Patent application number | Description | Published |
20140282887 | METHOD AND SYSTEM FOR USER AUTHENTICATION USING DNSSEC - This invention leverages DNSSEC to makes post-password technologies work against endpoints across the globe, rather than solely within company walls. It describes a system by which DS records are encoded in NS names, which traverse well from the customer to the registry. This invention also proposes a series of steps through which DNSSEC can be explored as a useful solution to real world problems. By creating and further developing a mirror of the real DNS, which grows by combination of true DNS record information with specially synthesized authentication keys, DNSSEC scales, providing greater security and less risk of corrupting or erroneous online material. This same technology also evaluates user activity to create a database of statistics regarding automated activity, as compared to human activity. This database assists in identification and prevention, or at least mitigation, of potential future attacks on any given client by automated bot-driven activity. | 09-18-2014 |
20150112892 | System and method for detecting classes of automated browser agents - A method for determining if a web browser is being operated by a human or a non-human agent, based on analysis of certain aspects of how a user interacts with a webpage. By placing a code snippet into the code of a webpage prior to a given user accessing that webpage, one is able to evaluate the user's actions in order to predict the type of user. The predictions are made by acquiring information on how the user loads, navigates, and interacts with the webpage and comparing that information with statistics taken from a control group. Performance metrics from all webpages containing similar code elements are compiled by analysis servers and made available to the operator of a webpage through a variety of reporting mediums. By compiling such performance metrics, the method helps combat and prevent malicious automated traffic directed at advertisements and other aspects of a given webpage. | 04-23-2015 |
20150156084 | SYSTEM AND METHOD FOR REPORTING ON AUTOMATED BROWSER AGENTS - A method for determining if a web browser is being operated by a human or a non-human agent, based on analysis of certain aspects of how a user interacts with a webpage. By using different ways of detection, one is able to evaluate the user's actions in order to predict the type of user. The predictions are made by acquiring information on how the user loads, navigates, and interacts with the webpage and comparing that information with statistics taken from a control group. Performance metrics from all webpages containing similar elements are compiled by analysis servers and made available to the operator of a webpage through a variety of reporting mediums. By compiling such performance metrics, the method helps combat and prevent malicious automated traffic directed at advertisements and other aspects of a given webpage. | 06-04-2015 |
20150156214 | DETECTION AND PREVENTION OF ONLINE USER INTERFACE MANIPULATION VIA REMOTE CONTROL - A method for determining if a web browser is being operated by a local human or a remote agent, based on analysis of certain aspects of how the different users interact with a webpage. By employing various detection mechanisms, one is able to evaluate the user's actions in order to predict the type of user. The predictions are made by acquiring information on how the user loads, navigates, and interacts with the webpage and comparing that information with statistics taken from a control group. Performance metrics from all webpages containing similar elements are compiled by analysis servers and made available to the operator of a webpage through a variety of reporting mediums. By compiling such performance metrics, the method helps combat and prevent malicious automated traffic directed at advertisements and other aspects of a given webpage. | 06-04-2015 |
20150256556 | METHOD AND SYSTEM FOR WEB INTEGRITY VALIDATOR - A computer-implemented method and system for the validation of a true browsing user on a website is disclosed. The invention allows for the collection of data regarding the evolving threat landscape created by online attackers. The system and method fingerprint user behavior to detect differences between a local user, a remote/foreign user, and an automated script. The system then covertly transmits that information back to a financial institution client without giving online attackers the opportunity to notice such transmittal. Certain embodiments of the invention also correspond with the browsing user to validate their identity. The claimed system and method proactively reveal attackers and attack ploys, additionally enabling institutions and security consultants to adapt to attacks in an automated fashion. | 09-10-2015 |
20160134639 | METHOD FOR USER AUTHENTICATION USING DNSSEC - This invention leverages DNSSEC to makes post-password technologies work against endpoints across the globe, rather than solely within company walls. It describes a system by which DS records are encoded in NS names, which traverse well from the customer to the registry. This invention also proposes a series of steps through which DNSSEC can be explored as a useful solution to real world problems. By creating and further developing a mirror of the real DNS, which grows by combination of true DNS record information with specially synthesized authentication keys, DNSSEC scales, providing greater security and less risk of corrupting or erroneous online material. This same technology also evaluates user activity to create a database of statistics regarding automated activity, as compared to human activity. This database assists in identification and prevention, or at least mitigation, of potential future attacks on any given client by automated bot-driven activity. | 05-12-2016 |
Patent application number | Description | Published |
20080212484 | Tracing connection paths through transparent proxies - In one embodiment, a method for tracing a connection path from a source node to a destination node through a network having one or more transparent proxies includes generating a trace packet at the source node, transmitting the trace packet over the network towards the destination node, and receiving trace response packets in response to transmission of the trace packet. The trace response packets include a packet from the destination node and a packet from each of the transparent proxies in a data path from the source node to the destination node. Each of the packets from the transparent proxies includes an identifier of the transparent proxy transmitting the packet. The method further includes identifying the transparent proxies in the connection path based on information in the trace response packets. An apparatus for tracing a connection path is also disclosed. | 09-04-2008 |
20090319600 | OPTIMIZING PROGRAM REQUESTS OVER A WIDE AREA NETWORK - In various embodiments, data processing apparatus, software, or machine-implemented methods can optimize NFSv3 asynchronous write requests or MSRPC calls that traverse a wide area network, for example, by receiving, from a client, a first request directed to a server across a wide area network; determining whether a related second request has been received previously; when a related second request has been received previously, sending, to the client, a first reply to the second request and forwarding the first request to the server, and otherwise forwarding the first request to the server without sending any reply to the client for the first request. Sending local replies from a WAN optimizer induces the client to send continuous requests, improving throughput, but at least one client request remains unreplied to, and one server error reply is always reported to the client, facilitating correct error processing at the client. | 12-24-2009 |
20100061253 | Tracing connection paths through transparent proxies - In one embodiment, a method for tracing a connection path from a source node to a destination node through a network having one or more transparent proxies includes generating a trace packet at the source node, transmitting the trace packet over the network towards the destination node, and receiving trace response packets in response to transmission of the trace packet. The trace response packets include a packet from the destination node and a packet from each of the transparent proxies in a data path from the source node to the destination node. Each of the packets from the transparent proxies includes an identifier of the transparent proxy transmitting the packet. The method further includes identifying the transparent proxies in the connection path based on information in the trace response packets. An apparatus for tracing a connection path is also disclosed. | 03-11-2010 |
Patent application number | Description | Published |
20110161851 | VISUALIZATION AND CONSOLIDATION OF VIRTUAL MACHINES IN A VIRTUALIZED DATA CENTER - A method for visualizing and simulating server consolidation of different virtual machines in a virtualized data center can include identifying different server computers in a virtualized data center, computing load metrics for each of the server computers, and rendering a graph of the computed load metrics for the server computers in a graphical user interface (GUI) in a host computer. The method further can include selecting a source one of the server computers and also a target one of the server computers and further selecting a virtual machine for prospective migration from the source one of the server computers to the target one of the server computers. Yet further, the method can include further computing prospective load metrics for the source and the target resulting from the prospective migration of the virtual machine to the target. Finally, the method can include displaying in the GUI respective graphs of the prospective load metrics for each of the source and the target. | 06-30-2011 |
20110162069 | SUSPICIOUS NODE DETECTION AND RECOVERY IN MAPREDUCE COMPUTING - Embodiments of the present invention address deficiencies of the art in respect to distributed computing for large data sets on clusters of computers and provide a novel and non-obvious method, system and computer program product for detecting and correcting malicious nodes in a cloud computing environment (e.g., MapReduce computing). In one embodiment of the invention, a computer-implemented method for detecting and correcting malicious nodes in a cloud computing environment can include selecting a task to dispatch to a first worker node, setting a suspicion index threshold for the selected task, determining a suspicion index for the selected task, comparing the suspicion index to the suspicion index threshold and receiving a result from a first worker node. The method further can include applying a recovery action when the suspicion index exceeds the selected suspicion index threshold. | 06-30-2011 |
20120005345 | OPTIMIZED RESOURCE MANAGEMENT FOR MAP/REDUCE COMPUTING - Embodiments of the present invention include a method for resource optimization of map/reduce computing in a computing cluster. The method can include receiving a computational problem for processing in a map/reduce module, subdividing the computational problem into a set of sub-problems and mapping a selection of the sub-problems in the set to respective nodes in a computing cluster, for example a cloud computing cluster, computing for a subset of the nodes in the computing cluster a required resource capacity of the subset of the nodes to process a mapped one of the sub-problems and an existing capacity of the subset of the nodes, and augmenting the existing capacity to an augmented capacity when the required resource capacity exceeds the existing capacity, and when a cost of augmenting the existing capacity to the augmented capacity does not exceed a penalty for breaching a service level agreement (SLA) for the subset of the nodes. | 01-05-2012 |
20120005682 | HOLISTIC TASK SCHEDULING FOR DISTRIBUTED COMPUTING - Embodiments of the present invention provide a method, system and computer program product for holistic task scheduling in a distributed computing environment. In an embodiment of the invention, a method for holistic task scheduling in a distributed computing environment is provided. The method includes selecting a first task for a first job and a second task for a different, second job, both jobs being scheduled for processing within a node a distributed computing environment by a task scheduler executing in memory by at least one processor of a computer. The method also can include comparing an estimated time to complete the first and second jobs. Finally, the first task can be scheduled for processing in the node when the estimated time to complete the second job exceeds the estimated time to complete the first job. Otherwise the second task can be scheduled for processing in the node when the estimated time to complete the first job exceeds the estimated time to complete the second job. | 01-05-2012 |
20120159236 | HOLISTIC TASK SCHEDULING FOR DISTRIBUTED COMPUTING - Embodiments of the invention include a method for fault tolerance management of workers nodes during map/reduce computing in a computing cluster. The method includes subdividing a computational problem into a set of sub-problems, mapping a selection of the sub-problems in the set to respective nodes in the cluster, directing processing of the sub-problems in the respective nodes, and collecting results from completion of processing of the sub-problems. During a first early temporal portion of processing the computational problem, failed nodes are detected and the sub-problems currently being processed by the failed nodes are re-processed. Conversely, during a second later temporal portion of processing the computational problem, sub-problems in nodes not yet completely processed are replicated into other nodes, processing of the replicated sub-problems directed, and the results from completion of processing of sub-problems collected. Finally, duplicate results are removed and remaining results reduced into a result set for the problem. | 06-21-2012 |
20120159627 | SUSPICIOUS NODE DETECTION AND RECOVERY IN MAPREDUCE COMPUTING - Embodiments of the present invention address deficiencies of the art in respect to distributed computing for large data sets on clusters of computers and provide a novel and non-obvious method, system and computer program product for detecting and correcting malicious nodes in a cloud computing environment (e.g., MapReduce computing). In one embodiment of the invention, a computer-implemented method for detecting and correcting malicious nodes in a cloud computing environment can include selecting a task to dispatch to a first worker node, setting a suspicion index threshold for the selected task, determining a suspicion index for the selected task, comparing the suspicion index to the suspicion index threshold and receiving a result from a first worker node. The method further can include applying a recovery action when the suspicion index exceeds the selected suspicion index threshold. | 06-21-2012 |
20120215920 | OPTIMIZED RESOURCE MANAGEMENT FOR MAP/REDUCE COMPUTING - The present invention includes a method for resource optimization of map/reduce computing in a computing cluster. The method can include receiving a computational problem for processing in a map/reduce module, subdividing the computational problem into a set of sub-problems and mapping a selection of the sub-problems in the set to respective nodes in a computing cluster, for example a cloud computing cluster, computing for a subset of the nodes in the computing cluster a required resource capacity of the subset of the nodes to process a mapped one of the sub-problems and an existing capacity of the subset of the nodes, and augmenting the existing capacity to an augmented capacity when the required resource capacity exceeds the existing capacity, and when a cost of augmenting the existing capacity to the augmented capacity does not exceed a penalty for breaching a service level agreement (SLA) for the subset of the nodes. | 08-23-2012 |
20120216203 | HOLISTIC TASK SCHEDULING FOR DISTRIBUTED COMPUTING - Embodiments of the present invention provide a method, system and computer program product for holistic task scheduling in a distributed computing environment. In an embodiment of the invention, a method for holistic task scheduling in a distributed computing environment is provided. The method includes selecting a first task for a first job and a second task for a different, second job, both jobs being scheduled for processing within a node a distributed computing environment by a task scheduler executing in memory by at least one processor of a computer. | 08-23-2012 |
Patent application number | Description | Published |
20080244611 | PRODUCT, METHOD AND SYSTEM FOR IMPROVED COMPUTER DATA PROCESSING CAPACITY PLANNING USING DEPENDENCY RELATIONSHIPS FROM A CONFIGURATION MANAGEMENT DATABASE - The invention discloses a computer data processing capacity planning system that utilizes known workload planning information along with hardware and/or software configuration information from the actual operating environment to accurately estimate the production system capacity available for use in carrying out one or more processing task(s). | 10-02-2008 |
20090048998 | PROBLEM DETERMINATION RULES PROCESSING - A context-sensitive pre-evaluation analysis of a set of rules is performed based on the circumstance or the current state of a rule clause directed to an infrequently changing condition. A group of multiple-clause rules are identified which each have a clause defining an infrequently changing condition for evaluating a state of a resource. The current state of the resource is monitored. If the identified group of multiple-clause rules, which cannot evaluate as TRUE under the context of the current state the resource, the identified group of multiple-clause rules are excluded from consideration by the rules engine. The rules engine will then encounter fewer rules to evaluate for a solution. The identified group of multiple-clause rules is further analyzed in the context of the infrequently changing condition for the current resource state. State metrics that are defined by clauses of the identified multiple-clause rules, those that cannot evaluate as TRUE, are identified. Those metrics are then also excluded from consideration by the rules engine. Thus, the rules engine will encounter fewer rules and/or event states that cannot be evaluated to a solution. The context-sensitive pre-evaluation analysis of the rules is performed out-of-band as the rules engine traverses the rule. | 02-19-2009 |
20090063672 | MONITORING OF COMPUTER NETWORK RESOURCES HAVING SERVICE LEVEL OBJECTIVES - In a typical computer network, at least some of the managed resources are monitored to determine whether those resources are meeting predetermined performance goals or service level objectives. To simplify the process of configuring a network monitor, information about the service level objectives is loaded into the resource itself. When the resource is detected, the service level objective information is extracted from the resource information and made available to a translating engine. The translating engine converts the extracted information to monitoring directions that are used to configure the network monitor. Embodiments in which new resources are detected either buying a registration process or a polling process are described. | 03-05-2009 |
20090100192 | AUTONOMIC SERVICE ROUTING USING OBSERVED RESOURCE REQUIREMENT FOR SELF-OPTIMIZATION - A service request routing system and method includes a model table configured to store resource models. A monitor is coupled to the model table and programmed both to model resource consumption in a service providing infrastructure, and also to store the modeled resource consumption in the model table. A router is coupled to the model table, and the router is programmed to route each service request to a corresponding service instance disposed in an associated service host having a service providing infrastructure. The associated service host includes a grid host in a grid computing system. | 04-16-2009 |
20090234686 | SYSTEM AND METHOD FOR PROVIDING ACCESS CONTROL IN A COLLABORATIVE ENVIRONMENT - A method, apparatus, and program product for providing access control in a collaborative environment are provided. A pool of approvable candidates for use in building an access control list for a project team are provided by matching attributes for potential candidates with requirements for the project, with the pool being larger than a projected size for the project team. In response to a vacant role on the project team, an invitation to join the project team is sent to an approvable candidate in the pool. At least one of the access control list or the pool is modified based upon an action by the approvable candidate. | 09-17-2009 |
20090313093 | OPTIMIZING GREENNESS - A greenness metric is obtained for a plurality of services. The greenness metric of each of the plurality of services are compared. One or more services are determined from the plurality of services based at least in part upon the greenness metric for each of the plurality of services. | 12-17-2009 |
20090326732 | PROTECTING SECRET DATA ENTRY FROM INFRARED AND AUDIO EAVESDROPPING - A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping. The system includes a data entry device and means for masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. | 12-31-2009 |
20110191466 | AUTONOMIC SERVICE ROUTING USING OBSERVED RESOURCE REQUIREMENT FOR SELF-OPTIMIZATION - A service request routing system and method includes a model table configured to store resource models. A monitor is coupled to the model table and programmed both to model resource consumption in a service providing infrastructure, and also to store the modeled resource consumption in the model table. A router is coupled to the model table, and the router is programmed to route each service request to a corresponding service instance disposed in an associated service host having a service providing infrastructure. The associated service host includes a grid host in a grid computing system. | 08-04-2011 |
20110249828 | PROTECTING SECRET DATA ENTRY FROM INFRARED AND AUDIO EAVESDROPPING - A method for protecting a data entry device from eavesdropping includes masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. The signature may include a temperature differential in the data entry device from data entry by the user and the masking may include controlling the external temperature of the data entry device to reduce temperature differentials left in the data entry device by the user. Alternatively, the signature may include sound waves emitted from the data entry device and the masking may include masking sound waves emitted from the data entry device to reduce the detectability of the sound waves. A system may also be employed for protecting data entry to a data entry device from eavesdropping. The system includes a data entry device and means for masking a signature of entry resulting from entry of data by a user of the data entry device so as to reduce the detectability of the signature by eavesdropping. | 10-13-2011 |
20130014152 | SEARCHABLE TELEVISION COMMERCIALS - A mechanism is provided for indexing commercials. A viewer may query a search engine for a particular product or service. The index may include descriptors that are provided within a blanking interval within the media stream or within program guide information associated with the stream. The index information may also include Internet hyperlinks. Commercials may also have associated therewith a value that is relative to a value of media content. A viewer may accumulate value by viewing advertisements. Accumulated value may then be used to acquire more content. | 01-10-2013 |
20130212586 | SHARED RESOURCES IN A DOCKED MOBILE ENVIRONMENT - A first and second data handling systems provides for shared resources in a docked mobile environment. The first data handling system maintains a set of execution tasks within the first data handling system having a system dock interface to physically couple to the second data handling system. The first data handling system assigns a task to be executed by the second data handling system while the two systems are physically coupled. | 08-15-2013 |
20130212587 | SHARED RESOURCES IN A DOCKED MOBILE ENVIRONMENT - Sharing resources in a docked mobile environment comprises maintaining a set of execution tasks within a first data handling system having a system dock interface to physically couple to a second data handling system and assigning a task to be executed by the second data handling system while the two systems are physically coupled. The described method further comprises detecting a physical decoupling of the first and second data handling systems and displaying an execution result of the task via a first display element of the first data handling system in response to such a detection. | 08-15-2013 |
Patent application number | Description | Published |
20120065838 | SPEED CONSTRAINT CONTROL PROCEDURE - A method includes receiving speed constraints associated with two independent vehicle components and receiving speed constraints associated with a first dependent vehicle component and a second dependent vehicle component. The method further includes defining a relationship between the received speed constraints of the independent vehicle components and the first and second dependent vehicle components. Moreover, speed values of an unknown speed constraint associated with a third dependent component are derived based on the defined relationship between the received speed constraints of the independent vehicle components and the first and second dependent vehicle components. | 03-15-2012 |
20120065855 | SYSTEM AND METHOD OF DETECTING A FAILED FRICTION ELEMENT - A system includes a friction element having a driving mechanism and a driven mechanism. At least one of the driving mechanism and the driven mechanism is configured to rotate. A drive unit is configured to provide a torque to at least one of the driving mechanism and the driven mechanism. A control processor is configured to diagnose a friction element failure based on a slip speed, which is the difference between rotational speeds of the driving mechanism and the driven mechanism. The control processor is further configured to induce a slip condition as part of a shift process and diagnose the friction element failure if the derived slip speed is substantially zero after inducing the slip condition. | 03-15-2012 |
20120209461 | CLUTCH FILL COMMAND BASED ON CLUTCH SLIP SPEED PROFILE SYNCHRONIZATION PREDICTION - A vehicle includes an engine, a first motor, and a second motor, each configured to generate a torque. A gearbox is configured to receive the generated torque. An oncoming clutch is configured to engage during a transition from a present operating mode to a target operating mode. A controller is configured to identify a speed profile associated with a transition to the target operating mode. The speed profile defines a calibrated profile time that represents an amount of time to synchronize the oncoming clutch during the transition from the present operating mode to the target operating mode. The controller is configured to adjust the calibrated profile time in real time to define an adjusted profile time and control the engagement of the oncoming clutch during the transition from the present operating mode to the target operating mode based at least in part on the adjusted profile time. | 08-16-2012 |
20120265383 | OFF-GOING CLUTCH CONTROL - A vehicle includes an engine, a motor, and a gearbox. A clutch is configured to engage to transfer a reactive torque to at least one of the engine, the motor, and the gearbox. The clutch is configured to disengage during a transition from a present operating mode to a target operating mode. A controller is configured to determine an expected slip direction of the clutch, define a non-zero value based at least in part on the expected slip direction, and command the reactive torque to the non-zero value to control the clutch to induce slip during the transition from the present operating mode to the target operating mode. | 10-18-2012 |
20120303191 | Method of Prioritizing Output Torque And Off-Going Clutch Torque Constraints During A Torque Phase - A system for a vehicle includes a constraint module that generates a plurality of constraints. An output torque module generates a commanded output torque based on a torque request and the plurality of constraints. A split torque module determines a first torque and a second torque to be applied to a transmission of the vehicle based on the plurality of constraints and the commanded output torque. A first one of the plurality of constraints corresponding to a first clutch is adjusted from a first range of values to a second range of values that is different from the first range of values in response to a command to offload the first clutch. | 11-29-2012 |
20120322600 | METHOD AND APPARATUS FOR EXECUTING A SHIFT IN A POWERTRAIN SYSTEM - A method to shift a powertrain system from a first operating mode to a second operating mode wherein a common clutch is activated to effect operation in both the first and second operating modes includes, in sequence, deactivating the common clutch, activating an oncoming clutch associated with the second operating mode and deactivating an off-going clutch associated with the first operating mode, and activating the common clutch. | 12-20-2012 |
20120322610 | METHOD AND APPARATUS FOR EXECUTING A SHIFT IN A POWERTRAIN SYSTEM - A method for activating an oncoming clutch in a transmission includes monitoring rotational speeds of clutch elements of the oncoming clutch wherein the clutch elements are coupled to first and second rotationally independent torque actuators. A control speed profile for the first rotationally independent torque actuator is commanded. A speed profile of the oncoming clutch approaching zero speed is generated as is a control speed profile for the second rotationally independent torque actuator corresponding to a speed of the first rotationally independent torque actuator, the speed profile of the oncoming clutch, and an output speed of the transmission. A speed of the second rotationally independent torque actuator is controlled using the control speed profile for the second rotationally independent torque actuator. A speed of the oncoming clutch is monitored and the oncoming clutch is activated when the speed of the oncoming clutch is zero. | 12-20-2012 |
20120322611 | METHOD AND APPARATUS FOR SIMULTANEOUS PARALLEL CONTROL OF A TORQUE PHASE AND AN INERTIA PHASE FOR HYBRID POWERTRAINS - A method to execute a shift in a powertrain including a plurality of torque generative devices rotatably connected through a first clutch includes operating the powertrain in a continuously variable operating range state, and monitoring a command to execute the shift including monitoring a target speed for a first torque generative device, and monitoring a command to disengage the first clutch. The first clutch is shifted from an engaged state to a disengaged state, including operating a torque phase of the first clutch wherein the first clutch is transitioned from the engaged state to the disengaged state, and simultaneous with the torque phase, operating an inertia speed phase of the first clutch wherein a speed of the first torque generative device is transitioned from an initial speed to the target speed. | 12-20-2012 |
20120323418 | METHOD AND APPARATUS FOR CONTROLLING AN ENGINE DISCONNECT CLUTCH IN A POWERTRAIN SYSTEM - A powertrain system includes an internal combustion engine configured to transfer torque via a clutch to an input member of a hybrid transmission having torque machines configured to transfer torque thereto. Operation of the engine is controlled to facilitate a change in activation of a clutch between the engine and the input member of the hybrid transmission. | 12-20-2012 |
20130053212 | CONTROL SYSTEM FOR A HYBRID POWERTRAIN SYSTEM - A vehicle includes a powertrain with an engine, first and second torque machines, and a hybrid transmission. A method for operating the vehicle includes operating the engine in an unfueled state, releasing an off-going clutch which when engaged effects operation of the hybrid transmission in a first continuously variable mode, and applying a friction braking torque to a wheel of the vehicle to compensate for an increase in an output torque of the hybrid transmission resulting from releasing the off-going clutch. Subsequent to releasing the off-going clutch, an oncoming clutch which when engaged effects operation of the hybrid transmission in a second continuously variable mode is synchronized. Subsequent to synchronization of the oncoming clutch, the oncoming clutch is engaged. | 02-28-2013 |
20130225361 | METHOD AND APPARATUS FOR EXECUTING A SHIFT IN A HYBRID TRANSMISSION - A method for executing a transmission shift in a hybrid transmission including first and second electric machines includes executing a shift-through-neutral sequence from an initial transmission state to a target transmission state including executing an intermediate shift to neutral. Upon detecting a change in an output torque request while executing the shift-through-neutral sequence, possible recovery shift paths are identified. Available ones of the possible recovery shift paths are identified and a shift cost for each said available recovery shift path is evaluated. The available recovery shift path having a minimum shift cost is selected as a preferred recovery shift path and is executed to achieve a non-neutral transmission state. | 08-29-2013 |
20130296135 | METHOD AND APPARATUS FOR EXECUTING A SHIFT PATH TO A TARGET POWERSTRAIN STATE - A method for controlling a transmission of a powertrain system includes executing a single source shortest path search to identify a preferred shift path originating with an initial powertrain state and terminating at a target powertrain state, wherein the single source shortest path search employs transition-specific costs and situational costs to identify the preferred shift path. The preferred shift path is executed to achieve the target powertrain state. | 11-07-2013 |
20140045654 | CONTROL OF CLUTCH FILL COMMAND BASED ON HYDRAULIC STATE OF ONCOMING CLUTCH - A system and method of controlling a clutch fill command based on the hydraulic state of an oncoming clutch is provided. A vehicle includes a hydraulically-actuated oncoming clutch that is configured to engage during a shift event from one operating mode of the vehicle to another. A controller is configured to generate a clutch fill command at an initial time such that completion of the clutch fill command is synchronized with an identified speed profile of the oncoming clutch. The oncoming clutch defines a real-time hydraulic state when the clutch fill command is generated. The controller is configured to generate a real-time acceptable speed margin for the oncoming clutch based at least partially on the real-time hydraulic state of the oncoming clutch. The controller is configured to cancel the clutch fill command if a real-time speed of the oncoming clutch is outside the generated real-time acceptable speed margin. | 02-13-2014 |
20140046517 | METHOD AND APPARATUS FOR CONTROLLING A MULTI-MODE POWERTRAIN SYSTEM - A powertrain system includes a multi-mode transmission configured to transfer torque among an engine, torque machines, and a driveline. A method for controlling the powertrain includes executing a dual closed-loop control scheme that includes determining an engine-based output torque range employed in a first feedback loop and simultaneously determining a control acceleration-based output torque range employed in a second feedback loop. Engine commands are controlled responsive to the engine-based output torque range and simultaneously a control acceleration is controlled responsive to the control acceleration-based output torque range to achieve an output torque of the powertrain system responsive to an output torque request. | 02-13-2014 |
20140081491 | ACCELERATION PROFILE-BASED CONTROL OF AN OFFGOING CLUTCH OPERATION - A vehicle includes a torque generating device, a transmission, and a controller. The transmission has one or more clutches. The controller executes a method, which includes measuring an amount of slip across an identified offgoing clutches and determining whether the offgoing clutches have slipped prior to a modeled clutch torque capacity reaching zero. A status is assigned indicating that the offgoing clutches are released if the offgoing clutch has slipped prior to the modeled clutch capacity reaching zero. The controller induces slip across the identified offgoing clutches to a calibrated low, non-zero level after recording the value, including by enforcing the low, non-zero slip value using one or more acceleration profiles. | 03-20-2014 |
20140136033 | CONTROLS AND DIAGNOSTICS FOR MECHANICAL FRICTION ELEMENTS - A powertrain system includes an internal combustion engine, at least one electric machine and an electro-mechanical transmission operative to transmit torque to a drive line. A method for controlling the powertrain system includes executing an engagement strategy of a one-way clutch device only having capacity in a first direction. The engagement strategy includes modeling a capacity of the one-way clutch device in accordance with a loading step change profile until a first capacity limit of the one-way clutch device is achieved. A continuous reactive load is applied to the one-way clutch device in the first direction to maintain engagement and inhibit lash of the one-way clutch device. | 05-15-2014 |
20140136063 | ENERGY BASED TRANSMISSION FRICTION ELEMENT DIAGNOSTIC - A method to monitor a torque transfer device configured to transfer torque within an electro-mechanical transmission mechanically-operatively coupled to an internal combustion engine and at least one electric machine includes executing a failure detection strategy in response to a detected slip condition of the torque transfer device. The failure detection strategy includes monitoring a magnitude of energy loss of the torque transfer device. A failure condition in the torque transfer device is detected when the magnitude of energy loss achieves a predetermined energy threshold. | 05-15-2014 |
20140141915 | METHOD FOR PROVIDING A CONTROLLED NEUTRAL IN LIEU OF A CONVENTIONAL NEUTRAL IN AN ELECTRO-MECHANICAL TRANSMISSION - A powertrain system includes an internal combustion engine, a first electric machine and an electro-mechanical transmission operative to transmit torque to a driveline. A method for controlling the powertrain system in the presence of a controlled neutral operation of the electro-mechanical transmission being selected includes monitoring vehicle speed, and only when the monitored vehicle speed is indicative of a low-speed zone restricting a transition from a current engine operating state. | 05-22-2014 |
20140244119 | METHOD AND APPARATUS FOR MANAGING SPEEDS IN A MULTI-MODE TRANSMISSION - A multi-mode powertrain system includes a transmission configured to transfer torque among an internal combustion engine, torque machines and an output member. A method for controlling the powertrain system includes determining a desired acceleration profile for the internal combustion engine, determining a constrained acceleration profile by imposing prioritized constraints on the desired acceleration profile, integrating the constrained acceleration profile to determine a preferred speed profile, determining a preferred acceleration profile including a derivative of the preferred speed profile constrained by minimum and maximum hard acceleration constraints, and controlling operation of the internal combustion engine in response to the preferred acceleration profile and the preferred speed profile. | 08-28-2014 |
20150032342 | ASYNCHRONOUS-TO-SYNCHRONOUS CLUTCH TORQUE EXCHANGE IN A HYBRID ELECTRIC VEHICLE - A vehicle includes torque sources, a transmission, and a controller programmed to execute a method. In executing the associated method, the controller determines whether continuous output torque is required through a torque exchange. When continuous output torque is required, the controller synchronizes and fills the oncoming clutch, estimates capacity of the oncoming clutch, and expands a short-term torque capacity of the oncoming clutch during the torque exchange, doing so in response to a control objective having a threshold priority. Onset of the torque exchange delays until the short-term torque capacity is sufficient for receiving all torque load from the offgoing clutch without affecting output torque. The controller asynchronously controls the offgoing clutch and synchronously controls the oncoming clutch through the torque exchange, and loads the synchronous oncoming clutch via an expanding set of long-control torque capacity limits as a function of a simultaneously exhausting of the offgoing clutch load. | 01-29-2015 |
20150337950 | HYDRAULIC SYSTEM CHARGE DETECTION - A vehicle includes a transmission, an electrically-driven fluid pump which supplies pressure to a hydraulically-actuated clutch of the transmission, and pump motor sensors positioned with respect to a pump motor of the fluid pump. The sensors are configured to measure electrical properties of the pump motor, and to output the measured electrical properties as input signals. A controller detects when the hydraulic circuit is fully charged by determining an actual speed of the pump motor. The controller calculates an average pump torque and a slope of the average pump torque for the pump motor using the input signals. A flag is set via the controller indicating that a calibrated line pressure has been attained in the hydraulic circuit when the slope of the average pump torque reaches zero and the speed of the pump motor reaches a calibrated speed. | 11-26-2015 |
Patent application number | Description | Published |
20080208734 | Automated Trading Exchange System Having Integrated Quote Risk Monitoring And Integrated Quote Modification Services - An automated trading exchange having integrated quote risk monitoring and quote modification services. An apparatus is implemented using at least one computer, having memory, and a processor. The computer is configured to receive orders and quotes, wherein specified ones of the quotes are contained in a quote group, and have associated trading parameters such as a risk threshold. Not all received quotes are required to have trading parameters as described herein. Preferably, the quote group contains all the quotes, or a subset of quotes, belonging to an individual market-maker for a given class of options contracts, or possibly the quotes of two or more market-makers that have identified themselves as belonging to a group for the purposes of risk monitoring and quote modification. The computer typically generates a trade by matching the received orders and quotes to previously received orders and quotes, and otherwise stores each of the received orders and quotes if a trade is not generated. The computer then determines whether a quote within the quote group has been filled as a result of the generated trade, and if so, determines a risk level and an aggregate risk level associated with said trade. The computer then compares the aggregate risk level with the market-maker's risk threshold, and if the threshold is exceeded, automatically modifies at least one of the remaining quotes in the quote group. The computer may also automatically regenerate quotes that have been filled. | 08-28-2008 |
20120095898 | AUTOMATED TRADING EXCHANGE SYSTEM HAVING INTEGRATED QUOTE RISK MONITORING AND INTEGRATED QUOTE MODIFICATION SERVICES - An automated trading exchange having integrated quote risk monitoring and quote modification services. An apparatus is implemented using at least one computer, having memory, and a processor. The computer is configured to receive orders and quotes, wherein specified ones of the quotes are contained in a quote group, and have associated trading parameters such as a risk threshold. Not all received quotes are required to have trading parameters as described herein. Preferably, the quote group contains all the quotes, or a subset of quotes, belonging to an individual market-maker for a given class of options contracts, or possibly the quotes of two or more market-makers that have identified themselves as belonging to a group for the purposes of risk monitoring and quote modification. The computer typically generates a trade by matching the received orders and quotes to previously received orders and quotes, and otherwise stores each of the received orders and quotes if a trade is not generated. The computer then determines whether a quote within the quote group has been filled as a result of the generated trade, and if so, determines a risk level and an aggregate risk level associated with said trade. The computer then compares the aggregate risk level with the market-maker's risk threshold, and if the threshold is exceeded, automatically modifies at least one of the remaining quotes in the quote group. The computer may also automatically regenerate quotes that have been filled. | 04-19-2012 |
20130151389 | AUTOMATED TRADING EXCHANGE SYSTEM HAVING INTEGRATED QUOTE RISK MONITORING AND INTEGRATED QUOTE MODIFICATION SERVICES - An automated trading exchange having integrated quote risk monitoring and quote modification services. An apparatus is implemented using at least one computer configured to receive orders and quotes, wherein specified ones of the quotes are contained in a quote group, and have associated trading parameters such as a risk threshold. The computer generates a trade by matching received orders and quotes to previously received orders and quotes, and then determines whether a quote within the quote group has been filled as a result of the generated trade, and if so, determines a risk level and an aggregate risk level associated with said trade. The computer then compares the aggregate risk level with the market-maker's risk threshold, and if the threshold is exceeded, automatically modifies at least one of the remaining quotes in the quote group. The computer may also automatically regenerate quotes that have been filled. | 06-13-2013 |
20160048915 | AUTOMATED TRADING EXCHANGE SYSTEM HAVING INTEGRATED QUOTE RISK MONITORING AND INTEGRATED QUOTE MODIFICATION SERVICES - An automated trading exchange having integrated quote risk monitoring and quote modification services. An apparatus is implemented using at least one computer, having memory, and a processor. The computer is configured to receive orders and quotes, wherein specified ones of the quotes are contained in a quote group, and have associated trading parameters such as a risk threshold. Not all received quotes are required to have trading parameters as described herein. Preferably, the quote group contains all the quotes, or a subset of quotes, belonging to an individual market-maker for a given class of options contracts, or possibly the quotes of two or more market-makers that have identified themselves as belonging to a group for the purposes of risk monitoring and quote modification. The computer typically generates a trade by matching the received orders and quotes to previously received orders and quotes, and otherwise stores each of the received orders and quotes if a trade is not generated. The computer then determines whether a quote within the quote group has been filled as a result of the generated trade, and if so, determines a risk level and an aggregate risk level associated with said trade. The computer then compares the aggregate risk level with the market-maker's risk threshold, and if the threshold is exceeded, automatically modifies at least one of the remaining quotes in the quote group. The computer may also automatically regenerate quotes that have been filled. | 02-18-2016 |