Patent application number | Description | Published |
20140004944 | INTEGRATING ONLINE GAMES WITH ONLINE FEEDS | 01-02-2014 |
20140194207 | GAME SYSTEM PROVIDING CUSTOM GAME STORIES - A system, computer-readable storage medium storing at least one program, and a computer-implemented method for surfacing game stories are presented. Embodiments may, responsive to detecting a first game action initiated by a first user, surface a first game story to a second user through a social feed. Responsive to detecting that the first game story is activated by the second user, a second game story is surfaced on the social feed that tags the first user. The second game story represents a second game action is performed in a game involving the second user based on the first game story being activated. | 07-10-2014 |
20140323214 | SYSTEMS AND METHODS PRESENT A GAME VARIANT - A system, a non-transitory machine-readable storage medium storing instructions, and a computer-implemented method to present a game variant is provided. A user interface may be presented on a client device. The user interface may be receptive to user input to trigger execution of a computer-implemented multiplayer game playable via the client device by an associated player. A respective game variant may be presented, via the user interface, to the player. The respective game variant may have variant-specific game mechanics that provide for gameplay according to a respective variant set of game rules. Lastly, the respective variant set of game rules may be a variant-specific modified version of a default set of game rules. | 10-30-2014 |
20140323225 | SYSTEMS AND METHODS FOR SEGMENT-BASED CUSTOMIZATION FOR NOTIFICATIONS FOR USERS - A system, a non-transitory machine-readable storage medium storing instructions, and a computer-implemented method are described herein to create and send invitations to join an online game. An Notification Generator (NG) customizes message content based on detected online game account activities and relationships between various accounts associated with an online game. When the NG detects that an account is a new account or a lapsed account, the NG identifies an additional account(s) most likely to play the particular online game with the new/lapsed account. Some additional accounts may be social network system accounts while others may be online gaming system accounts. The NG groups the additional accounts according to account-type segments, and customizes online game invitation message with message content for a respective additional account based on the account-type segment and whether it has detected a new account or lapsed account. | 10-30-2014 |
20140323226 | SYSTEMS AND METHODS TO SEND GAME INVITATIONS - A system, a non-transitory machine-readable storage medium storing instructions, and a method to send a telephonic message is provided. A request may be received from a first mobile device operated by a first player of a computer-implemented multiplayer game. The request may include a reference to each of a plurality of second mobile devices. The plurality of second mobile devices may be identified based on the reference. A telephonic message may be generated that includes a trigger executable by each of the plurality of second mobile devices to begin an instance of the computer-implemented multiplayer game with the first mobile device. The generated telephonic message may be sent to each of the plurality of second mobile devices via an out-of-game telephonic channel. | 10-30-2014 |
20140349743 | VALUE ICON TO AWARD VIRTUAL CURRENCY IN A VIRTUAL GAME - A computer-implemented method and system are described to provide virtual currency in a virtual game. The method may record a purchase value of a value icon in a virtual game. The value icon may then be deployed in the virtual environment of the virtual game. For each of a plurality of reference time periods, interaction of a player of the virtual game with the value icon may be monitored, and a virtual currency amount may be awarded to the player in the event of the player interacting with the value icon a set number of instances during each of the reference time periods. Further virtual currency may be denied upon subsequent interaction with the value icon during the same reference time period. | 11-27-2014 |
Patent application number | Description | Published |
20100329249 | METHODS AND APPARATUS FOR DYNAMIC DETECTION OF TRANSIT TIMES BETWEEN STAGES IN DISTRIBUTED MULTI-STAGE SWITCH FABRICS - In some embodiments, a method includes sending a signal to a first module associated with a stage of a switch fabric and receiving a signal from the first module a first amount of time after sending the signal to the first module. A signal is sent to a second module associated with the stage of the switch fabric and a signal is received from the second module a second amount of time after sending the signal to the second module. The second amount of time is less than the first amount of time. A cell of a first data packet is sent to the first module and a cell of a second data packet is sent to the second module a third amount of time after sending the cell of the first data packet. The third amount of time is associated with the difference between the first amount of time and the second amount of time. | 12-30-2010 |
20110228795 | MULTI-BANK QUEUING ARCHITECTURE FOR HIGHER BANDWIDTH ON-CHIP MEMORY BUFFER - A network device includes a main storage memory and a queue handling component. The main storage memory includes multiple memory banks which store a plurality of packets for multiple output queues. The queue handling component controls write operations to the multiple memory banks and controls read operations from the multiple memory banks, where the read operations for at least one of the multiple output queues alternates sequentially between the each of the multiple memory banks, and where the read operations and the write operations occur during a same clock period on different ones of the multiple memory banks. | 09-22-2011 |
20130121341 | MULTI-BANK QUEUING ARCHITECTURE FOR HIGHER BANDWIDTH ON-CHIP MEMORY BUFFER - A network device includes a main storage memory and a queue handling component. The main storage memory includes multiple memory banks which store a plurality of packets for multiple output queues. The queue handling component controls write operations to the multiple memory banks and controls read operations from the multiple memory banks, where the read operations for at least one of the multiple output queues alternates sequentially between the each of the multiple memory banks, and where the read operations and the write operations occur during a same clock period on different ones of the multiple memory banks. | 05-16-2013 |
20140119238 | MULTI-CHASSIS TOPOLOGY DISCOVERY USING IN-BAND SIGNALING - A multi-chassis network device may automatically detect whether cables connected between chassis devices are correctly inserted. The device may insert, into a first data stream output from a first port of the device, control information identifying the first port. The device may receive, from a second data stream received by the first port of the device, second control information identifying a second port, at another device connected to the device via a cable. The device may determine, based on the second control information, whether the connection of the first port to the second port, via the cable, is valid and cause, when the connection of the first port to the second port is determined to not be valid, the device to output an indication that the connection is not valid or to reconfigure the device to make the connection of the first port to the second port valid. | 05-01-2014 |
20140201398 | RATE CONTROLLED FIRST IN FIRST OUT (FIFO) QUEUES FOR CLOCK DOMAIN CROSSING - First in, first out (FIFO) queues may be used to transfer data between a producer clock domain and a number of consumer clock domains. In one implementation, a control component for the FIFO queues may include a number of counters, corresponding to each of the consumer clock domains, each of the counters maintaining a count value relating to an amount of data read by the corresponding consumer clock domain. The control component may additionally include a credit deduction component coupled to the count values of the counters, the credit deduction component determining whether any of the count values is above a threshold, and in response to the determination that any of the count values is above the threshold, reducing the count value of each of the counters and issuing a write pulse signal to the producer clock domain, the write pulse signal causing the producer clock domain to perform a write operation to the FIFO queues. | 07-17-2014 |
Patent application number | Description | Published |
20100162338 | MEASURING REMOTE VIDEO PLAYBACK PERFORMANCE WITH EMBEDDED ENCODED PIXELS - Methods, systems, and computer programs for measuring performance of remote video delivery are presented. The method embeds at a server computer a marker in selected frames of a video stream. The marker includes a preconfigured sequence of pixels and is followed by a frame number encoded in the pixel data. The method then finds a first marker at a client computer to determine the location of the markers in a display. Once the location of the markers is determined, markers in following frames are detected with their corresponding frame numbers. The method stores the arrival times and frame numbers for each detected marker. The stored arrival times and frame numbers can be used for statistical performance analysis of remote video delivery. | 06-24-2010 |
20130097426 | WATERMARKING AND SCALABILITY TECHNIQUES FOR A VIRTUAL DESKTOP PLANNING TOOL - A method for measuring performance of virtual desktop services offered by a server including a processor is described. A first encoded watermark is embedded into user interface display generated by a virtual desktop when initiating an operation. The first encoded watermark includes pixels identifying the operation and indicating its initiation. A second encoded watermark is embedded into the user interface upon completion of the operation indicating completion of the operation. An action performance time is then computed and stored in a memory. Multiple performance times may be compiled from multiple operations of multiple virtual desktops to assess the performance of the system as a whole. | 04-18-2013 |
20140122566 | Performance Enhancement in Virtual Desktop Infrastructure (VDI) - In one embodiment, a method displays images from a remote desktop of a desktop GUI on a client device. The method receives a plurality of image blocks for a frame update of an image of the desktop GUI being displayed on the client device. The remote desktop is being run on a host. The client device determines that one or more missing image blocks have not been received for the frame update and determines if the frame update should be performed without the one or more missing image blocks. If the frame update of the desktop GUI should be performed without the one or more missing image blocks, the client device performs the frame update of the desktop GUI using the plurality of image blocks without using the one or more missing image blocks. | 05-01-2014 |
20140122694 | SYSTEMS AND METHODS FOR DETERMINING DESKTOP READINESS USING INTERACTIVE MEASURES - Systems and methods described herein facilitate determining desktop readiness using interactive measures. A host is in communication with a server and the host includes a virtual desktop and a virtual desktop agent. The virtual desktop agent is configured to perform one or more injecting events via one or more monitoring agents, wherein each of the injecting events is a simulated input device event. The desktop agent is further configured to receive, via a display module, a response to the injecting event(s), wherein the response is a display update causing pixel color values for the display module to alter. The desktop agent is also configured to identify, via the monitoring agent(s), whether the response to the injecting event(s) is an expected response. The desktop agent is also configured to determine, via the monitoring agent(s), a readiness of the virtual desktop based on the expected response. | 05-01-2014 |
20140181682 | USING CONTEXTUAL AND SPATIAL AWARENESS TO IMPROVE REMOTE DESKTOP IMAGING FIDELITY - Image data representing a desktop image for a client device that is accessing the desktop remotely is compressed according to a method that preserves image fidelity in selected non-text regions. The method, which is carried out in a remote server, includes the steps of generating image data for the remote desktop image and analyzing different regions of the remote desktop image, identifying those regions of the remote desktop image that are text regions, selecting non-text regions of the remote desktop image for lossless compression based on a spatial relationship between the non-text regions and the text regions, compressing the image data using a lossless compression protocol for a portion of the image data corresponding to the selected non-text regions, and transmitting the compressed image data to the client device. | 06-26-2014 |
20140258872 | Passive Monitoring of Live Virtual Desktop Infrastructure (VDI) Deployments - In one embodiment, a client device configured to remotely access a desktop hosted by a server system determines an event related to a user input for a desktop operation directed to the desktop. The client device receives a plurality of updates to a desktop graphical user interface (GUI) from the desktop hosted by the server system. Then, the client device correlates the event to an update in the plurality of updates to the desktop GUI based on a rule in a set of rules correlating events to updates. A metric is monitored for the update and information measured for the metric is stored. | 09-11-2014 |
20140320673 | Measurement of Remote Display Performance With Image-Embedded Markers - Methods, systems, and computer programs are provided for measuring the performance of a remote display. One method includes an operation for embedding in display frames a respective frame identifier and a respective frame picture. The respective frame picture is placed in a respective region that depends of the value of the respective frame identifier. Additionally, the method includes operations for sending the plurality of display frames to a remote client, and for extracting each received frame picture from the respective region of each received display frame at the remote client based on the received frame identifier. The received frame quality is calculated for each received display frame based on the comparison of the extracted received frame picture with the respective frame picture. Further, the method includes an operation for calculating a remote display quality for the remote client based on the calculated received frame quality for the received display frames. | 10-30-2014 |
20140325054 | Remote Display Performance Measurement Triggered By Application Display Upgrade - Methods, systems, and computer programs are provided for measuring the performance of display images received on a remote computer display. One method includes an operation for detecting calls from an application to an application programming interface (API), which is provided for rendering images on a display image, each call causing an update of the display image. Further, the method includes an operation for embedding data for measuring performance in display frames of the display image based on the detecting. The embedding results in modified displayed frames with respective data for measuring performance. The modified displayed frames are transmitted to a remote client, which results in received modified display frames having respective received data for measuring the performance. In addition, the method includes an operation for calculating the remote display quality for the given application based on the received modified display frames and the respective received data for measuring performance. | 10-30-2014 |
20140325372 | VIRTUAL DESKTOP INFRASTRUCTURE (VDI) CACHING USING CONTEXT - In one embodiment a method for storing a remote desktop GUI image block in a cache including a plurality of persistence levels is described. The method is comprised of maintaining each persistence level in the plurality of persistence levels; identifying an event associated with an update to the remote desktop GUI; determining a context for the event; selecting one of the persistence levels for the event based on the context; and storing an image block corresponding to the update in the selected one of the persistence levels. | 10-30-2014 |
20150035724 | Performance Enhancement in Virtual Desktop Infrastructure (VDI) - In one embodiment, a method displays images from a remote desktop of a desktop GUI on a client device. The method receives a plurality of image blocks for a frame update of an image of the desktop GUI being displayed on the client device. The remote desktop is being run on a host. The client device determines that one or more missing image blocks have not been received for the frame update and determines if the frame update should be performed without the one or more missing image blocks. If the frame update of the desktop GUI should be performed without the one or more missing image blocks, the client device performs the frame update of the desktop GUI using the plurality of image blocks without using the one or more missing image blocks. | 02-05-2015 |
20150084979 | METHOD AND SYSTEM FOR MEASURING DISPLAY PERFORMANCE OF A REMOTE APPLICATION - This disclosure describes a performance-monitoring system that computes a display performance metric of a remote application. During operation, the system performs a sequence of input events, and receives information which updates a graphical user interface (GUI). The GUI displays a sequence of frames rendered by a remote application in response to the input events. The system then samples colors at a number of pivot points on the GUI, and matches the a respective frame to a previously performed input event based on the sampled colors. The system subsequently computes a display performance metric for the remote application based on the frames and the corresponding input events. | 03-26-2015 |
Patent application number | Description | Published |
20120109703 | DISTRIBUTED COMPUTING TO REDUCE A LATENCY OF DATA ANALYSIS OF A SALES AND OPERATIONS PLAN - In one embodiment, a method includes creating a demand plan in a distributed cloud infrastructure based on a demand-forecasting algorithm that considers multi-party input in client-side visualizations of a certain aspect of the demand plan appropriate to a demand-side stakeholder based on a rules-based algorithm that considers a demand-side access privilege and a demand-side role of the demand-side stakeholder. In addition, the method includes creating a supply plan in the distributed cloud infrastructure based on another supply-forecasting algorithm that considers multi-party input in client-side visualizations of a particular aspect of the supply plan appropriate to a supply-side stakeholder based on a rules-based algorithm that considers a supply-side access privilege and a supply-side role of the supply-side stakeholder. In addition, the method includes applying a planning algorithm using a combined processing power of available ones of the set of processing units in the distributed cloud infrastructure to create a build plan. | 05-03-2012 |
20120130756 | AUGMENTATION OF A USER PARTICIPATION OF A SALES AND OPERATIONS PLAN THROUGH AN OFF THE SHELF SPREADSHEET APPLICATION WITH A PLUG-IN - In one embodiment, a method of a server device includes determining a date to send an e-mail alert based on a flexible calendar of a sales and operations plan. The method also includes recording a response of a user to the e-mail alert. The method further includes tracking a participation of the sales and operations plan based on the response of the user to the e-mail alert. The method also includes generating a report based on the participation. In addition, the method includes generating a reminder when the participation is below a threshold of the participation. The method also includes increasing the participation of the sales and operations plan such that a percentage of the response of the user is increased. | 05-24-2012 |
20140351001 | BUSINESS ENTERPRISE SALES AND OPERATIONS PLANNING THROUGH A BIG DATA AND BIG MEMORY COMPUTATIONAL ARCHITECTURE - Disclosed are methods, devices, and systems to provide sales and operations planning (S&OP) for a business enterprise. In one embodiment, a machine-implemented method includes aggregating a S&OP raw data by one or more relational database management systems (RDBMS) communicatively coupled to a big data computation engine; performing a S&OP simulation, by one or more processing nodes of the big data computation engine, using the S&OP raw data; caching a result of the S&OP simulation in a big memory cache communicatively coupled to the big data computation engine; and edge caching the result of the S&OP simulation in an edge cache server near a geographical point of origin of the S&OP raw data. The S&OP raw data may be a historical or forward-looking data input from an ERP program, a CRM program, an SRM program, an MRP program, an SKU database, or a user client device. | 11-27-2014 |
Patent application number | Description | Published |
20090287672 | Method and Apparatus for Better Web Ad Matching by Combining Relevance with Consumer Click Feedback - A method and apparatus are provided for better web ad matching by combining relevance with consumer click feedback. In one example, the method includes receiving a query page, extracting features from the query page, re-weighting the query page, evaluating the query page in light of each ad in order to score each ad and pick substantially best ad matches of the indexed ads, and returning the substantially best ad matches to the consumer computer. | 11-19-2009 |
20120166445 | METHOD, APPARATUS AND COMPUTER READABLE MEDIUM FOR INDEXING ADVERTISEMENTS TO COMBINE RELEVANCE WITH CONSUMER CLICK FEEDBACK - A method and apparatus are provided for better web ad matching by combining relevance with consumer click feedback. In one example, the method includes receiving a query page, extracting features from the query page, re-weighting the query page, evaluating the query page in light of each ad in order to score each ad and pick substantially best ad matches of the indexed ads, and returning the substantially best ad matches to the consumer computer. | 06-28-2012 |
20140108417 | METHOD AND APPARATUS FOR WEB AD MATCHING - A method and apparatus are provided for better web ad matching by combining relevance with consumer click feedback. In one example, the method includes receiving a query page, extracting features from the query page, re-weighting the query page, evaluating the query page in light of each ad in order to score each ad and pick substantially best ad matches of the indexed ads, and returning the substantially best ad matches to the consumer computer. | 04-17-2014 |
Patent application number | Description | Published |
20090024551 | MANAGING VALIDATION MODELS AND RULES TO APPLY TO DATA SETS - Provided are a method, system, and article of manufacture for managing validation models and rules to apply to data sets. A schema definition describing a structure of at least one column in a first data set having a plurality of columns and records providing data for each of the columns is received. At least one model is generated, wherein each model asserts conditions for at least one column in a record of the first data set. The schema definition and the at least one model are stored in a data quality model. Selection is received of a second data set and the data quality model. A determination is made as to whether a structure of the second data set is compatible with the schema definition in the selected data quality model. Each model in the data quality model is applied to the records in the second data set to validate the records in the second data set in response to determining that the structure of the second data set and the schema definition are compatible. | 01-22-2009 |
20090037391 | Common Interface to Access Catalog Information from Heterogeneous Databases - Various embodiments of a system and computer program product to access metadata from a plurality of data servers from a federated database management system are provided. In one embodiment, a request for metadata, from a client application, is received by the federated database management system. Data servers which are accessible from the federated database management system are identified. For each data server, metadata describing data of a data source of that data server is retrieved in accordance with the application request. The retrieved metadata from each of the data servers is aggregated to produce an aggregated result in a uniform format. The aggregated result is provided. In another embodiment, for each data server, a source metadata request for metadata of that data server is generated in accordance with the application request and a source metadata application programming interface. A view is created based on the source metadata request for metadata for each data server. | 02-05-2009 |
20090144296 | WEB 2.0 SYSTEM AND METHOD FOR DYNAMIC CATEGORIZATION OF HETEROGENEOUS AND REGULATED ENTERPRISE ASSETS - A system and method for the dynamic categorization of heterogeneous, regulated enterprise information assets. In one embodiment of the invention a system includes a computer network controlled by an enterprise and a database including a plurality of enterprise data entities. A user interface, through which a plurality of enterprise users may access the enterprise data entities, is also used by the plurality of users to assign user-defined categories to the enterprise data entities. The user interface is configured to enable a plurality of the users to access and assign additional user-defined categories to enterprise data entities having user-defined categories previously assigned by other users. | 06-04-2009 |
Patent application number | Description | Published |
20090116614 | Cargo Scanning System - The present invention is directed to a portable inspection system for generating an image representation of target objects using a radiation source. A detector array having a first configuration and a second configuration is connected to a housing and at least one source of radiation. The radiation source is capable of being transported to a site by a vehicle and of being positioned separate from the housing. The radiation source is housed in a radiation source box and movable within the radiation source box using an actuator. The actuator is operably connected to the radiation source and provides a translational energy that moves the radiation source between an operational position and a stowed position. | 05-07-2009 |
20090245462 | Cargo Scanning System - The inspection methods and systems of the present invention are mobile, rapidly deployable, and capable of scanning a wide variety of receptacles cost-effectively and accurately on uneven surfaces. The present invention is directed toward a portable inspection system for generating an image representation of target objects using a radiation source, comprising a mobile vehicle, a detector array physically attached to a movable boom having a proximal end and a distal end. The proximal end is physically attached to the vehicle. The invention also comprises at least one source of radiation. The radiation source is fixedly attached to the distal end of the boom, wherein the image is generated by introducing the target objects in between the radiation source and the detector array, exposing the objects to radiation, and detecting radiation. | 10-01-2009 |
20090274270 | Single Boom Cargo Scanning System - The inspection methods and systems of the present invention are mobile, rapidly deployable, and capable of scanning a wide variety of receptacles cost-effectively and accurately on uneven surfaces. The present invention is directed toward a portable inspection system for generating an image representation of target objects using a radiation source, comprising a mobile vehicle, a detector array physically attached to a movable boom having a proximal end and a distal end. The proximal end is physically attached to the vehicle. The invention also comprises at least one source of radiation. The radiation source is fixedly attached to the distal end of the boom, wherein the image is generated by introducing the target objects in between the radiation source and the detector array, exposing the objects to radiation, and detecting radiation. | 11-05-2009 |
20100135458 | X-Ray Apparatus for Bone Density Assessment and Monitoring - The present invention relates to a dual energy X-ray apparatus and method for osteoporosis assessment and monitoring. The present invention takes a bone densitometry reading of a patient's wrist to assess osteoporosis and monitor bone loss condition by repeat measurements along with therapy. The bone densitometry system has an X-ray source, dual energy detectors, an arm-rest to place the patient's arm, a motion system to move the source-detector gantry along the patient's forearm, and a computer with a database to archive the wrist image, calculate the bone mineral density, maintain a history of patient information, and generate patient history reports. | 06-03-2010 |
20100189226 | ROTATABLE BOOM CARGO SCANNING SYSTEM - The present invention is a self-contained mobile inspection system and method and, more specifically, improved methods and systems for detecting materials concealed within a wide variety of receptacles and/or cargo containers. In particular, the present invention is an improved method and system for inspecting receptacles and/or cargo containers using a single boom placed on a turntable with pivot points to allow for folding and unfolding of the boom, such that the inspection system is relatively compact in a stowed configuration and has a low center of gravity lending to greater stability. | 07-29-2010 |
20100284515 | Apparatus for Bone Density Assessment and Monitoring - The present invention relates to a dual energy X-ray apparatus and method for osteoporosis assessment and monitoring. The present invention takes a bone densitometry reading of a patient's wrist to assess osteoporosis and monitor bone loss condition by repeat measurements along with therapy. The bone densitometry system has an X-ray source, dual energy detectors, an arm-rest to place the patient's arm, a motion system to move the source-detector gantry along the patient's forearm, and a computer with a database to archive the wrist image, calculate the bone mineral density, maintain a history of patient information, and generate patient history reports. | 11-11-2010 |
20110116597 | Cargo Scanning System - The present invention is directed to a portable inspection system for generating an image representation of target objects using a radiation source. A detector array having a first configuration and a second configuration is connected to a housing and at least one source of radiation. The radiation source is capable of being transported to a site by a vehicle and of being positioned separate from the housing. The radiation source is housed in a radiation source box and movable within the radiation source box using an actuator. The actuator is operably connected to the radiation source and provides a translational energy that moves the radiation source between an operational position and a stowed position. | 05-19-2011 |
20120099710 | Cargo Scanning System - The present application is directed to a portable inspection system for generating an image representation of target objects using a radiation source. A detector array having a first configuration and a second configuration is connected to a housing and at least one source of radiation. The radiation source is capable of being transported to a site by a vehicle and of being positioned separate from the housing. The radiation source is housed in a radiation source box and movable within the radiation source box using an actuator. The actuator is operably connected to the radiation source and provides a translational energy that moves the radiation source between an operational position and a stowed position. | 04-26-2012 |
20120121072 | ROTATABLE BOOM CARGO SCANNING SYSTEM - The present application is a self-contained mobile inspection system and method and, more specifically, improved methods and systems for detecting materials concealed within a wide variety of receptacles and/or cargo containers. In particular, the present application is an improved method and system for inspecting receptacles and/or cargo containers using a single boom placed on a turntable with pivot points to allow for folding and unfolding of the boom, such that the inspection system is relatively compact in a stowed configuration and has a low center of gravity lending to greater stability. | 05-17-2012 |
20130251105 | Cargo Scanning System with Boom Structure - The present application is a self-contained mobile inspection system and method and, more specifically, improved methods and systems for detecting materials concealed within a wide variety of receptacles and/or cargo containers. In particular, the present application is an improved method and system for inspecting receptacles and/or cargo containers using a single boom placed on a turntable with pivot points to allow for folding and unfolding of the boom, such that the inspection system is relatively compact in a stowed configuration and has a low center of gravity lending to greater stability. | 09-26-2013 |
20140016756 | Cargo Scanning System - The present application is directed to a portable inspection system for generating an image representation of target objects using a radiation source. A detector array having a first configuration and a second configuration is connected to a housing and at least one source of radiation. The radiation source is capable of being transported to a site by a vehicle and of being positioned separate from the housing. The radiation source is housed in a radiation source box and movable within the radiation source box using an actuator. The actuator is operably connected to the radiation source and provides a translational energy that moves the radiation source between an operational position and a stowed position. | 01-16-2014 |
20140341343 | Cargo Scanning System with Boom Structure - The present application is a self-contained mobile inspection system and method and, more specifically, improved methods and systems for detecting materials concealed within a wide variety of receptacles and/or cargo containers. In particular, the present application is an improved method and system for inspecting receptacles and/or cargo containers using a single boom placed on a turntable with pivot points to allow for folding and unfolding of the boom, such that the inspection system is relatively compact in a stowed configuration and has a low center of gravity lending to greater stability. | 11-20-2014 |
Patent application number | Description | Published |
20130338629 | DIABETES THERAPY MANAGEMENT SYSTEM FOR RECOMMENDING BASAL PATTERN ADJUSTMENTS - An electronic computing device as presented here includes a device communications layer, a processor device, and a reporting layer. The device communications layer receives sensor data for a user of an insulin infusion device, wherein the sensor data indicates blood glucose levels of the user for a specified period of time, and over a plurality of days. The processor device analyzes the received sensor data to detect an event occurrence indicative of a correctable basal rate setting of the insulin infusion device. The reporting layer generates a report containing a graphical representation of the received sensor data and a recommendation to adjust a basal rate setting of the insulin infusion device, wherein the recommendation is intended to address the detected event occurrence. | 12-19-2013 |
20130338630 | DIABETES THERAPY MANAGEMENT SYSTEM FOR RECOMMENDING ADJUSTMENTS TO AN INSULIN INFUSION DEVICE - A method of managing use of an insulin infusion device are provided. The method receives glucose data for a user of the infusion device, wherein the glucose data indicates blood glucose levels of the user for a period of time during which the insulin infusion device is regulating delivery of insulin to the user. The received glucose data is received to detect certain event occurrences, which may be indicative of a correctable basal rate setting of the insulin infusion device and/or indicative of potential maladjustment of a user-specific setting of a bolus calculator setting of the insulin infusion device. The method outputs a recommendation to adjust the basal rate setting and/or the bolus calculator setting as needed to address the detected event occurrences. | 12-19-2013 |
20130345663 | DIABETES THERAPY MANAGEMENT SYSTEM FOR RECOMMENDING BOLUS CALCULATOR ADJUSTMENTS - A method of managing use of an insulin infusion device is presented here. The method identifies bolus calculator event data from glucose data for a user of the infusion device. The bolus calculator event data corresponds to use of a bolus calculator that calculates bolus dosage recommendations based on a user entered carbohydrate consumption value, a user entered current blood glucose value, a user specific carbohydrate ratio value, and a user specific insulin sensitivity value. The method filters the bolus calculator event data to remove glucose data associated with certain conditions, and analyzes the filtered data to detect an event occurrence that is indicative of potential maladjustment of the carbohydrate ratio value or the insulin sensitivity value. The method outputs a recommendation to adjust the carbohydrate ratio value or the insulin sensitivity value, based on characteristics of the detected event occurrence. | 12-26-2013 |
Patent application number | Description | Published |
20080221653 | FLEXIBLE CIRCUIT ELECTRODE ARRAY - A flexible circuit electrode array comprising:
| 09-11-2008 |
20100197826 | Wound Closing Compounds With Additives - According to one embodiment of the present invention, there is provided a polyacrylamide or derivative thereof, such as poly-N-isopropyl acrylamide (pNIPAM) for use in the closure of wounds. Also provided is a composition comprising a polyacrylamide or derivative thereof in an amount effective for closing a wound, at least in part, and one or more pharmaceutically acceptable carriers. The a polyacrylamide or derivative thereof may be used in the composition according to the invention in various concentrations and may be combined with other therapeutic compounds. In another embodiment, a method for treating a wound with the compounds and compositions described herein is provided. The method comprises administering to a mammal a polyacrylamide or derivative thereof in an amount effective to close at least a part of a wound. | 08-05-2010 |
20100305550 | MEMS DEVICE AND METHOD FOR DELIVERY OF THERAPEUTIC AGENTS - Embodiments of an implantable device for delivering a therapeutic agent to a patient include a reservoir configured to contain a liquid comprising the therapeutic agent, and a cannula in fluid communication with the reservoir. The cannula is shaped to facilitate insertion thereof into a patient's eyeball. | 12-02-2010 |
20110144617 | MEMS DEVICE AND METHOD FOR DELIVERY OF THERAPEUTIC AGENTS - Embodiments of an implantable device for delivering a therapeutic agent to a patient include a reservoir configured to contain a liquid comprising the therapeutic agent, a cannula in fluid communication with the reservoir, and means for forcing fluid from the reservoir into the cannula. Circuitry for controlling the means for forcing fluid from the reservoir into the cannula may be included. | 06-16-2011 |
20110144619 | MEMS DEVICE AND METHOD FOR DELIVERY OF THERAPEUTIC AGENTS - Embodiments of an implantable device for delivering a therapeutic agent to a patient include a reservoir configured to contain a liquid comprising the therapeutic agent, and a cannula in fluid communication with the reservoir. A valve for maintaining a constant flow rate through the cannula independent of the pressure applied to the device may be included. | 06-16-2011 |
Patent application number | Description | Published |
20110106808 | MULTI-DIMENSIONAL CONTENT ORGANIZATION AND DELIVERY - The present disclosure provides novel systems and methods for providing multi-dimensional categorization within a multi-tenant database system (“MTS”). Data items in entities stored in a MTS may be categorized along one or more category dimensions. A search query may include one or more selected categories in one or more category dimensions. Categorization methodologies include multi-selection, multi-position, and combinations thereof. Users of the MTS may also be categorized along one or more category dimensions. A filter may present a subset of data items relevant to a user in accordance with their categorization. | 05-05-2011 |
20110225119 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR VERSIONING CONTENT IN A DATABASE SYSTEM USING CONTENT TYPE SPECIFIC OBJECTS - In accordance with embodiments, there are provided mechanisms and methods for versioning content in a database system using content type specific objects. These mechanisms and methods for versioning content in a database system using content type specific objects can enable embodiments to provide a database system which stores information associated with multiple versions of content. The ability of embodiments to provide a database system which supports content versioning can enable an efficient and comprehensive storage of content types having different features by the database system. | 09-15-2011 |
20110238705 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR EXTENDING A MASTER-DETAIL RELATIONSHIP - In accordance with embodiments, there are provided mechanisms and methods for extending a master-detail relationship between objects. These mechanisms and methods for extending a master-detail relationship between objects can enable enhanced data usage, increased efficiency, improved user interaction, etc. | 09-29-2011 |
20110238706 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR AUTOMATIC CODE GENERATION FOR DATABASE OBJECT DELETION - In accordance with embodiments, there are provided mechanisms and methods for automatic code generation for database object deletion. These mechanisms and methods for automatic code generation for database object deletion can generate code for deleting database objects in an automated manner. The ability to generate code for deleting database objects in an automated manner can enable the efficient and accurate deletion of database objects, including database objects with relationships to other database objects. | 09-29-2011 |
20110238707 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR CREATING AN OBJECT WITHIN A SYSTEM, UTILIZING A TEMPLATE - In accordance with embodiments, there are provided mechanisms and methods for creating an object within a system, utilizing a template. These mechanisms and methods for creating an object within a system, utilizing a template can enable increased efficiency, resource and time savings, more intuitive object creation, etc. | 09-29-2011 |
20110302212 | SYSTEMS AND METHODS FOR ANALYZING OPERATIONS IN A MULTI-TENANT DATABASE SYSTEM ENVIRONMENT - A system and method for analyzing operations in a multi-tenant database system environment is provided. The system may include a database storing tenant application data and common application data, the tenant application data and common application data controlling a creation, read, update, deletion or undeletion of an object in the multi-tenant database system environment. The system may further include a processor to analyze the tenant application data and common application data to identify therein where the object is being modified, and generate a report identifying potential errors or side effects which may affect the object based upon the analyzed tenant application data and common application data | 12-08-2011 |
20120089610 | Structured Data In A Business Networking Feed - Disclosed are systems, apparatus, methods, and computer readable media for presenting updates to associated records to publish on an information feed in an on-demand database service environment. In one embodiment, data is received at a computing device configured to provide computing services via a network. The data may be separated into a plurality of data entries to define structured data. Each data entry may have a plurality of data fields. Each data field may be capable of being assigned a respective data value. The structured data may be stored in a database in an on-demand computing services environment. References to the structured data may be capable of being stored as feed items in one or more feed tables in a database. The feed items may be capable of being published in an information feed displayed on a display device. | 04-12-2012 |
20130238677 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR USING A DATABASE TO ACCESS CONTENT STORED OUTSIDE OF THE DATABASE - In accordance with embodiments, there are provided mechanisms and methods for using a database to access content stored outside of the database. These mechanisms and methods for using a database to access content stored outside of the database can enable embodiments to provide a database system which can be used to access content when the content is incapable of being stored in the database system, or is otherwise not stored in the database system. The ability of embodiments to provide access to such data via the database system can improve the usability of the database system. | 09-12-2013 |
20130282720 | MECHANISM FOR FACILITATING EVALUATION OF DATA TYPES FOR DYNAMIC LIGHTWEIGHT OBJECTS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating evaluation of data types for dynamic lightweight objects in an on-demand services environment. In one embodiment and by way of example, a method includes uploading a data file having data at a first computing device in response to a request, and detecting data types relating to the data within the data file. The detecting includes scanning data rows and data columns of the data file. The method may further include classifying the detected data types into one or more categories, and creating one or more dynamic objects based on the one or more categories. | 10-24-2013 |
20130282742 | MECHANISM FOR FACILITATING MANAGEMENT AND CUSTOMIZATION OF LIGHTWEIGHT OBJECTS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating management and customization of lightweight objects in an on-demand services environment. In one embodiment and by way of example, a method includes receiving, at a first computing device, a request a file having data and associated metadata in a format that is not supported by default objects of a software application. The method may further include generating one or more dynamic objects to support the requested format, generating the requested format using the one or more dynamic objects, and providing the file in the requested format via the software application. | 10-24-2013 |
20130283096 | MECHANISM FOR FACILITATING CONVERSION AND CORRECTION OF DATA TYPES FOR DYNAMIC LIGHTWEIGHT OBJECTS VIA A USER INTERFACE IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating conversion and correction of data types for dynamic lightweight objects via a user interface in an on-demand services environment. In one embodiment and by way of example, a method includes receiving a first data file at a first computing device, identifying data types in the first data file that correspond to dynamic custom objects associated with the first data file, and linking the data types to their corresponding dynamic custom objects. | 10-24-2013 |
20130290406 | MECHANISM FOR PROVIDING A CLOUD PLATFORM FOR FACILITATING AND SUPPORTING USER-CONTROLLED DEVELOPMENT AND MANAGEMENT OF USER PRODUCTS - In accordance with embodiments, there are provided mechanisms and methods for providing a cloud platform for facilitating and supporting user-controlled development and maintenance of user products. In one embodiment and by way of example, a method includes developing at a product via a cloud platform facilitated by a mechanism at a first computing device, generating the product at the cloud platform, and maintaining, in real-time, the product at the cloud platform via the mechanism at the first computing device. | 10-31-2013 |
20140122649 | MECHANISM FOR FACILITATING USER-CONTROLLED MANAGEMENT OF SITE NETWORK MAPPING AND SYNCHRONIZATION - In accordance with embodiments, there are provided mechanisms and methods for facilitating user-controlled mapping of sites and synchronization of their content. In one embodiment and by way of example, a method includes receiving a first generation request for generating a site template in a first site network. The first generation request is received at a first computing device. The method may further include generating the site template, generating a child site based on the site template, and mapping the child site to one or more of a parent site and one or more child sites within the first site network. | 05-01-2014 |
20140122993 | MECHANISM FOR FACILITATING USER-CONTROLLED MANAGEMENT OF WEBPAGE ELEMENTS FOR DYNAMIC CUSTOMIZATION OF INFORMATION - In accordance with embodiments, there are provided mechanisms and methods for facilitating user-controlled management of webpage elements for dynamic customization of relevant information. In one embodiment and by way of example, a method includes receiving, in real-time, a request for performing one or more tasks relating to dynamic customization of webpage elements relating to a webpage package. The request may be received at a first computing device over a network. The method may further include performing, in real-time, the one or more tasks. | 05-01-2014 |
20140136500 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR VERSIONING CONTENT IN A DATABASE SYSTEM USING CONTENT TYPE SPECIFIC OBJECTS - In accordance with embodiments, there are provided mechanisms and methods for versioning content in a database system using content type specific objects. These mechanisms and methods for versioning content in a database system using content type specific objects can enable embodiments to provide a database system which stores information associated with multiple versions of content. The ability of embodiments to provide a database system which supports content versioning can enable an efficient and comprehensive storage of content types having different features by the database system. | 05-15-2014 |
Patent application number | Description | Published |
20110296173 | METHOD AND APPARATUS FOR ACHIEVING NONCONFORMANT PUBLIC KEY INFRASTRUCTURES - Method and apparatus are described wherein, in one example embodiment, a public key certificate issued by a certificate authority includes at least one characteristic that conforms to at least one rule established for the operation of a public key infrastructure. An attribute certificate is issued to be used to modify the public key certificate in accordance with information contained in the attribute certificate to create a modified public key certificate wherein the at least one characteristic is modified so as to be non-conformant with the at least one rule. According to one example embodiment, the attribute certificates may be distributed by a certificate authority, or embedded in an application that includes an engine that is used to modify the conforming public key certificate. | 12-01-2011 |
20130124285 | System and Method for Trusted Embedded User Interface for Secure Payments - A security component may be associated with a network-enabled application. The security component may initiate the display of an embedded region of a window drawn according to display information received from a relying party. The security component may define at least a portion of the appearance of the embedded region; the relying party may not define this portion. The embedded region may include customization information configured by a user, and “Card” information received from an assertion provider, indicating how to authenticate user credentials in order to gain access to relying party restricted content. The security component may request authentication of user credentials from the assertion provider, which may be trusted by the relying party. The security component may receive an assertion token from the assertion provider indicating the credentials are authentic. The security component may forward the assertion token to the relying party to gain access to the restricted content. | 05-16-2013 |
20130124425 | System and Method for In-Band Transaction Verification - Various embodiments of a system and method for in-band transaction verification are described. The system and method for in-band transaction verification may include a transaction verification component. The transaction verification component may be configured to provide a transaction confirmation request that includes one or more machine readable resistant security media objects to indicate one or more transaction details for a transaction as well as a confirmation code for confirming the transaction. The transaction verification component may also be configured to receive a response to the confirmation request, such as a response from the user that submitted the transaction request. If the response includes a response code that is the same as the confirmation code, the transaction verification component may complete the transaction. If the response includes a response code that is different than the confirmation code, the transaction verification component may abort the transaction. | 05-16-2013 |
20130124856 | System And Method For A Single Request And Single Response Authentication Protocol - Various embodiments of a system and method for a single request and single response authentication protocol are described. A client may send to an authentication server a request to authenticate the identity of a user attempting to access an electronic document protected by a rights management policy. The single request may be generated according to rights management configuration information included within the document. Such rights management information may include one or more parameters for requesting authentication from an authentication server. In response to the request, an authentication server may send a single response to the client. The single response may include information indicating that the identity is authenticated (e.g., a license to access the document, or an encryption key to decrypt the document). The client system may be configured to, in response to the single response, provide access to the document according to the rights management policy. | 05-16-2013 |
20130125197 | Relying Party Specifiable Format for Assertion Provider Token - A security component may be associated with a network-enabled application. The network-enabled application may request access to restricted content from a relying party (e.g., web site). The security component associated with the network-enabled application may receive authentication policy information from the relying party and send a user's authentication credentials to an assertion provider to authenticate the credentials. The relying party may trust the assertion provider to authenticate user credentials. Upon successful authentication, the assertion provider may return an assertion token to the security component and the security component may sign the assertion token as specified in the authentication policy information. Subsequently, the security token may forward the signed assertion token to the relying party and the relying party may grant access to the restricted content. | 05-16-2013 |
20130125221 | System and Method for Secure Password-Based Authentication - Various embodiments of a system and method for secure password-based authentication are described. The system and method for secure password-based authentication may include an authentication component configured to request and receive authentication from an authenticating system according to a secure password-based authentication protocol. The authentication component may be configured to participate in an attack-resistant password-based authentication protocol such that an attacker who has compromised the authorizing system and/or a communication channel between the authentication component and the authenticating system may not determine a user's password and/or impersonate the user. In one embodiment, the authentication component may be configured to provide its attack-resistant password-based authentication functionality to an application (e.g., through a stand-alone application, plugin, or application extension). For instance, the authentication component may enable a web browser to participate in the attack-resistant password-based authentication protocol in order to access an online bank account from a web server. | 05-16-2013 |
20130125222 | System and Method for Vetting Service Providers Within a Secure User Interface - A security component may be associated with a network-enabled application. The security component may initiate the display of an embedded region of a window drawn according to display information received from a relying party. The security component may define at least a portion of the appearance of the embedded region; the relying party may not define this portion. The security component may send the address of the relying party to a reputation service and query the reputation service about the reputation of the relying party. The reputation service may return reputation information about the relying party. The security component may display an indication of the relying party's reputation. If the reputation information indicates the relying party is reputable, the security component will allow the network-enabled application to exchange information with the relying party. Otherwise, the component may not allow the network-enabled application to exchange data with the relying party. | 05-16-2013 |
20140013119 | DOCUMENT MODIFICATION DETECTION AND PREVENTION - Methods and apparatus, including computer program products, implementing and using techniques for document authentication. An electronic document is presented to a user. The electronic document has data representing a signed state and a current state. A disallowed difference between the signed state and the current state is detected, based on one or more rules that are associated with the electronic document. A digital signature associated with the electronic document is invalidated in response to the detecting. | 01-09-2014 |
20140032902 | Cryptographic binding of multiple secured connections - In some embodiments, a method includes establishing a secured connection between a client device and a subordinate web service of a single sign-on service for a user, using a shared cryptographic key in a cookie stored on the client device that was transmitted over a different secured connection by a master web service of the single sign-on service, as part of authentication of the user for the single sign-on service. | 01-30-2014 |
20140032909 | METHOD AND APPARATUS FOR PUBLIC KEY CRYPTOGRAPHY - Method and apparatus are described wherein, in one example embodiment, a first entity shares a digital file such as a digital image with a second entity, and the first entity and the second entity each use the digital file as a seed to generate identical public/private key pairs using the same key generation procedure, such that both entities hold identical key pairs. The first and second entities may use the key pairs to encrypt, decrypt, or sign and authenticate communications between the entities. | 01-30-2014 |
20140047518 | Secure Portable Store for Security Skins and Authentication Information - A security component may be associated with a network-enabled application. The security component may access a secure store, which may include customization information, which may include one or more graphical user interface customizations defined by a user, and one or more instances of card information. The card information may specify how to authenticate a user's credentials to access a relying party (e.g., web site). The security component may initiate the display of an embedded region of a window drawn by the network-enabled application. At least a part of the appearance of the embedded region of the window may be defined according to the customization information and not by the relying party. The embedded region may provide a user interface for determining user authentication credentials. The customization information and the one or more instances of card information may not be accessible to the relying party. | 02-13-2014 |
20140259166 | TAMPER RESISTANT VIDEO RENDERING - Video media subscribers attempt to circumvent embedded ads in downloads by modifying the media files to render only the content feature. A media program is defined as an integrated set of media files including the requested content feature and the accompanying promotional materials. Media files associated with a particular content feature are stored as an integrated whole, and security tokens computed on selected random portions of the collection of media files that define the media program (content feature and interspersed ads). A hash engine computes a security token on selected blocks of the media files. The security tokens and corresponding metadata are stored in a secure repository. Before rendering the content feature, the hash values are recomputed on the downloaded media program; and compared to the corresponding locations from the stored hash values and metadata. | 09-11-2014 |
Patent application number | Description | Published |
20090086964 | PROVIDING LOCAL STORAGE SERVICE TO APPLICATIONS THAT RUN IN AN APPLICATION EXECUTION ENVIRONMENT - Methods, systems, and apparatus, including medium-encoded computer program products, for providing local storage service to applications that run in an application execution environment. In one aspect, a method includes receiving a request from one of the applications, wherein the request triggers local storage of information; obtaining an encryption key based on identifiers including a first identifier corresponding to the application execution environment, a second identifier corresponding to the one application, and a third identifier corresponding to the computing apparatus; encrypting the information using the encryption key; and storing the encrypted information in the computing apparatus. | 04-02-2009 |
20110083191 | Author Signatures for Legal Purposes - Methods and apparatus, including computer program products, implementing and using techniques for establishing trust in an electronic document. An electronic document is received. State dependent content in the electronic document is identified. The state dependent content is content that is renderable to have a several appearances. The electronic document is presented to a user, which includes disclosing the presence of any identified state dependent content in the electronic document. | 04-07-2011 |
20110185179 | System And Method For Digital Rights Management With A Lightweight Digital Watermarking Component - Various embodiments of a system and method for digital rights management with a lightweight digital watermarking component are described. Embodiments may include methods as well as elements for performing such methods. Such a method may include receiving content onto a computer system; the computer system may include a runtime component configured to consume the content. The method may include receiving a digital watermarking component on the computer system. The digital watermarking component may specify information for generating a digital watermark on the content. The method may include applying a digital watermark to the content with the runtime component in order to generate watermarked content. The digital watermark may be applied by the runtime component in accordance with the digital watermarking component. In various embodiments, the received runtime component may be configured to prevent the received content from being consumed without the digital watermark applied to the received content. | 07-28-2011 |
20120324232 | Author Signatures for Legal Purposes - Methods and apparatus, including computer program products, implementing and using techniques for establishing trust in an electronic document. An electronic document is received. State dependent content in the electronic document is identified. The state dependent content is content that is renderable to have a several appearances. The electronic document is presented to a user, which includes disclosing the presence of any identified state dependent content in the electronic document. | 12-20-2012 |
20130121487 | System And Method For Deterministic Generation Of A Common Content Encryption Key On Distinct Encryption Units - Various embodiments of a system and method for deterministic generation of a common content encryption key on distinct encryption units are described. Embodiments may include, for each given content item of multiple content items that represent one or more portions of a common media object, controlling a different encryption unit of multiple distinct encryption units to i) generate a content encryption key for the given content item based on: a common base secret shared by the multiple distinct encryption units, and an identifier specific to the media object, and ii) encrypt the given content item with the respective content encryption key generated for that content item in order to generate a respective encrypted content item. Each content encryption key generated for a given content item may be equivalent to each other content encryption key such that decryption of each encrypted content item requires a common decryption key. | 05-16-2013 |
20130121489 | System And Method For Providing Content Protection Of Linearly Consumed Content With A Bidirectional Protocol For License Acquisition - Embodiments may include a content provider system configured to provide electronic content that includes multiple encrypted content items to a playback device. A playback device may be configured to acquire root licenses and/or content licenses from a license server; such licenses may cryptographically protect the content items that a playback device receives from a content provider system. In various embodiments, the electronic content may be content that is to be linearly consumed, such as a channel within a broadcast environment. In various embodiments, the playback device may explicitly request a license for one or more of the content items that it receives; such request may be issued to a license server. The license server may evaluate the request and respond to the playback device with the license for a content item. In various embodiments, the playback device may utilize the received license to decrypt and consume the respective content item. | 05-16-2013 |
20130124859 | SYSTEM AND METHOD FOR DIGITAL RIGHTS MANAGEMENT WITH AUTHORIZED DEVICE GROUPS - Various embodiments of a system and method of digital rights management with authorized device groups are described. Various embodiments may include a system including a digital rights management (DRM) component configured to receive a private key of an authorized device group. In various embodiments, the receipt of the private key of the authorized device group may indicate the system is an authorized member of a group of devices permitted to access content items protected by a common public key associated with the authorized device group. In various embodiments the DRM component may be configured to, for each given content item of multiple content items that are encrypted with different content keys, decrypt an encrypted content key from the given content item with the private key of the authorized device group and decrypt content from the given content item with the decrypted content key. | 05-16-2013 |
20130125223 | System And Method For Transparently Authenticating A User To A Digital Rights Management Entity - Various embodiments of a system and method for transparently authenticating a user to a digital rights management entity are described. In various embodiments, a digital rights management server may be configured to receive an authentication token from a first remote computer system. Such authentication token may indicate that a particular user of the first remote computer system was authenticated by a first content provider of one or more content providers. In various embodiments, the digital rights management server may also be configured to verify the authentication token by determining that one or more portions of the authentication token were generated based on respective authentication information issued to the first content provider. In various embodiments, the digital rights management server may also be configured to, in response to verification of the authentication token, issue to the first remote computer system one or more credentials. | 05-16-2013 |
20130132232 | System And Method For Digital Rights Management With Delegated Authorization For Content Access - Various embodiments of a system and method for digital rights management with delegated authorization for content access are described. Such embodiments may include a runtime component configured to receive protected content. The runtime component may be configured to submit a request for a delegation token to a first entity, such as a content merchant or some other entity. The runtime component may be configured to receive the delegation token from the first entity. The runtime component may also be configured to submit a request for a content license for the protected content to a second entity, such as an access coordinator or some other entity. The submitted request may include the received delegation token. The runtime component may be configured to receive the content license from the second entity. The runtime component may also be configured to provide access to the protected content in accordance with the received content license. | 05-23-2013 |
20130132733 | System And Method For Digital Rights Management With System Individualization - Various embodiments of a system and method for digital rights management with system individualization are described. In various embodiments, a DRM component may generate a request for machine-specific credentials specific to the system on which the DRM component is implemented. This request may include device information of component(s) of such system. The DRM component may also receive an encrypted response that includes the machine-specific credentials. This encrypted response may be encrypted with a machine-specific encryption key generated from the device information. In various embodiments the response may be generated by an individualization server that verified the request for machine-specific credentials. The DRM component may also, based on the device information of the system on which the DRM component is implemented, generate an encryption key equivalent to the machine-specific encryption key with which the received response is encrypted. The DRM component may decrypt the encrypted response with the generated encryption key. | 05-23-2013 |
20130166909 | Client-Side Player File and Content License Verification - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for verifying a message based on application of a hashing algorithm. In one aspect, a method includes obtaining a license, from a remote server, for a content item to be presented using a player file executed by a multimedia player on a computing device. The license includes an encryption key and an authorization to present the content item using one or more authorized player files. A particular player file is received for use in presenting the content item, and a determination is made whether the particular player file is authorized for use in presenting the content item based on the authorization. The content item is decrypted using the encryption key, and the content item is presented using the particular player file in accordance with the determination. | 06-27-2013 |
20130212404 | DOCUMENT MODIFICATION DETECTION AND PREVENTION - Methods and apparatus, including computer program products, implementing and using techniques for document authentication. An electronic document is presented to a user. The electronic document has data representing a signed state and a current state. A disallowed difference between the signed state and the current state is detected, based on one or more rules that are associated with the electronic document. A digital signature associated with the electronic document is invalidated in response to the detecting. | 08-15-2013 |
20140289525 | SYSTEM AND METHOD FOR DECENTRALIZED MANAGEMENT OF KEYS AND POLICIES - Various embodiments of a system and method for decentralized management of keys and policies are described. Various embodiments may include a computer system configured to receive a request from a remote computer system associated with a recipient of content. Such request may include an encrypted content encryption key that is encrypted with a packaging key utilized by a packaging entity. The request may also include an identifier identifying the packaging entity. In some embodiments, the request may also include policy information specifying one or more usage rights of the content. The computer system may be configured to, in response to determining the recipient is authorized to access the content, generate the packaging key based on the identifier and a secret root seed, utilize the generated packaging key to decrypt the encrypted content encryption key, and provide the decrypted content encryption key to the remote computer system. | 09-25-2014 |
Patent application number | Description | Published |
20120156819 | GALLIUM NITRIDE-BASED LED FABRICATION WITH PVD-FORMED ALUMINUM NITRIDE BUFFER LAYER - Fabrication of gallium nitride-based light emitting diodes (LEDs) with physical vapor deposition (PVD) formed aluminum nitride buffer layers is described. | 06-21-2012 |
20130174781 | GALLIUM NITRIDE-BASED LED FABRICATION WITH PVD-FORMED ALUMINUM NITRIDE BUFFER LAYER - Fabrication of gallium nitride-based light emitting diodes (LEDs) with physical vapor deposition (PVD) formed aluminum nitride buffer layers is described. | 07-11-2013 |
20130285065 | PVD BUFFER LAYERS FOR LED FABRICATION - Fabrication of gallium nitride-based light devices with physical vapor deposition (PVD)-formed aluminum nitride buffer layers is described. Process conditions for a PVD AlN buffer layer are also described. Substrate pretreatments for a PVD aluminum nitride buffer layer are also described. In an example, a method of fabricating a buffer layer above a substrate involves pre-treating a surface of a substrate. The method also involves, subsequently, reactive sputtering an aluminum nitride (AlN) layer on the surface of the substrate from an aluminum-containing target housed in a physical vapor deposition (PVD) chamber with a nitrogen-based gas or plasma. | 10-31-2013 |
20140089801 | TIMESTAMPED COMMENTARY SYSTEM FOR VIDEO CONTENT - A video commentary system receives video content items from users in a community. Such video content items are presented to viewers in the community. The system presents submission controls through which the viewers can submit feedback related to specific time points within that presentation. The controls can be used to submit textual, video, or audio comments. The controls can include labeled buttons that viewers can activate to submit categorized comments. Each submission is associated with a timestamp corresponding to the current video frame. The user interface includes regions that display, in real-time, the submissions received from the viewers. Submissions can indicate their timestamps. A bar graph indicates, by category and by time interval, quantities of categorized comments that have been received relating to various time intervals in the presentation. | 03-27-2014 |
20140264363 | Oxygen Controlled PVD Aluminum Nitride Buffer for Gallium Nitride-Based Optoelectronic and Electronic Devices - Oxygen controlled PVD AlN buffers for GaN-based optoelectronic and electronic devices is described. Methods of forming a PVD AlN buffer for GaN-based optoelectronic and electronic devices in an oxygen controlled manner are also described. In an example, a method of forming an aluminum nitride (AlN) buffer layer for GaN-based optoelectronic or electronic devices involves reactive sputtering an AlN layer above a substrate, the reactive sputtering involving reacting an aluminum-containing target housed in a physical vapor deposition (PVD) chamber with a nitrogen-containing gas or a plasma based on a nitrogen-containing gas. The method further involves incorporating oxygen into the AlN layer. | 09-18-2014 |