Patent application number | Description | Published |
20130268257 | SYSTEM AND METHOD FOR ENERGY USAGE ACCOUNTING IN SOFTWARE APPLICATIONS - A method for generating an energy usage profile for a software program executed in a computing device includes generating a call trace of an executed system call, identifying a first power consumption and duration of a first power state due to the first system call using a model, identifying a second power consumption and duration of a second power state based on the model, and generating an energy usage profile for the software program. The energy usage profile includes energy consumption of the computing device for the system call based on the first power consumption level multiplied by the first duration and the second power consumption level multiplied by the second duration associated an identifier for the call trace. | 10-10-2013 |
20140364174 | ON-DEVICE ENERGY ESTIMATION FOR PORTABLE ELECTRONIC DEVICES - A technique for estimating energy consumption of a portable electronic device is described. During this energy-estimation technique, the portable electronic device determines hardware-state information for communication subsystems that implement different communication protocols, and software-state information for the communication protocols. Then, using models for the communication subsystems, and the hardware-state information and the software-state information, the portable electronic device estimates the energy consumption. Based on the estimated energy consumption, certain percentages of the battery charge may be allotted for different applications or features, battery-life diagnostics may be improved, and useful information may be provided to a user about the battery drain on their portable electronic device. | 12-11-2014 |
20140380283 | Systems and Methods of Detecting Power Bugs - Embodiments of the present invention provide a system and methods for detecting power bugs. In one embodiment, a computer-implemented method for analyzing a computer code includes generating a control flow graph for at least a portion of the computer code at a processor. The method further includes identifying power bugs by traversing the control flow graph if the control flow graph exits without performing a function call to deactivate power to any component of a device configured to execute computer executable instructions based on the computer code after performing a function call to activate power. | 12-25-2014 |
20150346801 | METHOD AND APPARTUS FOR DISTRIBUTED POWER ASSERTION - A method and an apparatus for a power assertion management are described. A power assertion indicator may be maintained for a device component having a power level. The power assertion indicator can indicate whether the power level of the device component is allowed to be lowered. A power assertion request may be sent from a first process to prevent lowering the power level of the device component before a data processing task is completed. A second process can receive a request from the first process to perform operations for the data processing task. The power level of the device component may not be allowed to be lowered before the second process completes the operations for the data processing task. The power level of the device component may be lowered after the data processing task is completed. | 12-03-2015 |
20150346933 | BATTERY USAGE TRACKING USER INTERFACE - A portable electronic device having a user interface for displaying battery usage of the device over a given time period, with the battery usage from various subsystems. The various subsystems including at least one hardware subsystem and the battery usage attributed to a plurality of software applications based on activity of the plurality of software applications, while battery usage of the various subsystems was monitored. | 12-03-2015 |
Patent application number | Description | Published |
20090141714 | CACHING REMOTE SWITCH INFORMATION IN A FIBRE CHANNEL SWITCH - A network of switches with a distributed name server configuration and caching of remote node device information is disclosed. The network preferably comprises a first switch coupled to a second switch. Each of the switches directly couple to respective node devices. The first switch maintains a name server database about its local node devices, as does the second switch. The second switch further maintains a information cache about remote node devices. The name server preferably notifies other switches of changes to the database, and the cache manager preferably uses the notifications from other switches to maintain the cache. The name server accesses the cache to respond to queries about remote node devices. The cache manager may also aggregate notification messages from other switches when notifying local devices of state changes. Traffic overhead and peak traffic loads may advantageously be reduced. | 06-04-2009 |
20090219827 | REGISTERED STATE CHANGE NOTIFICATION FOR A FIBRE CHANNEL NETWORK - Disclosed herein are various aspects of a Fibre Channel (Fibre Channel) fabric having switches that employ Registered State Change Notifications (RSCNs) with enhanced payloads. Two types of RSCN message formats are provided, both including status information about the affected device(s). In one embodiment, a RSCN message format for inter-switch communication provides various information about the affected devices according to one of a plurality of predetermined formats. In another embodiment, a node device RSCN message format provides information about a port state, the identification of the affected port, along with the port and node world wide names and the FC-4 types supported by the node. | 09-03-2009 |
20130036186 | CACHING REMOTE SWITCH INFORMATION IN A FIBRE CHANNEL SWITCH - A network of switches with a distributed name server configuration and caching of remote node device information is disclosed. The network preferably comprises a first switch coupled to a second switch. Each of the switches directly couple to respective node devices. The first switch maintains a name server database about its local node devices, as does the second switch. The second switch further maintains a information cache about remote node devices. The name server preferably notifies other switches of changes to the database, and the cache manager preferably uses the notifications from other switches to maintain the cache. The name server accesses the cache to respond to queries about remote node devices. The cache manager may also aggregate notification messages from other switches when notifying local devices of state changes. Traffic overhead and peak traffic loads may advantageously be reduced. | 02-07-2013 |
20130044765 | FIBRE CHANNEL NETWORK EMPLOYING REGISTERED STATE CHANGE NOTIFICATION WITH ENHANCED PAYLOAD - A network of switches that employ Registered State Change Notifications (RSCNs) with enhanced payloads is disclosed. In one embodiment, the network comprises multiple switches coupled together, and multiple node devices each directly-coupled to at least one other switch. Each of the switches preferably provides RSCNs to other switches when a node device state change is detected. One or more of the RSCNs preferably includes a device entry having more than four properties associated with the node device undergoing the state change. The switches receiving the enhanced RSCNs preferably maintain caches of remote node device entries copied from the RSCN device entries. The device entries preferably include one or more of the following: Owner Identifier, Port Type, Port Identifier, Port Name, Node Name, Initial Process Associator, Node IP Address, Class of Service, FC-4 Types, Port IP Address, Fabric Port Name, and Hard Address. Traffic overhead may advantageously be reduced. | 02-21-2013 |
Patent application number | Description | Published |
20110302135 | MAINTAINING APPLICATIONS THAT ARE OCCASIONALLY CONNECTED TO AN ONLINE SERVICES SYSTEM - In a method for maintaining applications that are occasionally connected to an online services system, metadata describing at least a portion of an online services database is retrieved and the portion of the online services database is authorized for replication at a software application, information for an entity for an application database in accordance with metadata is determined, information is sent for the entity to an application data management service, data for the software application is retrieved from the online services database in accordance with metadata, at least a portion of the data for the software application is sent to the application data management service and the portion of the data for the software application should be synchronized with the online services database, a request for information is received for rendering a component of a user interface, and information is provided for rendering the component of the user interface for the software application | 12-08-2011 |
20110302454 | PERFORMING ASYNCHRONOUS TESTING OF AN APPLICATION OCCASIONALLY CONNECTED TO AN ONLINE SERVICES SYSTEM - In a method, system, and computer-readable medium having instructions for performing asynchronous testing of an application that is occasionally connected to an online services system, metadata describing at least a portion of an online services database is retrieved and the at least a portion of the online services database is authorized for replication at a software application, information is determined for an entity for an application database from the metadata, a request is sent for a database using the software application interface and the request has an asynchronous operation call to the database for the entity, an execution of the asynchronous operation call is recorded within a callback function, a response is received for the asynchronous operation call, and a result is determined for the software application performance. | 12-08-2011 |
20120304014 | PERFORMING ASYNCHRONOUS TESTING OF AN APPLICATION OCCASIONALLY CONNECTED TO AN ONLINE SERVICES SYSTEM - In a method, system, and computer-readable medium having instructions for performing asynchronous testing of an application that is occasionally connected to an online services system, metadata describing at least a portion of an online services database is retrieved and the at least a portion of the online services database is authorized for replication at a software application, information is determined for an entity for an application database from the metadata, a request is sent for a database using the software application interface and the request has an asynchronous operation call to the database for the entity, an execution of the asynchronous operation call is recorded within a callback function, a response is received for the asynchronous operation call, and a result is determined for the software application performance. | 11-29-2012 |
Patent application number | Description | Published |
20100071965 | SYSTEM AND METHOD FOR GRAB AND DROP GESTURE RECOGNITION - X-axis and Y-axis sensor arrays detect hand motion. The array data are processed by a trained model gesture recognizer to discriminate between grab and touch gestures. Touch gestures are further processed using touch point classifier, Hidden Markov Model and peak detector to discriminate between single point touch and multiple point touch. A Kalman tracker analyzes the trajectories of the X and Y axis data to determine how to associate X and Y axis data into ordered pairs corresponding to the touch points. The system resolves ambiguities inherent in certain sensor arrays and will also detect grab and drop gestures where the detected hand is sometimes out of sensor range during the gestural sequence. | 03-25-2010 |
20100073126 | SECURE SYSTEM FOR NON-COVERT USER AUTHENTICATION AND IDENTIFICATION - A secure system for user authentication comprised of an authentication interface having a character dial and alignment markers is provided. A passcode input module receives user commands to move the character dial with respect to the alignment markers and to record a configuration of the characters with respect to the alignment markers, thereby creating alignment configuration data. A passcode generation module receives at least one of said alignment configuration data from passcode input module and generates a plurality of passcode hypotheses. An authentication module receives the passcode hypotheses and compares the passcode hypotheses with the passcodes of registered users stored in a data store. The passcode hypotheses are updated after each new alignment configuration data entered by the user. The authentication module authenticates a user upon finding a passcode hypothesis matching a stored passcode. | 03-25-2010 |
20100073318 | MULTI-TOUCH SURFACE PROVIDING DETECTION AND TRACKING OF MULTIPLE TOUCH POINTS - System and method for touch sensitive surface provide detection and tracking of multiple touch points on the surface by using two independent arrays of orthogonal linear capacitive sensors. | 03-25-2010 |
20100268426 | RECONFIGURABLE VEHICLE USER INTERFACE SYSTEM - A reconfigurable vehicle user interface system is presented. A vehicle user interface has a touch sensitive input devices such as touchpads and a touch screen that have specific function commands mapped to them. A user can select which function commands are mapped to which portions of the touch screen. This allows a user to customize the steering wheel function commands. | 10-21-2010 |
20140282842 | USER CENTRIC METHOD AND ADAPTOR FOR DIGITAL RIGHTS MANAGEMENT SYSTEM - A method for managing users' digital rights to documents protected by digital rights management (DRM), comprising the steps of a rights management system (RMS) server receiving a request from a user for accessing a DRM-protected document, and the RMS server executing a user centric adaptor (UCA) module to check in a UCA database under the user's identification (ID) whether one of a limited number of predetermined policies of digital rights is added to the user's ID, whereas if the user's rights to the document is not revoked by deletion of a predetermined policy under the user's ID in the UCA database, then the UCA module does not block granting the user's request. | 09-18-2014 |
20140298488 | METHOD FOR AUTOMATING THE MANAGEMENT AND INTERPRETATION OF DIGITAL DOCUMENTS AND THEIR OWNERS RIGHTS METADATA FOR GENERATING DIGITAL RIGHTS MANAGEMENT PROTECTED CONTENTS - A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document. | 10-02-2014 |
20150095376 | MESSAGING ADMINISTRATION BASED ON DIGITAL RIGHTS MANAGEMENT SERVICES - A method for servicing messages with digital documents accessed and displayed by a client application, including the steps of establishing a database of message queues each associated with one or more digital documents and containing one or more messages, and upon authorizing a user's request for accessing and using a digital document, providing a message queue associated with the digital document. | 04-02-2015 |
20150248195 | USER INTERFACE METHOD FOR MODIFYING A SELECTION LIST OF ITEMS TO ADD OR REMOVE ITEMS WHILE INDICATING ORIGINAL SELECTION - A user interface display method implemented on a computer-controlled device to allow an operator to define a list of selected items among a plurality of items available for selection. The operator starts by selecting a pre-existing list containing a number of selected items. A modified list is generated which initially contains the same items as the pre-existing list. The device displays all of the items available for selection, as well as first and second indications associated with each item initially in the modified list. Then, in response to operator inputs to add items to (or remove items from) the modified list, second indications are displayed (or removed from display) in association with the items to be added (or removed), without changing the display of any of the first indications and any of the plurality of items. The modified list is saved without changing the pre-existing list. | 09-03-2015 |
20150248560 | METHOD FOR SPECIFYING USER ACCESS RIGHTS FOR A DIGITAL DOCUMENT USING EXISTING RIGHTS MANAGEMENT POLICIES WITH MODIFICATIONS - A digital rights management (DRM or RMS) method allows the operator of a scanner, connected to an RMS server, to associate a digital document with user access rights that are different from the rights defined by any of the existing DRM policies on the server. The method allows the operator to choose one of the existing policies on the server, and modify the user access rights by granting rights to additional users and/or removing rights of some users that would be granted by that policy, to generate modified user access rights for a document without changing any existing policies or adding new policies. The server stores the document ID, polity ID and the user access rights (modified or unmodified) in a rights association table on the server. The method is also applicable when importing documents into the DRM system from sources other than scanners. | 09-03-2015 |
20150271211 | RIGHTS MANAGEMENT POLICIES WITH NONTRADITIONAL RIGHTS CONTROL - A method for managing rights management policies for user access and use of digital documents with nontraditional rights control in addition to traditional rights management services (RMS) based on digital rights management (DRM) policies assigned to respective digital documents and their users and stored in an RMS database, including the steps of: a server, upon receiving a user's request regarding a document protected by one or more DRM policies, determining whether the document has additional nontraditional rights control for the user; the server checking a nontraditional policy service (NPS) database, and validating the user's information with one or more NPS database entries of NPS policy extensions pertaining to the document and the user, where the NPS policy extensions amend the DRM policies with additional nontraditional rights control; and the server denying the user's request if the user's information cannot be validated by anyone of said one or more NPS database entries of the NPS policy extensions pertaining to the document and the user, or granting the user's request if the user's information can be validated by all of said one or more NPS database entries of the NPS policy extensions pertaining to the document and the user. | 09-24-2015 |
20150347719 | DIGITAL RIGHTS MANAGEMENT SYSTEM IMPLEMENTED ON A SCANNER - In a digital rights management system where a scanner is connected to a rights management server, the process of applying digital rights protection is performed by the scanner, rather than the server, so that scanning and document protection can be done even when the server is not available. Upon scanning a document, the operator selects a rights management policy to be applied to the digital document. The scanner generates a document ID, embeds the document ID as metadata in the document, encrypts the document, and stores the document ID, policy ID of the selected policy, and encryption key as an entry in a local document-policy association table on the scanner. The scanner uploads the above information of the digital document to the server, which stores the information in a document-policy association table on server and uses it to perform document access control. | 12-03-2015 |
20150356277 | METHOD FOR AUTOMATING THE MANAGEMENT AND INTERPRETATION OF DIGITAL DOCUMENTS AND THEIR OWNERS RIGHTS METADATA FOR GENERATING DIGITAL RIGHTS MANAGEMENT PROTECTED CONTENTS - A method for automating the management and interpretation of digital documents and their rights metadata to generate user access of a document protected by digital rights management (DRM), comprising the steps of a server obtaining a digital document and its associated rights metadata, the server interpreting the metadata to ascertain DRM useful information including identifications (IDs) of the document and its users and associated digital rights, and the server generating entries for a DRM database including policies associated with the document ID and users IDs based on the ascertained DRM useful information to enable DRM protection to the document. | 12-10-2015 |
20150379244 | DYNAMIC DOCUMENT DISPLAY PERSONALIZATION IMPLEMENTED IN A DIGITAL RIGHTS MANAGEMENT SYSTEM - A method for displaying a digital document to a user where the display sequence of the pages of the document is personalized based on the user's past interactions with the document, such as viewing, annotating, editing, sharing, etc. on each pages. As user interacts with the document, the viewer application on the client computer reports the user interactions to a server. Through analytics, the server can decide the importance of individual pages and rank the pages accordingly, and sends page ranking information back to the client. The viewer application on the client can then render the document where pages are ordered based on the ranking, which reflects the user's interest in these pages. Different modes of reorganizing a document based on user interaction history are provided, so that the pages can be displayed in sequences based on the frequency of certain types of user interactions | 12-31-2015 |
20160034427 | PERSONALIZED DOCUMENT CONTENT AGGREGATION AND DOCUMENT ASSOCIATION IMPLEMENTED IN A DIGITAL RIGHTS MANAGEMENT SYSTEM - Methods for managing contents of multiple digital documents for individual users, to generate aggregated documents from multiple documents and/or create associations among multiple documents, based on the user's interactions with multiple digital documents. A document content aggregation method can, on a personalized basis, aggregate contents from multiple digital documents into an aggregated document based on a user's past interactions with the documents. The aggregation is based on a content importance score calculated from the user interaction pattern. A document association method can, on a personalized basis, create associations among multiple digital documents based on the user's past interactions with the documents. Two documents are deemed related if there is a user interaction pattern where the user interacts with both documents with a predetermined time interval from each other. When displaying one document, link icons are displayed to allow the user to directly navigate to the related documents. | 02-04-2016 |
Patent application number | Description | Published |
20090295851 | SYSTEMS, METHODS, AND MATERIALS FOR TEMPORARY PRINTING AND INDICIA - Methods and/or systems for printing or otherwise evincing temporary indicia on media with disappearing inks are described along with suitable disappearing ink formulations and media constructions for executing the same. In particular embodiments, the methods and/or systems described employ a plurality of disappearing inks with different disappearing rates. In one embodiment, a barrier layer that is selectively used to cover a major surface of the media is employed to substantially block or otherwise regulate a rate of phase transitions (e.g., evaporation and/or sublimation) experienced by ink borne by the media. | 12-03-2009 |
20130261409 | Sensing Patch Applications - Various methods, devices and systems for patch based physical, physiological, chemical, and biochemical sensors that diagnose and monitor disease states are described. The patch based sensors provide a panel of specific analyte parameters that determine one or more physiological conditions and/or the level of healing progression of a wound. The use of such analyte panels in local or remote monitoring of parameters related to various disease states is also described. | 10-03-2013 |
20140057101 | Pressure Sensitive Adhesives Based on Renewable Resources, UV Curing and Related Methods - One embodiment is a pressure sensitive adhesive label or tape that comprises a facestock, and a pressure sensitive adhesive composition disposed on the facestock and the pressure sensitive adhesive composition includes a product made from reacting an epoxidized naturally occurring oil or fat with a dimer acid. Another embodiment of the invention is a method that comprises reacting an epoxidized naturally occurring oil or fat with a dimer acid to form a PSA precursor; coating the PSA precursor onto a carrier and curing the PSA precursor via UV radiation to form a pressure sensitive adhesive. | 02-27-2014 |