Patent application number | Description | Published |
20110068911 | System for Providing and Displaying Video Information Using A Plurality of Video Sources - In one aspect, a system for providing and displaying video information in a vehicle is provided. The system includes a display device having a video input, a first camera mountable at the rear of the vehicle, the first camera having a first video output, a second camera mountable at the passenger side of the vehicle, the second camera having a second video output, wherein the first video output and the second video output are connected in parallel to the video input of the display device, and a camera control device configured to keep no more than one camera activated at a time. | 03-24-2011 |
20110224864 | VEHICLE NAVIGATION SYSTEM AND METHOD - Methods and systems are provided for a vehicle. A determination is made as to whether the vehicle requires a service. A determination is also made as to whether the vehicle is proximate a location at which the service can be performed. A notification is provided that the vehicle requires the service and is proximate the location. | 09-15-2011 |
20120062743 | ALERT SYSTEM FOR VEHICLE - An alert system for a vehicle includes a video display, an interior visual alert device disposed at an interior rearview mirror assembly, a driver side visual alert device disposed at a driver side exterior rearview mirror assembly and a passenger side visual alert device disposed at a passenger side exterior rearview mirror assembly. A control is operable to activate at least one of the alert devices in response to a detection of an object rearward of the vehicle. The alert devices are viewable by the driver of the vehicle when activated and are operable to guide or prompt the driver to check the images captured by a rearward facing camera and displayed in the vehicle cabin by the video display so that the driver can verify the nature and type of a potential hazard rearward of the vehicle. | 03-15-2012 |
20160042238 | DRIVER ACTIVE SAFETY CONTROL SYSTEM FOR VEHICLE - A driver active safety control system for a vehicle includes a plurality of image capture sensors, a video display screen, a central driver active safety control module and at least one non-imaging sensor. The control module at least includes an image processor, a vision core and a fusion core. The image processor processes image data captured by and received from at least a forward viewing image capture sensor for at least one of (i) automatic headlamp control, (ii) lane departure warning and (iii) traffic sign recognition. The vision core is operable to manipulate image data captured by and received at least from rearward and sideward viewing image capture sensors to form video images for displaying on the video display screen. The fusion core is operable to process inputs received to enhance control by the control module of a driver assistance system of the equipped vehicle. | 02-11-2016 |
Patent application number | Description | Published |
20090254260 | FULL SPEED RANGE ADAPTIVE CRUISE CONTROL SYSTEM - In one aspect, the invention is directed to an adaptive cruise control system for a host vehicle, comprising a long-range sensor configured to determine a location of objects positioned ahead of the host vehicle, at least one short-range sensor configured to determine the location of objects in close proximity ahead of the host vehicle, and a controller configured to receive information from the long-range sensor and from the at least one short-range sensor and to control the speed of the host vehicle based at least in part thereon, wherein the controller is configured to operate the at least one short-range sensor in a plurality of operating modes, and to select a short-range sensor operating mode at least in part in response to the location of any objects detected by the long-range sensor. | 10-08-2009 |
20100118145 | Camera for Vehicle - In a first embodiment, the invention is directed to a camera for mounting on a vehicle, including a lens member, an imaging element and an image processing board. The image processing board is separated sufficiently from the imaging element so as to impart relatively little heat generated during operation to the imaging element. The imaging element is positioned to receive video input from the lens member. The image processing board is configured to generate image processing board output data that relates to the video input received by the imaging element. The image processing board is positioned in a selected position to release heat along a heat path that is spaced from the imaging element. The camera may further include a vehicle interface board configured to communicate signals relating to the image processing board output data to a vehicle component. | 05-13-2010 |
20100194888 | REAR ILLUMINATION SYSTEM - In a first aspect, the invention is directed to an illumination system for rearward illumination for a first vehicle. The illumination system includes a tail lamp assembly, a sensor and a controller for controlling the operation of the tail lamp assembly. If the controller determines that there are any oncoming second vehicles behind the first vehicle that are sufficiently close to the first vehicle, then the controller operates the tail lamp assembly in one mode. If the controller determines that there are no oncoming second vehicles behind the first vehicle that are sufficiently close to the first vehicle, then the controller permits the operation of the tail lamp assembly in another mode. | 08-05-2010 |
20120002051 | VEHICULAR REAR VIEW CAMERA DISPLAY SYSTEM WITH LIFECHECK FUNCTION - A vehicular display system having a camera for producing a video signal and a display device for displaying the video signal. The display device includes an integrity check to detect a defective video signal and alert the driver if a defective video signal has been detected. | 01-05-2012 |
20120218412 | SCALABLE INTEGRATED ELECTRONIC CONTROL UNIT FOR VEHICLE - A vehicular scalable integrated control system includes a plurality of cameras, a vehicular scalable integrated control unit, and a display screen for displaying video information to a driver of the vehicle. Visual image data captured by the cameras is processed by an image processor to detect objects in the fields of view of the cameras. The control unit determines a current geographical location of the vehicle and accommodates downloading of applications, which may include a tour guide application, with the tour guide application providing information associated with various geographical locations of a selected tour area. The control unit, responsive to a determination that the current geographical location of the vehicle is at a location identified in the tour guide application for the selected tour area, controls the display screen to display information associated with the identified location of the tour guide application and the current geographical location of the vehicle. | 08-30-2012 |
20130141578 | VEHICLE VISION SYSTEM WITH ENHANCED FUNCTIONALITY - A vehicle vision system includes at least one camera disposed at a vehicle and having a field of view exterior of the vehicle, and includes a control having an image processor for processing image data captured by the at least one camera. The control, responsive at least in part to image processing of captured image data by the image processor, is operable to carry out one or more actions based on the detection of selected elements in the image data captured by the at least one camera. The control may control the operation of an additional component in the vehicle aside from the camera. The vision system may include a forward facing camera, a rearward facing camera and/or a sideward facing camera. | 06-06-2013 |
20130278769 | VEHICLE VISION SYSTEM WITH ACCELERATED OBJECT CONFIRMATION - A vision system for a vehicle includes a camera and an image processor. The camera has a forward field of view exterior of the vehicle. The image processor is operable to process image data captured by the camera. At least one device is operable to detect objects that are present forward of the vehicle and outside of the forward field of view of the camera. The device may include at least one of (i) a sensor, (ii) an element of a vehicle-to-vehicle communication system and (iii) an element of a vehicle-to-infrastructure communication system. Responsive to detection of the object being indicative of the object about to enter the field of view of the camera, the image processor anticipates the object entering the field of view of the camera and, upon entering of the field of view of the camera by the object, the image processor detects the object. | 10-24-2013 |
20130314503 | VEHICLE VISION SYSTEM WITH FRONT AND REAR CAMERA INTEGRATION - A vehicular vision system includes a forward facing camera module having a forward facing camera having forward field of view, and includes a rearward facing camera having a rearward field of view. The forward facing camera module includes an image processor, a decoder and an encoder. Image data captured by the rearward facing camera is fed to the decoder and an output of the decoder is fed to the image processor. The image processor is operable to process image data captured by the forward facing camera to at least detect objects in the forward field of view and is operable to process the decoder output to at least detect objects the rearward field of view. An image processor output is fed to the encoder and an encoder output is fed to a display that is viewable by a driver of the vehicle during a reversing maneuver of the vehicle. | 11-28-2013 |
20130321632 | VEHICULAR VISION SYSTEM - A vehicular vision system includes a camera including an image sensor, a control including a microcontroller, and a serial data interface. The camera has a field of view exterior of a vehicle. A video output is configured for transmitting a stream of video captured by the image sensor. The microcontroller is operatively connected to the image sensor. The serial data interface permits the microcontroller to communicate with at least one electronic device in the vehicle. A resistor having a selected impedance is connected in series with a switch. The resistor and the switch connect a video plus electrical conduit and a video minus electrical conduit. The switch is openable by the microcontroller to deactivate the video output into a high impedance state and is closable to activate the video output. The microcontroller is configured to comply with selected messages received through the serial data interface by opening the switch. | 12-05-2013 |
20140049646 | METHOD OF OBTAINING DATA RELATING TO A DRIVER ASSISTANCE SYSTEM OF A VEHICLE - A method of obtaining data relating to a driver assistance system installed on a vehicle, including capturing sensory data (such as images) external to the vehicle via a sensor of the driver assistance system, buffering a first group of vehicle signals and storing a pre-event value for a signal of the first group in a pre-event buffer, and analyzing the sensory data to detect one or more types of probability events. After a probability event is detected, the method includes monitoring a second group of vehicle signals for a post-event time period after the occurrence of the detected probability event, and during the post event time period processing signals of the second group with a predetermined function to generate a post-event signal value, and recording data in a memory, with the recorded data including the type of detected probability event, a pre-event signal value and a post-event signal value. | 02-20-2014 |
20140092252 | SYSTEM AND METHOD FOR ANNOTATING VIDEO - A method of providing test data for a vehicle may use the test data to verify the performance of a system in the vehicle under different environmental conditions (such as at night, while it is raining, during high glare conditions, during fog and/or the like). The method entails driving a test vehicle through a selected set of environmental conditions. Environment data, such as, for example, images, are captured while driving the test vehicle. The environment data relates to the environment outside the test vehicle. The environment data may be recorded to a memory. Additionally, environmental condition data relating to the environmental conditions outside the vehicle while it is being driven may be recorded to the memory. | 04-03-2014 |
20150138363 | VEHICULAR VISION SYSTEM - A vehicular vision system includes a plurality of cameras mounted at a vehicle, with each camera including a respective image sensor and having a respective field of view exterior of the vehicle. The system includes a control and a video output for transmitting a stream of video captured by an image sensor of a camera of the plurality of cameras, and a serial data interface permitting a microcontroller of the control to communicate with at least one electronic device of the vehicle. A switch is openable by the microcontroller to deactivate the video output and closable by the microcontroller to activate the video output. The microcontroller complies with messages received via a serial data bus. The control sends instructions to a camera of the plurality of cameras via the serial data bus and the control receives messages from an electronic device of the vehicle via the serial data bus. | 05-21-2015 |
20150264321 | SCALABLE INTEGRATED ELECTRONIC CONTROL UNIT FOR VEHICLE - A vehicular scalable integrated control system includes a plurality of cameras having respective fields of view exterior of the vehicle. Image data captured by the cameras is processed by an image processor of a vehicular scalable integrated control unit. A display screen for displaying video images derived, at least in part, from captured image data. The system is operable to fuse captured image data with data captured by a radar device, an ultrasonic sensor and/or an infrared sensor. The system is part of an overall active safety sensing system, which includes fusion of outputs from a plurality of sensing devices to achieve environmental awareness at and surrounding the vehicle. The overall active safety sensing system is operable to at least one of (i) at least partially control the vehicle as the vehicle is driven along a road and (ii) provide alert warnings to a driver of the vehicle. | 09-17-2015 |
20150382382 | Method, apparatus and system for placing emergency calls from a vehicle - A system, apparatus, and method are provided for placing emergency calls from a vehicle to a Public Safety Answering Point. An emergency call apparatus is configured to detect a trigger condition and, if the trigger condition is detected, send a telephone dial command through a vehicle communication network to a telecommunication apparatus to establish voice communication with the Public Safety Answering Point. A method is provided of retrofitting a vehicle with embedded telecommunication apparatus to enable single button access to emergency services without the need for a fee based subscription. | 12-31-2015 |
Patent application number | Description | Published |
20100123560 | METHOD AND APPARATUS FOR DETECTING AND IDENTIFYING DEVICE UTILIZATION - A system and method for detecting the presence of a device user, managing a detection system in a predominantly low power state, ensuring data integrity and limiting the amount of user interaction required to identify users and detect device utilization includes a distinct user tag or badge including an active or passive RFID transceiver and one or more readers and routers in a network. | 05-20-2010 |
20140214449 | SYSTEM AND METHOD FOR POWERING, COMMUNICATING, AND STORING DATA FOR ACCESSORY DEVICES USING A DEVICE UTILIZATION SYSTEM - The present disclosure relates to a system and method for providing a power source, a communications link, and data storage for accessory devices. In a preferred embodiment, a control unit of a hand hygiene compliance system provides a power source, a communications link, and data storage for accessory devices in a room or area of a healthcare facility. In this particular embodiment, the control unit receives power from an offline power source and has a communications module to communicate with a server over a communications network associated with the hand hygiene compliance system. Also, the control unit is further comprised of a port for DC power and data communications that is accessible to accessory devices. As follows, upon receiving data from an accessory device via the port, the control unit is operable to communicate data to the server for storage on a database. | 07-31-2014 |
20140218173 | SYSTEM AND METHOD FOR DETECTING AND IDENTIFYING DEVICE UTILIZATION - A control unit associated with a monitored device, wherein the control unit has a tag radio and a main radio. The tag radio has a first antenna operable to detect and communicate with a wearable tag associated with an asset, such as a person, a piece of equipment, or a supply, over a first communications channel. The main radio has a second antenna operable to communicate data over a second communications channel. In a preferred embodiment, the control unit is operable to communicate simultaneously with a wearable tag and with a communications network using the tag radio and the main radio, respectively. Further, the tag radio is operable to determine actions of a person associated with a wearable tag based upon Radio Signal Strength Identification (RSSI) values detected in short-range communications from the wearable tag. | 08-07-2014 |
Patent application number | Description | Published |
20120310664 | System and Method for Monitoring Hospital Workflow Compliance with a Hand Hygiene Network - A system and method for monitoring compliance with a plurality of workflow procedures in a hospital or other health care facility using a hand hygiene compliance system (HHC). A control unit of an HHC gathers data based upon the presence, identification, and movement of a plurality of assets, including persons, equipment, or supplies, having wearable detectable tags, such as RFID tages, and communicates that data to a local or remote server. The server is programmed to monitor or cause compliance with hospital workflow procedures relevant to the communicated data, such as rounding requirements and proper use of equipment, or may generate alarms or notifications where a workflow procedure has not been followed. | 12-06-2012 |
20130120120 | SYSTEMS AND METHODS FOR USING A HAND HYGIENE COMPLIANCE SYSTEM TO IMPROVE WORKFLOW - A hand hygiene compliance (HHC) system that, in addition to monitoring hand hygiene, provides messaging and asset tracking capabilities to improve workflow amongst employees working at a facility. In one embodiment, the HHC system includes a control unit that is associated with a hand hygiene dispenser and programmed to enable use of a menu of icons each time the control unit detects use of the hand hygiene dispenser by as individual, wherein the icons allow the individual to, without limitation, communicate, enter, obtain, or update workflow information. More specifically, the menu of icons is displayed on a feedback device associated with the control unit, and users select icons by physically touching the feedback device. Alternatively, the control unit includes a gesture sense system which allows users to select one or more icons via touch-free gestures. | 05-16-2013 |
20130261795 | SYSTEM AND METHOD FOR DISABLING OR ENABLING AUTOMATED DISPENSERS - A system and method for disabling or enabling automated dispensers based upon data received by a server or a control unit. In one embodiment, the system disables automated dispensers in a room of a medical facility based upon health condition data of a patient resident in the room. In another embodiment, the system enables automated dispensers upon receipt of data identifying user types authorized to use the dispenser that are associated with wearable tags in proximity to the dispensers. In still another embodiment, the system controls the order in which automated dispensers are enabled in order to facilitate compliance with workflow procedures for a facility. | 10-03-2013 |
20140009292 | SYSTEM AND METHOD FOR MONITORING HOSPITAL WORKFLOW COMPLIANCE WITH A HAND HYGIENE NETWORK - A system and method for monitoring compliance with a plurality of workflow procedures in a hospital or other health care facility using a hand hygiene compliance system (HHC). A control unit of an HHC gathers data based on the presence, identification, and movement of a plurality of assets, including persons, equipment, or supplies, each having wearable detectable tags, such as RFID tags, and communicates that data to a local or remote server. The server is programmed to monitor or cause compliance with hospital workflow procedures relevant to the communicated data, such as rounding requirements and proper use of equipment, or may generate alarms or notifications where a workflow procedure has not been followed. | 01-09-2014 |
20140354436 | SYSTEMS AND METHODS FOR USING A HAND HYGIENE COMPLIANCE SYSTEM TO IMPROVE WORKFLOW - A hand hygiene compliance (HHC) system that, in addition to monitoring hand hygiene, provides messaging and asset tracking capabilities to improve workflow amongst employees working at a facility. In one embodiment, the HHC system includes a control unit associated with a hand hygiene dispenser and programmed to enable use of one or more icons each time the control unit detects use of the hand hygiene dispenser by an individual, wherein the icons allow the individual to, without limitation, enter or update a pain status indicator that is representative of a patient's response to a pain status inquiry event. More specifically, the icons are displayed on a feedback device associated with the control unit, and users select the icons by physically touching the feedback device. In alternative embodiments, the control unit includes a gesture sense system which allows users to select icons without touching the feedback device. | 12-04-2014 |
Patent application number | Description | Published |
20090285175 | Efficient Handover of Media Communications in Heterogeneous IP Networks - Methods and systems are provided for efficient handover of a media session between heterogeneous IP networks. A mobile device with Internet access can operate a software program to communicate with a corresponding node. The corresponding node may access the Internet through either (i) a NAT router or (ii) a public IP address. The mobile device establishes a media session with a corresponding node via the transmission of a first media stream and receipt of a second media stream, and a media control channel can optionally be implemented. The mobile device can acquire Internet access through a second IP address, and packets routed between the second IP address and the Internet may traverse a NAT router. A software routine can determine that handover of the media session from the first IP address to the second IP address is preferred. The mobile device may begin transmitting a third media stream to the corresponding node before the first media stream stops. The corresponding node can transmit a fourth media stream to the second IP address before terminating the transmission of the second stream to the first IP address. Software operating at the mobile device may include a handover predictive jitter buffer. | 11-19-2009 |
20090323632 | Efficient Handover of Media Communications in Heterogeneous IP Networks using LAN Profiles and Network Handover Rules - Methods and systems are provided for efficient handover of a media session between heterogeneous IP networks. A mobile device with Internet access can operate a software program to communicate with a corresponding node. The corresponding node may access the Internet through either a NAT router or a firewall. The mobile device establishes a media session with a corresponding node via the transmission of a first media stream and receipt of a second media stream, and a media control channel can optionally be implemented. The mobile device can acquire Internet access through a second IP address, and packets routed between the second IP address and the Internet may traverse a NAT router. The mobile device can evaluate the type of NAT at the second IP address from a stored LAN profile. A software routine can determine that handover of the media session from the first IP address to the second IP address is preferred. A software routine can determine efficient handover procedures according to Network handover rules. The mobile device may begin transmitting a third media stream to the corresponding node and the corresponding node can transmit a fourth media stream to the second IP address. A media control channel is optionally supported. | 12-31-2009 |
20100290365 | MULTI-LEVEL HOSTED INBOUND ADMINISTRATION FOR A TELEPHONY SYSTEM - A multi-level hosted inbound administration platform for a packet-switched telephony system is provided. The platform provides services for managing the distribution and features of direct inward dialing numbers (DIDs). The platform allows a client to import or purchase DIDs, make DIDs available to sub-distributors, and provision them to end-users. The platform allows sub-distributors to reserve and activate DIDs, make DIDs available to downstream sub-distributors, and provision them to end-users. The platform provides a billing structure for DID usage, with charges being applied on a one-time, monthly, or variable basis. The platform also allows clients and sub-distributors to charge for inbound services based on per-minute or per-usage charges. | 11-18-2010 |
20120263144 | EFFICIENT HANDOVER OF MEDIA COMMUNICATIONS IN HETEROGENEOUS IP NETWORKS - Methods and systems are provided for efficient handover of a media session between heterogeneous IP networks. A mobile device with Internet access can operate a software program to communicate with a corresponding node. The corresponding node may access the Internet through either (i) a NAT router or (ii) a public IP address. The mobile device establishes a media session with a corresponding node via the transmission of a first media stream and receipt of a second media stream, and a media control channel can optionally be implemented. The mobile device can acquire Internet access through a second IP address, and packets routed between the second IP address and the Internet may traverse a NAT router. A software routine can determine that handover of the media session from the first IP address to the second IP address is preferred. | 10-18-2012 |
20120281673 | EFFICIENT HANDOVER OF MEDIA COMMUNICATIONS IN HETEROGENEOUS IP NETWORKS USING LAN PROFILES AND NETWORK HANDOVER RULES - Methods and systems are provided for efficient handover of a media session between heterogeneous IP networks. A mobile device with Internet access can operate a software program to communicate with a corresponding node. The corresponding node may access the Internet through either a NAT router or a firewall. The mobile device establishes a media session with a corresponding node via the transmission of a first media stream and receipt of a second media stream, and a media control channel can optionally be implemented. The mobile device acquires Internet access through a second IP address, and packets routed between the second IP address and the Internet may traverse a NAT router. The mobile device evaluates the type of NAT at the second IP address from a stored LAN profile. A software routine determines that handover of the media session from the first IP address to the second IP address is preferred. | 11-08-2012 |
20130170471 | EFFICIENT HANDOVER OF MEDIA COMMUNICATIONS IN HETEROGENEOUS IP NETWORKS USING HANDOVER PROCEDURE RULES AND MEDIA HANDOVER RELAYS - Methods and systems are provided for efficient handover of a media session between heterogeneous IP networks. A mobile device with Internet access can operate a software program to communicate with a corresponding node. The corresponding node may access the Internet through a firewall which may include NAT-routing functionality. The mobile device establishes a media session with a corresponding node via the transmission of a first media stream and receipt of a second media stream, and a media-control channel can optionally be implemented. The mobile device can acquire Internet access through a second IP address, and packets routed between the second IP address and the Internet may traverse a firewall. The mobile device can evaluate a set of network parameters at the second IP address from a stored LAN profile. A software routine can (i) evaluate preferred IP addresses and (ii) select an efficient handover procedure according to handover procedure rules. | 07-04-2013 |
20130287006 | EFFICIENT HANDOVER OF MEDIA COMMUNICATIONS IN HETEROGENEOUS IP NETWORKS - Methods and systems for online incremental adaptation of neural networks using Gaussian mixture models in speech recognition are described. In an example, a computing device may be configured to receive an audio signal and a subsequent audio signal, both signals having speech content. The computing device may be configured to apply a speaker-specific feature transform to the audio signal to obtain a transformed audio signal. The speaker-specific feature transform may be configured to include speaker-specific speech characteristics of a speaker-profile relating to the speech content. Further, the computing device may be configured to process the transformed audio signal using a neural network trained to estimate a respective speech content of the audio signal. Based on outputs of the neural network, the computing device may be configured to modify the speaker-specific feature transform, and apply the modified speaker-specific feature transform to a subsequent audio signal. | 10-31-2013 |
20150071139 | Power Management and Security for Wireless Modules in "Machine-to-Machine" Communications - Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) or a wireless local area network (LAN). The wireless module may include a sensor and may be installed next to a monitored unit. The wireless module may utilize active states for collecting and sending data, and sleep states at other times to conserve a battery and/or energy usage. The wireless module minimize the time spent in a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to a user datagram protocol (UDP). The wireless module and server can utilize public key infrastructure (PKI) for encryption and digital signatures. | 03-12-2015 |
20150095648 | Secure PKI Communications for "Machine-to-Machine" Modules, including Key Derivation by Modules and Authenticating Public Keys - Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code. | 04-02-2015 |
20150106616 | Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI) - Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module. | 04-16-2015 |
20150121066 | Set of Servers for "Machine-to-Machine" Communications using Public Key Infrastructure - A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key. | 04-30-2015 |
20150143125 | Key Derivation for a Module using an Embedded Universal Integrated Circuit Card - A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards. | 05-21-2015 |
20150163056 | Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication - A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone. | 06-11-2015 |
20150180653 | Module for "Machine-to-Machine" Communications using Public Key Infrastructure - Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of cryptographic parameters. The module can authenticate the submission of derived public keys. The module and server can mutually derive shared secret keys using the PKI keys. Data can be encrypted and decrypted using a set of cryptographic algorithms, the secret shared keys, and the set of cryptographic parameters. A module can send and receive sets of cryptographic parameters in order to flexibly and securely communicate with a variety of servers over time. | 06-25-2015 |
20150180847 | Network Supporting Two-Factor Authentication for Modules with Embedded Universal Integrated Circuit Cards - A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The network can send a first network module identity, a first key K, and an encrypted second key K for an eUICC profile to an eUICC subscription manager. The second key K can be encrypted with a symmetric key. The module can receive and activate the eUICC profile, and the network can authenticate the module using the first network module identity and the first key K. The network can (i) authenticate the user of the module using a second factor, and then (ii) send the symmetric key to the module. The module can decrypt the encrypted second key K using the symmetric key. The network can authenticate the module using the second key K. The module can comprise a mobile phone. | 06-25-2015 |
20150296379 | Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication - A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone. | 10-15-2015 |
20150304113 | Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure - A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key. | 10-22-2015 |
Patent application number | Description | Published |
20120191518 | Apparatus And Method For Anonymously Presenting Targeted Advertisements And Desirable Media Content In Association With A Virtual Currency - An electronic advertising system anonymously directs the attention of a user to content provided by an advertiser, in exchange for subsequently permitting the same user to access otherwise restricted desirable content of another part. Such desirable content may include online entertainment media, digital video content, social media, news media, and other privileged services or data. The user accumulates points, or virtual currency, in exchange for viewing the advertisements of vendor affiliates of the present system. The user may then spend previously accumulated points, or virtual currency, in order to access desirable content of redeemer affiliates of the present system. The present system further facilitates financial transactions between the system operator, vendor affiliates, and redeemer affiliates, relative to the movement of virtual currency amongst the various parties. | 07-26-2012 |
20140026535 | HIGH SPECIFIC IMPULSE SUPERFLUID AND NANOTUBE PROPULSION DEVICE, SYSTEM AND PROPULSION METHOD - A propulsion device including a chamber that stores a superfluid, a substrate coupled to a portion of the chamber, a plurality of orifices extending through the substrate, each of the plurality of orifices having a first end and a second end opposite the first end, the first end disposed in an interior of the chamber and the second end disposed outside the chamber; and a pressure source that generates a pressure differential between the first end of each of the plurality of orifices and the second end of each of the plurality of orifices. | 01-30-2014 |
20140263355 | WEB INSULATION SYSTEM, VALVE FOR A WEB INSULATION SYSTEM, AND A STORAGE CONTAINER USING THE WEB INSULATION SYSTEM - A storage system, including an outer casing having an evacuated inner volume; a vessel for storage located within the outer casing and having a plurality of protrusions distributed on an outer surface thereof; and a plurality of filamentary strands spanning the inner volume, wherein at least some of the plurality of protrusions are essentially tangentially contacted by a plurality of the filamentary strands to secure the vessel in six degrees of freedom relative to the outer casing. | 09-18-2014 |
20150136788 | WEB INSULATION SYSTEM, VALVE FOR A WEB INSULATION SYSTEM, AND A STORAGE CONTAINER USING THE WEB INSULATION SYSTEM - A storage system, including an outer casing having an evacuated inner volume; a vessel for storage located within the outer casing and having a plurality of protrusions distributed on an outer surface thereof; and a plurality of filamentary strands spanning the inner volume, wherein at least some of the plurality of protrusions are essentially tangentially contacted by a plurality of the filamentary strands to secure the vessel in six degrees of freedom relative to the outer casing. | 05-21-2015 |
Patent application number | Description | Published |
20100071686 | Wedge shape solar cooker - Developed is a solar cooker with triangle reflective sides. Above and below are two movable solar reflecting panels, that can be adjusted to focus light onto an invented frying pan using a glass lid, an insulating pad, and a surrounding plastic bag to trap solar light for cooking. The triangle reflective sides are used also to adjust and support the two movable solar reflecting panels via movable pegs. In the corners adjacent to the triangle sides, back reflective plate and reflective floor plate is an invented reflective equilateral triangle, to capture and reflect light towards the solar frying pan assembly. At night the entire solar cooker can be folded down to form a storage space. The entire solar cooker is foldable for shipping. | 03-25-2010 |
20100078012 | Half parabolic dish reflector with planar reflector solar smelter - Melting metals using solar energy is not new, but is new is making the technology ergonomic, and easy to use. Invented is a half-shell-parabolic-dish reflector, which has in front an adjustable flat planar reflector. When the sun is overhead, the sunlight reflects off the flat planar reflector to a half-shell-parabolic-dish, which redirects the light to a crucible for smelting metals, which is also the focus of the sunlight. The entire assembly rotates on top of a turntable, which can be steel wheel, floating on compressed air, bicycle wheels, or other suitable methods. The entire assembly rotates about a crucible located at the focal of the sun's rays. A smaller version of the smelter can be used for solar cooking. | 04-01-2010 |
20110005515 | Solar half parabolic shell smelter with a heliostat on a turntable - Developed is a solar cooker with triangle reflective sides. Above and below are two movable solar reflecting panels, that can be adjusted to focus light onto an invented frying pan using a glass lid, an insulating pad, and a surrounding plastic bag to trap solar light for cooking. The triangle reflective sides are used also to adjust and support the two movable solar reflecting panels via movable pegs. In the corners adjacent to the triangle sides, back reflective plate and reflective floor plate is an invented reflective equilateral triangle, to capture and reflect light towards the solar frying pan assembly. At night the entire solar cooker can be folded down to form a storage space. The entire solar cooker is foldable for shipping. (123 words). | 01-13-2011 |
20120037152 | Solar half parabolic shell smelter with a heliostat on a turntable - Invented is a solar smelter that also manufactures hot air or hot fluids. A curved parabolic-half-shell focuses the sun's rays unto a crucible, which is buried into the ground. Using a heliostat, the sunlight is reflected horizontally unto an interior reflective wall of the curved parabolic-half-shell. Surrounding the crucible is a thermal-mass with embedded pipes, that manufacture hot and compressed air, or heated gas or fluid. On top of the thermal-mass is a clear transparent-and-insulating-glazing that captures any stray solar rays, adding heat to the thermal-mass. At the foci of the parabolic-half-shell is a crucible for melting rocks, sand, glass or metals, or processing chemicals. | 02-16-2012 |
20140251307 | Tilt-able planar reflectors to heat a solar smelter's thermal mass - A tilt-able-central-planar-reflector, a tilt-able-auxiliary-left-planar-reflector, and a tilt-able-auxiliary-right-planar-reflector are hingely attached to a solar-absorbing-thermal-mass. The sun's light is made horizontal to reflect to the interior wall of a reflecting-curved-overhang, capturing the sun's sunrise light and sun's sunset light, and to reflect to the interior wall of a reflecting-parabolic-half-shell capturing the sun's noon light, so as to redirect the sun's light to a solar-absorbing-thermal-mass. The net result provides heat 24 hours a day, 7 days a week for utilization. | 09-11-2014 |
20140251312 | Reflecting parabolic splice solar smelter - A revolution-of-a-parabolic-curve is sliced by two planes to form a reflecting-parabolic-splice-solar-smelter so as to focus the sun's noon light to a crucible for smelting rocks, glass and metals and for processing of chemicals, using zero degrees of freedom. (50 words) | 09-11-2014 |
Patent application number | Description | Published |
20100176889 | COMPLEMENTARY RING OSCILLATOR WITH CAPACITIVE COUPLING - An oscillator. The oscillator includes a first ring oscillator having a first plurality of inverters, a first plurality of capacitors each having a first terminal coupled to an output terminal of a corresponding one of the first plurality of inverters, a second ring oscillator having a second plurality of inverters, and a second plurality of capacitors each having a first terminal coupled to an output terminal of a corresponding one of the second plurality of inverters. A second terminal of the first plurality of capacitors is coupled to an output terminal of a corresponding one of the second plurality of inverters. A second terminal of the second plurality of capacitors is coupled to an output terminal of a corresponding one of the first plurality of inverters. The oscillator is configured to provide as an output a differential clock signal. | 07-15-2010 |
20110187569 | ALGORITHMIC ANALOG-TO-DIGITAL CONVERSION - A 1.5-bit algorithmic analog-to-digital converter (ADC) generates a digital value representative of an input voltage. The ADC implements a series of conversion cycles for a conversion operation. Each conversion cycle has three sub-cycles: a scaling sub-cycle, a first sample sub-cycle, and a second sample sub-cycle. In the scaling sub-cycle, the residual voltage from the previous conversion cycle is doubled to generate a first voltage. In the first sample sub-cycle, a first bit of a corresponding bit pair is determined based on the polarity of the first voltage. The first voltage is either increased or decreased by a reference voltage based on the polarity of the first voltage to generate a second voltage. In the second sample sub-cycle, a second bit of the corresponding bit pair is determined based on the polarity of the second voltage. The second voltage then is either increased or decreased by the reference voltage based on the polarity of the second voltage to generate the residual voltage used for the next conversion cycle in the series. Each bit pair is mapped to a corresponding two-bit code value and the resulting code values are used to generate the digital value. | 08-04-2011 |
20120218012 | ON-CHIP POWER-UP CONTROL CIRCUIT - A power-up control circuit utilizes on-chip circuits, multiple voltages, a ring oscillator and counter, and edge and level detection circuits to guarantee reset during power-up conditions and continues the reset state with a variable length counter to guarantee a predictable reset. In addition, a clean start-up after a logical power-down condition is provided. | 08-30-2012 |
20130170078 | HIGH VOLTAGE PROTECTION CIRCUIT FOR NON-TOLERANT INTEGRATED CIRCUIT - A high voltage protection circuit for a non-tolerant integrated circuit is described herein. A non-tolerant integrated circuit may be a powered down integrated circuit or a low voltage tolerant integrated circuit, that may be exposed to a high voltage source such as an external circuit, device or power supply. The high voltage protection circuit includes a limiting transistor circuit, a control transistor circuit, and an isolation transistor circuit. The limiting transistor circuit limits or holds the voltage at the signal bump to be less than a voltage that can damage the circuit. The isolation transistor circuit disconnects input/output signal circuitry from normal protection circuitry. Both the limiting transistor circuit and the isolation transistor circuit are controlled by the control transistor circuit and are responsive to the power supply voltage being off. | 07-04-2013 |
20150052622 | METHOD AND APPARATUS FOR MONITORING PERFORMANCE FOR SECURE CHIP OPERATION - A method and apparatus is provided for monitoring performance of an processor to detect tampering and place the processor in a safe operating state that prevents unauthorized access to contents of the processor. In one example, the method and apparatus compares a measured value of an operating parameter (i.e., a temperature, supply voltage or clock signal) to predefined limits to identify an out of limits measured value. If an out of limits measured value is detected during a normal operating mode, the processor enters a reset mode, and if an out of limits measured value is detected during power up or reset, the processor in retained a reset mode. | 02-19-2015 |
Patent application number | Description | Published |
20130030887 | CUSTOMER REWARD AND LOYALTY SYSTEM - Embodiments of the invention relate to systems, methods, and computer program products for implementing a customer loyalty rewards program by assigning point values to a customer's completion of certain activities, monitoring the customer's activities to determine when the customer has completed an activity, crediting the customer the assigned value of points for the completed activities, correlating points to one or more rewards and facilitating the exchange of rewards. | 01-31-2013 |
20130030888 | SYSTEM FOR ALLOWING CUSTOMERS TO CHOOSE REWARDS - Embodiments of the invention relate to systems, methods, and computer program products for allowing a customer to choose rewards as part of a customer incentive program by receiving a first customer input, wherein the first customer input is a characteristic of the customer, receiving a second customer input, wherein the second customer input is a category of reward in which the customer is interested, correlating the first customer input to a plurality of activities to be completed by the customer, correlating the second customer input to rewards to be provided to the customer for completing an activity, monitoring the customer's activities to determine when the customer has completed an activity and providing a reward to the customer corresponding to the completed activity. | 01-31-2013 |
20130030925 | CONTEXT-AWARE MOBILE BANKING SOLUTION - A context-aware mobile banking system determines a location of a user of the mobile device, identifies at least one product of interest to the user based at least in part on the determined location of the user, determines based on the determined product of interest, information corresponding to the product of interest, and presents the information corresponding to the product of interest to the user. In some embodiments, the system retrieves user budgeting information including a plurality of budget categories each having an associated budget amount and an associated remaining amount indicating an amount remaining in from the budget amount, determines a budget category from the plurality of budget categories associated with the product of interest, and determines the budget amount and remaining amount associated with the determined budget category. The system then may present information corresponding to the remaining amount and the budget amount to the user. | 01-31-2013 |
20130030994 | BUDGET MONITOR, ALERT, AND BILL PAYMENT FACILITATION SYSTEM - A budget monitoring, alerting and bill payment facilitation system retrieves macro-budgeting information associated with a user, where the macro-budgeting information includes a plurality of budget categories each having an associated budget amount corresponding to a macro time period, divides the budget amount corresponding to the macro time period into a plurality of micro budget amounts corresponding to a plurality of micro time periods, and presents, to the user by a mobile device, micro-budgeting information corresponding to at least one of the plurality of micro budget amounts or its corresponding micro time period. In some embodiments, the system retrieves user data, determines the user may be experiencing a life event based on the user data, where the micro-budgeting information is based on the determination that the user may be experiencing a life event, and confirms that the user is experiencing a life event. | 01-31-2013 |
Patent application number | Description | Published |
20130338806 | SYSTEM AND METHOD FOR SELECTIVE REMOVAL OF AUDIO CONTENT FROM A MIXED AUDIO RECORDING - Systems and techniques for removing a sound recording from an audio recording (e.g., an audio recording embedded in a media file) are presented. The system can include an identification component, a first subtraction component and a second subtraction component. The identification component identifies a sound recording in a mixed audio recording. The first subtraction component determines a local linear transformation of the sound recording and subtracts the local linear transformation of the sound recording from the mixed audio recording to generate a new mixed audio recording. The second subtraction component compares one or more segments of the sound recording with one or more corresponding segments of the new mixed audio recording and reduces a power level of the new mixed audio recording based at least in part on correlation of the one or more corresponding segments with the one or more segments. | 12-19-2013 |
20140118597 | MULTI-DIRECTIONAL CONTENT CAPTURE ON MOBILE DEVICES - Systems and methods for facilitating content capturing on a mobile device are provided. The current position of a mobile device is identified during a content capturing preparation stage. The current position of the mobile device can correspond to a first position or a second position. The first position is a preferred position for capturing content as compared to the second position. When the current position of the mobile device corresponds to the second position, a prompt can be provided on the mobile device to instruct a user of the mobile device to move the mobile device to the first position. | 05-01-2014 |
20140123041 | DISPLAYING SIMULATED MEDIA CONTENT ITEM ENHANCEMENTS ON MOBILE DEVICES - Systems and methods for displaying a simplified version of a modification of a media content item on a mobile device are provided. The mobile device can receive, via a user interface presented on the mobile device, a request for a desired modification of an original media content item. The mobile device can perform a simplified version of the desired modification of the original media content item. The mobile device can present a preview of the modified media content item in the user interface. The mobile device can transmit, to another computing device, the original media content item with the request for the desired modification. | 05-01-2014 |
20150149906 | Collaborative Video Editing in a Cloud Environment - The subject matter of this specification can be implemented in, among other things, a method that includes causing presentation of a collaborative video project to a first user account that includes a set of one or more shared video clips and a set of one or more personal video clips. The method includes receiving from the first user account a first selection of a video clip in the set of personal video clips and, in response, adding the video clip to the set of shared video clips. The method includes causing presentation of the collaborative video project to a second user account, including presentation of the set of shared video clips. The method includes receiving from the second user account a second selection of the video clip and, in response, adding the video clip to a collaborative video for the collaborative video project. | 05-28-2015 |
20160041807 | SYSTEM AND METHOD FOR SELECTIVE REMOVAL OF AUDIO CONTENT FROM A MIXED AUDIO RECORDING - Systems and techniques for removing a sound recording from an audio recording (e.g., an audio recording embedded in a media file) are presented. The system can include an identification component, a first subtraction component and a second subtraction component. The identification component identifies a sound recording in a mixed audio recording. The first subtraction component determines a local linear transformation of the sound recording and subtracts the local linear transformation of the sound recording from the mixed audio recording to generate a new mixed audio recording. The second subtraction component compares one or more segments of the sound recording with one or more corresponding segments of the new mixed audio recording and reduces a power level of the new mixed audio recording based at least in part on correlation of the one or more corresponding segments with the one or more segments. | 02-11-2016 |
Patent application number | Description | Published |
20080232590 | Micropayment Processing Method and System - A method of producing an offer package includes defining, within the offer package, a description of an offered product. The cost of the offered product and the merchant making the offer are also defined within the offer package, which includes an encrypted version of the offered product. | 09-25-2008 |
20100299195 | SYSTEMS AND METHODS FOR IMPLEMENTING FINANCIAL TRANSACTIONS - A payment processing system to provide merchant-specific accounts to consumers that are accessed by payment instruments. In one embodiment, the payment processing system can create and provide a variety of payment methodologies for purchases, such as pay-as-you-go, virtual prepaid, virtual subscription, and post-paid purchases. The merchant may, in some embodiments provide consumers with merchant rewards accounts and an opportunity to earn reward points or other loyalty-based currencies through qualifying purchase transactions. The consumer may access their merchant-specific accounts for purchase payment using a preferred payment instrument, such as a credit or debit card. | 11-25-2010 |
20120185312 | SYSTEMS AND METHODS FOR IMPLEMENTING FINANCIAL TRANSACTIONS - A payment processing system to provide merchant-specific accounts to consumers that are accessed by payment instruments. In one embodiment, the payment processing system can create and provide a variety of payment methodologies for purchases, such as pay-as-you-go, virtual prepaid, virtual subscription, and post-paid purchases. The merchant may, in some embodiments provide consumers with merchant rewards accounts and an opportunity to earn reward points or other loyalty-based currencies through qualifying purchase transactions. The consumer may access their merchant-specific accounts for purchase payment using a preferred payment instrument, such as a credit or debit card. | 07-19-2012 |
20120233068 | METHODS AND APPARATUS FOR HEALTHCARE PAYMENT PROCESSING - Methods and apparatus for facilitating a payment collection process by enabling a patient to pre-authorize payment for future medical services not covered by the patient's healthcare payer. Rather than sending a statement to a patient instructing the payment to remit an outstanding balance, a practice management system automatically applies electronic funds for the patient's outstanding balance in accordance with terms of a contract executed between the patient and the medical practice at the time of service. By including contract terms such as a predefined maximum charge amount and limited contract duration, patients may feel that their electronic account information is safe and that they will be billed only for what they owe. Additionally, medical practices may have better assurance that remittance for medical services will be paid promptly by patients under the terms of the contract. | 09-13-2012 |
20130332186 | METHODS AND APPARATUS FOR HEALTHCARE PAYMENT PROCESSING - Methods and apparatus for facilitating a payment collection process by enabling a patient to pre-authorize payment for future medical services not covered by the patient's healthcare payer. Rather than sending a statement to a patient instructing the payment to remit an outstanding balance, a practice management system automatically applies electronic funds for the patient's outstanding balance in accordance with terms of a contract executed between the patient and the medical practice at the time of service. By including contract terms such as a predefined maximum charge amount and limited contract duration, patients may feel that their electronic account information is safe and that they will be billed only for what they owe. Additionally, medical practices may have better assurance that remittance for medical services will be paid promptly by patients under the terms of the contract. | 12-12-2013 |
Patent application number | Description | Published |
20110063994 | Secure And Rapid Networking Configuration Of Information Handling Systems And Peripherals - A near field communication device, such as an RFID wand, transmits network configuration information to non-volatile memory of a networking device while the networking device is powered down, and even packaged at a retail store. The networking device powers up, reads the network configuration information, and applies the network configuration to automatically interface the networking device with a wireless network. | 03-17-2011 |
20130311464 | Aggregated Preference-Driven Social Content Player - A system and method are disclosed for managing playlists of digital content. Digital content preference data is received from a plurality of users. The preference data is then processed to generate a group preference playlist, which contains references to digital content that is mutually preferred by each of the users. The group preference playlist is then initiated to play the mutually-preferred digital content. | 11-21-2013 |
20140020105 | Distributing Software Images with Mixed Licensing - A system, method, and computer-readable medium are disclosed for managing the licensing of digital assets associated with a system image. A system image is processed to identify digital asset identification information, which in turn is processed to determine whether its associated digital asset is available for licensing from a system manufacturer. If the digital asset could not be identified, or if it is unavailable for licensing from the system manufacturer, then it is marked as “custom.” Otherwise, it is marked as “available” and presented to a system purchaser. Any digital assets that the system purchaser elects to license are marked as “license” and all other digital assets are marked as “custom.” Digital assets marked as “license” are then licensed from the system manufacturer. Both licensed and “custom” digital assets are installed and their corresponding licenses are applied to the system image, which in turn is applied to the target system. | 01-16-2014 |
20140047101 | Method for Personalized Shopping Recommendations - A system, method, and computer-readable medium are disclosed for providing personalized recommendations based upon a user's system profile and usage. A personalized recommendation system receives a first set of input data and a second set of input data, the first set of input data comprising traditional recommendation input data and the second set of input data comprising recommendation input data associated with the profile and usage of a user's system. The first and second sets of input data are then processed to generate and provide a personalized recommendation. | 02-13-2014 |
20140059236 | Process for Peer-To-Peer Download of Software Installer - A system, method, and computer-readable medium are disclosed for performing automated, peer-to-peer migrations of entitled digital assets. A first identifier corresponding to a source system, and a first set of entitlement data corresponding to a set of digital assets installed on the source system, are processed to generate a first set of entitlements entitling the source system to use the set of digital assets. The first identifier is then cross-referenced to a second identifier corresponding to a target system. A migration request and the second identifier are received from the target system, which are then processed to initiate the migration of the digital assets from the source system to the target system. The second identifier and the first set of entitlement data are subsequently processed to generate a second set of digital asset entitlements entitling the target system to use the set of digital assets. | 02-27-2014 |