Patent application number | Description | Published |
20090313325 | Distributed Technique for Cascaded Data Aggregation in Parallel Fashion - Methods and apparatus are provided that access and present information associated with dynamic communities in an efficient and highly scalable manner. Dynamic communities are formed based on a trigger, which may be a command, a request for information, or an event notification. An apparatus may receive notification of the trigger and form a dynamic community from one or more data sources, such as social-networking websites and enterprise data sources. Sub-triggers may be generated based on the trigger and the dynamic community. The sub-triggers may be sent from the apparatus. A result may then be generated based on received responses to the sub-triggers. | 12-17-2009 |
20090319648 | Branded Advertising Based Dynamic Experience Generator - Methods and apparatus are provided to provide served ads to one or more clients based on dynamic-community information, ad-related information, service features, service activity, country of origin, and device-related information. Dynamic communities are formed based on a trigger, which may be a command, a request for information, a change in context, or an event notification. After receiving the trigger, a served ad may be piggybacked onto a response to the trigger. The served ad may include graphical, audio, textual, and/or other information. Additionally, served ads may be sent in response to ad requests. A served ad may be selected based on ad-screening rules and/or conflict resolution between advertisers competing to provide the selected ad. | 12-24-2009 |
20100049815 | Programmable and Extensible Multi-Social Network Alert System - Methods, apparatus, and computer-readable media are presented regarding alert processing. An alert may be received or generated with respect to one or more portals, such as social-networking websites, enterprise servers, and other data sources. Requests associated with one or more portals may be received at an MTproxy. The request may come from an MTclient and may include state information about alerts. At the MTproxy, a user monitor thread is generated in response to the request. The user monitor thread may be associated with a user of the MTproxy. One or more alertlets associated with the user monitor thread may be generated. Each alertlet may be associated with a feature, or specific type of information, and a portal. At the alertlet, information concerning the portal may be determined. A mashup may be generated and sent based on the information. | 02-25-2010 |
20130205387 | Method and Apparatus to Authenticate a User to a Mobile Device Using Mnemonic Based Digital Signatures - A user device comprising a processor configured to enable a mnemonic based digital signature scheme for user authentication that is based on a combination of one or more secrets and one or more actions implemented on the user device and associated with the secrets, and a device input system coupled to the processor and configured to detect the actions implemented on the user device. Also disclosed is an apparatus comprising a processor configured to implement a mnemonic based digital signature for authenticating a user, a device input system configured to enable the mnemonic based digital signature, and a memory unit configured to store input data that is used to recognize the mnemonic based digital signature, wherein the mnemonic based digital signature comprises a secret, an action associated with the secret and implemented using the device input system, and a cue associated with the action. | 08-08-2013 |
20140082369 | Method and System For Object Access and Usage Control Using Location and Access Boundary Shape Information - A method and a system for shape based encrypted object usage control using a querying device includes receiving location coordinates information and requesting an access to the encrypted object based on the received location coordinates information. The granting or denying access to the object is based on a determination of whether the received location coordinates information lies within at least one spatial access boundary. The at least one spatial access boundary is defined by an arbitrary physical object shape with at least two dimensional (2D) physical measurements in direct reference to designated location coordinates information. The received location coordinates information and the designated location coordinates information each includes longitude, latitude and optionally elevation values which provide the ability to identifying a specific location in a 3D space. | 03-20-2014 |
20140100835 | User Behavior Modeling for Intelligent Mobile Companions - An apparatus for modeling user behavior comprising at least one sensor for sensing a parameter, a memory, a processor coupled to the sensor and the memory, wherein the memory contains instructions that when executed by the processor cause the apparatus to collect a first data from the sensor, fuse the sensor data with a time element to obtain a context-feature, determine a first state based on the context-feature, record the first state in a state repository, wherein the state repository is configured to store a plurality of states such that the repository enables time-based pattern identification, and wherein each state corresponds to a user activity, incorporate information stored in the state repository into a behavior model, and predict an expected behavior based on the behavior model. | 04-10-2014 |
20140281018 | Dynamic Optimization of TCP Connections - Transport control protocol (TCP) parameters can be dynamically selected to increase communication network performance. The TCP parameters may be selected before usage or at start-up such that a TCP connection is dynamically configured/re-configured prior to transporting the traffic flow over the network. The TCP connection parameters may be selected in accordance with a traffic characteristic, a network characteristic, a history of traffic activity, expected loads, desired throughput and latency or some other selection criteria. TCP parameters may also be selected after beginning to transport traffic flows over the network. More specifically, transportation of a traffic flow over the network may begin immediately using default TCP parameters, with the TCP parameters being updated or selected only upon the occurrence of a congestion or triggering condition. Further, multiple clients may share a set of persistent time-shared TCP connections. | 09-18-2014 |
20140334296 | Aggressive Transmission Control Protocol (TCP) Retransmission - Selectively ignoring congestion conditions may allow for more efficient transmission control protocol (TCP) communication in instance where reducing the transmission rate for a flow will not meaningfully mitigate congestion in the network or is otherwise undesirable. By way of example, congestion conditions may be ignored when a specific type of traffic flow is being communicated (e.g., short flows, high priority flows, etc.), when a traffic flow is being communicated at a low transmission rate, when a traffic flow is destined for certain type of network (e.g., a wireless network, etc.), or during any other situation in which reducing the transmission rate is undesirable. In some networks, a transmission rate is maintained until a certain number of duplicate ACKs are received (e.g., three duplicate ACKs, etc.) in order to ensure that congestion is indeed present before reducing quality of service (QoS). | 11-13-2014 |
20140355623 | Transmission Control Protocol (TCP) Connection Control Parameter In-Band Signaling - Destination endpoints can use in-band signaling to adjust TCP parameters, to adjust entries in history and profile tables, to initialize a transition to an in-band communication mode, or to communicate short flows and/or alerts to a mobile device. A destination endpoint achieves in-band singling by embedding sequence number patterns in acknowledgement (ACK) messages, or by transmitting ACK messages (duplicates or otherwise) in accordance with an ACK sequence pattern. The sequence number or ACK sequence pattern can be pre-associated with any in-band communication message, such as a request to adjust TCP parameters, the reporting of a network or triggering condition, a request to adjust entries in a history or profile table, an indication to transition from a normal communication mode to an in-band communication mode, etc. | 12-04-2014 |