE - Embodiments generally relate to facilitating user interaction during a video conference. In one embodiment, a method includes detecting one or more faces of people in a video during a video conference. The method also includes recognizing the one or more faces. The method also includes labeling the one or more faces in the video. | 07-02-2015 |
Patent application number | Description | Published |
20080250129 | System and Method for Binding a Subscription-Based Computing System to an Internet Service Provider - A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer. | 10-09-2008 |
20080250237 | Operating System Independent Architecture for Subscription Computing - A system for managing a subscription-based computer independent of an operating system of the computer may include a security module that accesses, decrements, and stores subscription data during operation of the subscription-based computer. Additionally, the system may include a network module in communication with the security module and comprising a network stack, a web server, and a user interface in an operating system independent format. A web browser of the computer may request the user interface from the network stack. The interface may be populated with the subscription data, and a network driver may retrieve the populated user interface from the network module. The populated interface may then be sent to the web server to be served back to the requesting web browser. | 10-09-2008 |
20080250250 | Method and Apparatus for Using USB Flash Devices and Other Portable Storage as a Means to Access Prepaid Computing - A form of removable memory, such as a universal serial bus (USB) flash device (UFD), may allow secure storage of and access to a time balance of a pay-per-use or subscription computing system. A computing device may establish a secure connection to a portable secure computing device to access a stored time balance or other device-enabling, exhaustible data. During operation, the device may deplete the balance. Upon reaching a threshold depletion of the balance, the user may add more data to continue device use. The device may include a processor and a secure memory including identification and subscription data. Further, the device may store configuration data that may be used by the computer to bind the device to a particular subscription service or internet service provider. | 10-09-2008 |
20080250476 | Method and Apparatus to Enable a Securely Provisioned Computing Environment - A form of removable memory, such as a universal serial bus (USB) flash device, may enable a subscription-based computing system from any PC. The device may include an execution unit including a processor, a private memory including an encrypted application, a computing system interface, a cryptographic unit including a secure storage with a number of metering units, and a computer-readable medium. The computer-readable medium may include instructions for routing messages and data from the execution unit through the computing system interface to a connected computing system. Further, encrypted application data may be routed through the cryptographic unit to the execution unit to thereby transform the encrypted application into executable data for use by the computing system. Also, the device may decrement a number of metering units stored at the device during execution of the encrypted application by the computer. | 10-09-2008 |
20090254995 | CLIENT CONTROLLED LOCK FOR ELECTRONIC DEVICES - An electronic device can be locked and secured by activating a hardware locking mechanism on the device. The locking mechanism is controlled by a locking policy that is defined and implemented from the client side. If the locking mechanism is activated, then the device operates in a limited mode of operation instead of in a normal mode of operation. The locking mechanism can be deactivated, placing the device into the normal mode of operation, when a specified condition is satisfied. | 10-08-2009 |
20090287917 | SECURE SOFTWARE DISTRIBUTION - To protect against software piracy, a storage media has a cryptographically protected area that stores software to be installed onto a target device, such as a computer. The storage media may include a non-secure area holding boot files and an installation program. The installation program may gather target device-specific data for use by a certifying authority in generating a key that allows access to the secure area of the storage media only during the installation process. In this manner, a user never has access to the raw installation files, limiting the ability to copy and distribute those files for installation on non-authorized computers. The certifying authority may also prepare target device-specific data applied to the software before installation to create a custom software image that will only execute on the target device and that can be verified by the host OS prior to execution, allowing integrity confirmation. | 11-19-2009 |
20100185825 | TRANSIENT STORAGE DEVICE CONFIGURATION SILO - A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the presence of one or more other silos, as well as make changes to silo configurations on a per-silo basis for data and method sharing among silos across the ACTs on a storage device such as a transient storage device. The interfaces exposed by the device configuration silo are arranged to enable an authenticated provisioner, like administrator in a corporate network environment, to perform configuration changes to silos after the storage device is released into the field through a secure provisioning mechanism. In addition, users may make configuration changes to silos at runtime in some usage scenarios, for example to enable discrete portions of functionality on a storage device, by using a secure secondary authentication mechanism that is exposed by the device configuration silo. | 07-22-2010 |
20110271335 | SYSTEM AND METHOD FOR BINDING A SUBSCRIPTION-BASED COMPUTING SYSTEM TO AN INTERNET SERVICE - A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer. | 11-03-2011 |
20150193165 | TRANSIENT STORAGE DEVICE CONFIGURATION SILO - A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the presence of one or more other silos, as well as make changes to silo configurations on a per-silo basis for data and method sharing among silos across the ACTs on a storage device such as a transient storage device. The interfaces exposed by the device configuration silo are arranged to enable an authenticated provisioner, like administrator in a corporate network environment, to perform configuration changes to silos after the storage device is released into the field through a secure provisioning mechanism. In addition, users may make configuration changes to silos at runtime in some usage scenarios, for example to enable discrete portions of functionality on a storage device, by using a secure secondary authentication mechanism that is exposed by the device configuration silo. | 07-09-2015 |