Patent application number | Description | Published |
20110283099 | Private Aggregation of Distributed Time-Series Data - Techniques are described herein for privately aggregating distributed time-series data. A requestor provides a query sequence to users. Each user evaluates the query sequence on the user's time-series data to determine an answer sequence. Each user transforms its answer sequence to another domain, adds noise, and encrypts it for further processing by the requestor. The requestor combines these encrypted sequences in accordance with a homomorphic encryption technique to provide an encrypted summation sequence. The requestor provides the encrypted summation sequence to at least some of the users, who may in turn provide respective decryption shares to the requestor. The requestor combines the decryption shares in an effort to decrypt the encrypted summation sequence. Decrypting the encrypted summation sequence provides a summation of the encrypted sequences from the users, which may be transformed back to the original domain to estimate a summation of the answer sequences of the users. | 11-17-2011 |
20120280035 | MAGNETIC STRIPE-BASED TRANSACTIONS USING MOBILE COMMUNICATION DEVICES - Magnetic stripe-based transaction enabled mobile communication device embodiments are presented which generally involve a mobile communication device which has been configured to perform transactions that heretofore were completed using a magnetic stripe found on magnetic-stripe cards. In one general embodiment, a mobile communication device generates magnetic stripe data which is used to perform a magnetic stripe-based transaction. To this end, the mobile communication device includes a magnetic stripe device and a computing device. The computing device stores the magnetic stripe data, and the magnetic stripe device is employed to transfer the stored magnetic stripe information so that it can be used to conduct transactions as if a traditional magnetic stripe card were being used. | 11-08-2012 |
20120284194 | SECURE CARD-BASED TRANSACTIONS USING MOBILE PHONES OR OTHER MOBILE DEVICES - A “Portable Card Generator” is implemented within a portable device, such as a mobile phone, and provides various techniques for writing secure account information from user selected accounts to a “wildcard” having rewritable magnetic stripes, rewritable RFID tags, and/or rewritable smartcard circuitry. The account information is retrieved by the portable device from local or remote stores of user accounts. Once that account information is written, the wildcard is then available for immediate use for credit card or debit-type payments, loyalty card use, etc. Consequently, by providing a credit card sized object having a rewriteable magnetic stripe, RFID tag, and/or smartcard circuitry, in combination with account information for various credit cards, debit cards, consumer loyalty cards, insurance cards, ID cards or badges, etc., the user is no longer required to physically carry those cards in order to use the corresponding accounts within existing card-based infrastructures. | 11-08-2012 |
20130159237 | METHOD FOR RULE-BASED CONTEXT ACQUISITION - Methods and systems for rule-based context acquisition are disclosed herein. The method includes accepting a request for target context from an application at a context acquisition system and identifying context rules relating to the target context using a rule-based inference cache. The method also includes determining an inferred value of the target context based on previously-acquired contexts and the context rules. If the inferred value of the target context cannot be determined, the method further includes executing a first step of a sensing plan for acquiring an inferred value of the target context using a rule-based acquisition planner, as well as executing any of a number of subsequent steps of the sensing plan until the inferred value of the target context is obtained. | 06-20-2013 |
20140189086 | COMPARING NODE STATES TO DETECT ANOMALIES - Methods, systems, and computer storage media for detecting anomalies within nodes of a data center are provided. A self-learning system is employed to proactively and automatically detect the anomalies using one or more locally hosted agents for pulling information that describes states of a plurality of nodes (e.g., computing devices of a cloud-computing infrastructure), respectively, and using at least one early-warning mechanism for implementing a comparison technique. The comparison technique involves individually comparing the state information of the plurality of the nodes against one another and, based upon the comparison, grouping one or more nodes of the plurality of nodes into clusters that exhibit substantially similar state information. Upon identifying the clusters that include low number of nodes grouped therein, with respect to a remainder of the clusters of nodes, the members of the identified clusters are designated as anomalous machines. | 07-03-2014 |
20140236919 | EXECUTING A FAST CRAWL OVER A COMPUTER-EXECUTABLE APPLICATION - Technologies related to crawling computer-executable applications are described. A full crawl is executed over an application, where executing the full crawl includes causing the application to output a plurality of pages. The application retrieves content from the World Wide Web when generating the pages for output. Thereafter, a fast crawl is executed over the application, where executing the fast crawl takes less time when compared to the time needed to execute the full crawl. | 08-21-2014 |
20140335920 | METHOD FOR RULE-BASED CONTEXT ACQUISITION - Methods and systems for rule-based context acquisition are disclosed herein. The method includes accepting a request for target context from an application at a context acquisition system and identifying context rules relating to the target context using a rule-based inference cache. The method also includes determining an inferred value of the target context based on previously-acquired contexts and the context rules without initializing sensor procedures as a result of the request. | 11-13-2014 |