Patent application number | Description | Published |
20110306959 | INTRAVASCULAR ARTERIAL TO VENOUS ANASTOMOSIS AND TISSUE WELDING CATHETER - A device for creating an arteriovenous (AV) fistula comprises an elongate member, a distal member connected to the elongate member and movable relative to the elongate member, and a heating member disposed on at least one of the movable distal member and the elongate member. The distal member comprises structure for capturing tissue to be cut to create the fistula, and the heating member is adapted to cut through the tissue to create the fistula. The elongate member comprises an elongate outer tube. A shaft connects the distal member to the elongate member, and is extendable and retractable to extend and retract the distal member relative to the elongate member. | 12-15-2011 |
20130123827 | SYSTEMS AND METHODS FOR PERCUTANEOUS INTRAVASCULAR ACCESS AND GUIDEWIRE PLACEMENT - A device for allowing passage of a guidewire from a primary blood vessel to an adjacent secondary blood vessel includes a main body having a primary lumen and a secondary lumen, and a piercing member disposed in the secondary lumen, and configured to be moved distally out of the secondary lumen, and to pierce through tissue while being distally moved. A third lumen located within the piercing member is configured to allow placement of a guidewire from the primary blood vessel to the adjacent secondary blood vessel. In one embodiment, the secondary lumen is configured to allow articulation of the distal end of the piercing element. The piercing member has a sharp point on one end to facilitate cutting a small communicating aperture from the primary blood vessel to the secondary blood vessel. | 05-16-2013 |
20130281998 | INTRAVASCULAR ARTERIAL TO VENOUS ANASTOMOSIS AND TISSUE WELDING CATHETER - A catheter-based device tracks over a guidewire which has been placed from a first blood vessel into a second blood vessel. The distal tip of the catheter is advanced into the second vessel while a proximal member remains in the first vessel. Matching blunt tapered surfaces on each of the distal tip and the proximal member are clamped together, with adjacent walls of each vessel between them, after which a known, controlled pressure is applied between the two surfaces. Heat energy is then applied to the blunt surfaces for approximately 1-30 seconds to weld the walls of the two vessels together. After coaptation of the vessel walls, the heat is increased to then cut through the vessel walls to create a fistula of the desired size. | 10-24-2013 |
20140142561 | INTRAVASCULAR ARTERIAL TO VENOUS ANASTOMOSIS AND TISSUE WELDING CATHETER - A device for creating an arteriovenous (AV) fistula includes a proximal base having a distal tapered end surface and a distal tip connected to the proximal base and movable relative to the proximal base. The distal tip has a proximal tapered end surface. A first heating assembly, including an energized heating element, is disposed on at least one of the distal tapered end surface and the proximal tapered end surface. A second heating assembly, comprising a passive non-energized heat spreader, is disposed on the other one of the distal tapered end surface and the proximal tapered end surface. The distal tapered end surface and the proximal tapered end surface are adapted to contact opposing sides of a tissue portion to create the fistula. The taper of the proximal tapered end surface matches the taper of the distal tapered end surface, so that the two surfaces match one another and fully engage with one another when engaged. | 05-22-2014 |
Patent application number | Description | Published |
20090257512 | Error Concealment for MPEG Decoding with Personal Video Recording Functionality - Error concealment for motion picture expert group (MPEG) decoding with personal video recording functionality. Error concealment of MPEG data may take place within various components within playback, recording, reading and writing data systems. The error concealment may be provided within existing systems whose components may not be capable of accommodating errors within MPEG data. In certain embodiments, the available data that contain no errors is maximized to conceal those portions of the data that do include errors. Various layers may be accommodated while performing error concealment, including the MPEG transport stream layer, the video layer, and the audio layer. | 10-15-2009 |
20100290759 | METHOD AND APPARATUS TO FACILITATE THE EFFICIENT IMPLEMENTATION OF TRICK MODES IN A PERSONAL VIDEO RECORDING SYSTEM - A method and apparatus are disclosed for facilitating efficient operation of trick modes in a personal video recording (PVR) system. Stream-navigation data from a data stream is captured and pre-processed to generate a frame-correlated NAV table comprising one entry for each frame within the data stream, during recording of the data stream. The stream-navigation data comprises start code data, content rating data, and conditional access data that is embedded in the data stream. During playback of the data stream in a user-selected trick mode, the frame-correlated NAV table is used to generate command packets that are sent to a data decoder along with selected frames of the data stream. The selected frames are decoded based on information in the command packets and certain selected frames may be displayed as part of the trick mode. | 11-18-2010 |
20110013887 | Command packets for personal video recorder - Command packets for a personal video recorder that provides for a transport stream (TS) that contains data and also includes a transport packet (TP)/TS formatted command packets. The TP/TS formatted command packet may be communicated between any number of devices, including multiple chips, multiple boards, and multiple processors. A decoder is able to decode the TP/TS formatted command packet and to perform the appropriate operation on data portions of the TS. When a TS is provided to a device not having the capability to perform the proper decoding of the TP/TS formatted command packet, that particular packet may be deemed as being unidentified (or unknown) adaptation field data. Alternatively, the packet may be identified as being corrupted data and/or irrelevant data. | 01-20-2011 |
20130308927 | APPARATUS AND METHOD OF SEAMLESS SWITCHING BETWEEN A LIVE DTV DECODING AND A PVR PLAYBACK - Methods and apparatus for switching between a live video decoding and a recorded playback in a digital video and recording system. A received video data stream is transmitted to a first-in first-out video decoder buffer without first looping the video data stream through a playback buffer. The video data stream is transmitted from the video decoder buffer to a video decoder. If a “pause” command is received, the video data stream is transmitted to a first-in first-out playback buffer, while continuing to transmit the video data stream to the video decoder buffer. Transmission of the video data stream to the video decoder buffer is halted when the video decoder buffer fills up. The last byte of the video data stream that was transmitted to the video decoder buffer is marked. If a “play” command is received, the video data stored in the video decoder buffer is transmitted to the video decoder. The video data stored in the playback buffer is transmitted to the video decoder buffer starting at a point immediately after the data element that was marked previously. | 11-21-2013 |
Patent application number | Description | Published |
20130033642 | DATA TRANSMISSION ACROSS INDEPENDENT STREAMS - Various systems and methods are provided for transmission of related data components across independent streams. In one embodiment, among others, a transmitting device may separate transmission data into related data components and transmit each related data component in an associated transport stream. Each related data component includes a synchronization tag associated with synchronization of the related data component within the transmission data. In another embodiment, a receiving device may receive related data components transmitted in separate transport streams and decode the related data components based at least in part upon a synchronization tag included in each related data component. In another embodiment, among others, a method for includes receiving data components transmitted on a plurality of transport streams, separating related data components from unrelated data components in the transport streams based at least in part upon a synchronization tag of each related data component; and decoding the related data components. | 02-07-2013 |
20130044237 | High Dynamic Range Video - Disclosed are various embodiments of high dynamic range (HDR) video. In one embodiment a method includes obtaining first and second frames of a series of digital video frames, where the first and second frames have different exposure levels. The second frame is reregistered with respect to the first frame based at least in part upon motion estimation, where the motion estimation accounts for the different exposure levels of the first and second frames, and the first frame is combined with the reregistered second frame to generate an HDR frame. In another embodiment, a video device includes means for attenuating the exposure of a video frame captured by an image capture device and an HDR converter configured to combine a plurality of digital video frames to generate an HDR frame, where each digital video frame combined to generate the HDR frame has a different exposure level. | 02-21-2013 |
20130163957 | System and Method for Fingerprinting Video - Disclosed are various embodiments of generating video fingerprints. Scene changes can be detected in a video and a video fingerprint generated based upon a time at which the scene change occurs as well as time intervals between the scene changes relative to adjacent scene changes. A video can be captured and analyzed by comparing scene changes detected in the video to those described by the video fingerprint. | 06-27-2013 |
20130330057 | System and Method for Fingerprinting Video - Disclosed are various embodiments of generating video fingerprints. Scene changes can be detected in a video and a video fingerprint generated based upon a time at which the scene change occurs as well as time intervals between the scene changes relative to adjacent scene changes. A video can be captured and analyzed by comparing scene changes detected in the video to those described by the video fingerprint. | 12-12-2013 |
20140165123 | METHOD AND SYSTEM FOR PROVIDING DYNAMIC TIME SLICE ENCODING FOR COMPLETE INTERNET ANYWHERE - A server may be used to handle at least some of processing of content retrieved via and/or derived from Internet access operations of a plurality of set-top boxes (STBs). Resource allocation and/or utilization, and/or tasks or applications performed in the server during the processing may be configured based on control data, which may be determined by the server and which may comprise capabilities of links between the server and each of the plurality of STBs, requirements of the tasks, characteristics of the content and/or the Internet access operations, user preferences and/or interactions, and/or content provider preferences. The server may dynamically reconfigure the tasks and/or resources based on monitoring of its operations and/or changes of the control data. Configuring tasks and/or resources may comprise time slicing access to resources that are commonly used during concurrent servicing of at least some of the plurality of STBs by the support server. | 06-12-2014 |
20140178036 | METHOD OF TIMEBASE MANAGEMENT FOR MPEG DECODING WITH PERSONAL VIDEO RECORDING FUNCTIONALITY - Disclosed are various embodiments that facilitate recording to a storage medium in a personal video recorder (PVR) system. In one embodiment, a transport stream is received. The transport stream is stored into a memory. An index table is generated that provides information for locating particular frames recorded in the memory. | 06-26-2014 |
Patent application number | Description | Published |
20120212575 | GATEWAY/STB INTERACTING WITH CLOUD SERVER THAT PERFORMS HIGH END VIDEO PROCESSING - A gateway includes a communications interface and processing circuitry and establishes communications with at least one service provider device and with a serviced client device. The gateway receives video on demand instructions from the serviced client device and transmits the video on demand instructions to the cloud server. The gateway then receives streamed video content from the cloud server, the streamed video content video processed based upon the video on demand instructions and, during some operations the streamed video content having video on demand icons formed therein. The gateway then transmits the streamed video content to the serviced client device. The advanced video processing instructions may be three-dimensional processing instruction, texturing, or another type of advanced video processing. The cloud server may also service a Video on Demand session for the serviced client device. | 08-23-2012 |
20120215833 | GATEWAY/SET TOP BOX IMAGE MERGING FOR DELIVERY TO SERVICED CLIENT DEVICE - A gateway includes at least one communications interface and processing circuitry and establishes communications with at least one service provider device and with a serviced client device. The gateway receives serviced client device display structure instructions, first streamed content from a service provider device, and second streamed content from a cloud server, the second streamed content based upon an Internet session hosted by the cloud server. Based upon the serviced client device display structure instructions, the gateway combines the first streamed content with the second streamed content to form merged streamed content and transmits the merged streamed content to the serviced client device. In another operation the gateway forwards the first streamed content to a first client device and the second streamed content to a second client device based upon the serviced client device display structure instructions. | 08-23-2012 |
20120215834 | CLOUD SERVER/THIN CLIENT/GATEWAY SELECTIVE BROWSER INSTANTIATION - A gateway having at least one communications interface and processing circuitry establishes communications with at least one service provider device and at least one serviced client device. The gateway then determines that a serviced client device is to establish an Internet browsing session. Based upon characteristics of the serviced client device, the gateway determines where to instantiate a web browser to service the Internet browsing session. Based upon the determination, in a first operation, instantiates the web browser to service the Internet browsing session at the gateway or client device. In a second operation, the gateway instantiates the web browser to service the Internet browsing session at a service provider server. In other operations, the gateway may determine to instantiate a browser for a first client device at a cloud server and to instantiate a browser for a second client device either locally or at the second client device. | 08-23-2012 |
20120216232 | SET TOP BOX VIDEO STREAM MERGING/PASS THROUGH - A gateway includes a communications interface and processing circuitry and establishes communications with at least one service provider device and with a serviced client device. The gateway receives serviced client device display structure instructions from a cloud server. The gateway then receives first streamed content from the cloud server, the first streamed content comprising images of an Internet session hosted by the cloud server and having a video program hole formed therein. The gateway receives second streamed content from the cloud server, the second streamed content comprising a video program corresponding to the video program hole of the first streamed content. Based upon the serviced client device display structure instructions, the gateway combines the first streamed content with the second streamed content to form merged streamed content and transmits the merged streamed content to the serviced client device. The client device may alternately receive and merge the video streams. | 08-23-2012 |
20130091209 | AD HOC SOCIAL NETWORKING - An Ad Hoc social networking environment enables information and device access management between social networking groups and social networking members with or without access restrictions and anonymity. Contact and access information can be exchanged and updated on the fly without requiring users to notify other contacts or contacting devices and can support underlying contact information changes, enable extemporaneous termination or modification of contact access, enable temporary access, and the like. Ad Hoc social networking can utilize unique identifiers, proxy elements, or the like to support various levels of membership anonymity and Ad Hoc social networking. Proxy elements enable SNET tear down or dissolution by retracting the proxy service from a member. Storing social group contact information in shared databases can enable sharing and updating of contact information without the need to inform affected contacts. Some social networks can include various specialized devices and related services. | 04-11-2013 |
20130091211 | SOCIAL NETWORKING GROUPING HIERARCHY - A social networking environment enables interaction between social networking (SNET) groups. Some interactions between SNET groups can include docking various SNET groups based upon interactions between a member and some part of a social network. Various hierarchies of social networking infrastructure can enable hierarchical interactions between social devices, SNET groups, and other elements associated with various social networking infrastructures. Capabilities provided by various elements in various SNET infrastructures can be docked to create combined SNET groups, and capabilities provided by an SNET group can be accessed via interaction with a representative view of the capabilities. Various interactions can be managed based upon inputs, trigger events, authorizations, and the like provided by various processing systems, devices, members, or the like. Various interactions can enable members associated with an SNET infrastructure to access capabilities provided by an SNET group via a docked SNET group. | 04-11-2013 |
20130091213 | MANAGEMENT OF SOCIAL DEVICE INTERACTION WITH SOCIAL NETWORK INFRASTRUCTURE - A social networking system enables interaction between various devices, infrastructures, and the like based upon monitoring, analysis, processing, and the like of information received from devices. Some or all of an infrastructure can monitor information output from one or more socially controllable devices. Upon receiving a trigger or determining a trigger event processing of received data, some or all of the infrastructure, supporting processing systems, and the like can take one or more various responsive actions, including contacting a user associated with the social devices, contacting a third party that is not a member of the social network group, contacting a service that is a member of the group, and controlling or enabling others to control aspects of devices docked with the user's group. A user can manage various levels of authorized interaction between associated devices and a docked social group. | 04-11-2013 |
20130091214 | MEDIA SOCIAL NETWORK - A social networking system enables sharing of content between various members, devices, infrastructures, and the like based upon membership in a social network (SNET group). Content can be protected by limiting access to the content to members of an SNET group, members associated with various devices docked to the SNET group, and the like. Joint access of content by various members of an SNET group can be managed to ensure synchronized access of content and interactions between SNET accessing group members. Instances of a content item can be distributed to multiple destination devices associated with an SNET group, where various instances are transcoded to accommodate varying capabilities and characteristics of various communication pathways and the destination devices and ensure synchronized access of the content item by the multiple destination devices. Interactions between members of an SNET group can be managed to leverage links to other SNET groups. | 04-11-2013 |
20130091540 | SOCIAL DEVICE SECURITY IN A SOCIAL NETWORK - A social network (SNET) is divided into one or more circles employing separate security secrets, e.g. keys, for communication between members. A device can be a member of more than one circle, and store different keys for each of those circles in separate, restricted portions of memory. When a member leaves a circle, new keys can be generated and distributed to the remaining members. Before and after joining a circle, a level of trust associated with the device or human member can be determined based on third party trust verification and a trust history. A requirement for multiple current circle members to vouch for the prospective member can be imposed as a condition of membership. Each circle can be assigned different trust and access levels, and authorization to receive information can be checked before transmitting information between circles. | 04-11-2013 |
20130091582 | CONTENT SECURITY IN A SOCIAL NETWORK - Members of a social network (SNET) circle can share content with other members of SNET circle, members of the same SNET that are not members of the same circle, or send content to people or devices outside of SNET. Different levels of content security can be applied to the shared content, depending on who requests the content, the destination of the content, user preferences, content type, SNET, SNET circle, or other security parameters. Content can be tagged to limit the number of times it can be accessed, the length of time access is allowed, and to otherwise control redistribution. Content can also be protected by limiting host network access to the content, implementing SNET circle firewalls and virtual private networks, or transcoding content before allowing transmission to non-SNET circle or SNET members. Docking of devices into an SNET security circle can be restricted to properly secured devices. | 04-11-2013 |
20140115580 | Set Top Box Application in a Concurrent Dual Environment - A set top box or like device utilizing virtualization techniques to isolate secure device resources from an untrusted software framework incorporated in the device. In one implementation, a first virtual machine container is provided for secure execution of a traditional set top box application, while a second virtual machine container is utilized to host a software framework or untrusted portions of a software framework. A secure access client/server interface is provided to support interactions between the first and second virtual machine containers. The software framework may comprise, for example, an Android framework supported by an underlying Linux operating system environment and isolated in a Linux resource container. Virtual container constructs in various embodiments may employ varying levels of hardware sandboxing, including use of dedicated processing resources in multi-processor environments. In further embodiments, the software framework may be partitioned into trusted and untrusted portions that are executed in separate virtual containers. | 04-24-2014 |
20140115623 | Integration of Untrusted Framework Components With a Secure Operating System Environment - A set top box or like device incorporating an untrusted software framework as a client of a secure operating system kernel. The software framework may comprise, for example, an Android framework supported by an underlying Linux operating system environment having a secure kernel. The software framework can be executed using a variety of process isolation techniques depending on performance and isolation requirements. A secure access client/server interface may also be provided to support interactions between the untrusted software framework (and applications utilizing the untrusted software framework) and secure or trusted portions of the device. The secure access interface can be configured to perform operations such as handle validation, heap pointer validation, non-pointer parameter validation, heap isolation, and resource release relating to terminated processes. In further embodiments, a software framework aggregator is used to support a plurality of additional software frameworks for use in the set top box. | 04-24-2014 |
20140115718 | Set Top Box Architecture With Application Based Security Definitions - A media processing device, such as a set top box, having selectable hardware and software components for forming media pathways compliant with security definitions provided by downloaded or preinstalled software applications. Such applications may include, for example, a downloadable conditional access security or DRM element/definition. A corresponding certification process can entail certifying a portion of an overall secure pathway, with one or more applications providing the final portion of the certification. Alternatively, predefined conditional access mechanisms are provided, with an application establishing which mechanism is to be used. In various embodiments, a set top box or resident software application may exchange capabilities with other devices in a media consumption network to compare against the requirements of the software application. Once the information exchange is complete, the software application may select which one or more modes of operation or media pathways, if any, that it will permit. | 04-24-2014 |
20150154405 | TRUST CHAINS IN A SOCIAL NETWORK - Members of a social network (SNET) circle can share content with other members of SNET circle, members of the same SNET that are not members of the same circle, or send content to people or devices outside of SNET. Trust chain can be used alone or in conjunction with other security measures to assign or select an appropriate level of content protection and SNET access. A trust rating or level associated with a trusted human member can be conferred to a social network device, allowing that device to be included in the trust chain. Trust can also be conferred from a trusted social network device to a child device of the social network device. A trust processing module can work in cooperation with one or more trust authorities to establish initial and updated overall trust levels of a human or device associated with the SNET. | 06-04-2015 |