This website is currently dormant!

API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

Uptrends

Uptrends is the ultimate monitoring tool to stay in control of the uptime, performance, and functionality of your websites, APIs, and servers.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

Systems and methods for providing client-side dynamic redirection to bypass an intermediary

The present invention is directed towards systems and methods for dynamically redirecting on a client communications of the client with a server to bypass an intermediary that is determined to be unavailable for such communications. An acceleration program on the client establishes a transport layer connection between the client and server, and intercepts communications of the client to the server. The transport layer connection may be established via an intermediary, such as a gateway, proxy or appliance. If the client-side acceleration program determines the intermediary is not available for communicating by the client to the server, the acceleration program automatically establishes a second transport layer connection to the server in order to bypass the intermediary. The acceleration program then transmits the intercepted communications of the client via the second transport layer connection to the server. The acceleration program may automatically redirect intercepted communications of the client to the server transparently to any user or application of the client.

  • Pub Date: 2005/30/12
  • Number: 08706877
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing client-side accelerated access to remote applications via TCP pooling

The present invention is directed towards systems and methods for dynamically deploying and executing acceleration functionality on a client to improve the performance and delivery of remotely accessed applications. In one embodiment, the client-side acceleration functionality is provided by an acceleration program that performs a transport layer connection pooling technique for improving performance of communications and delivery of a remotely-accessed application. The acceleration program establishes a transport layer connection from the client to the server that can be used by multiple applications on the client, or that is otherwise shared among applications of the client. The acceleration program maintains the transport layer connection open to reduce the number of transport layer connection requests and number of transport layer connections established with the server for an application or multiple applications running on the client.

  • Pub Date: 2005/30/12
  • Number: 08700695
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing

The present invention is directed towards systems and methods for dynamically deploying and executing acceleration functionality on a client to improve the performance and delivery of remotely accessed applications. In one embodiment, the client-side acceleration functionality is provided by an acceleration program that performs a transport layer connection multiplexing technique for improving performance of communications and delivery of a remotely-accessed application. The acceleration program establishes a transport layer connection from the client to the server that can be used by multiple applications on the client, or that is otherwise shared among applications of the client. The acceleration program multiplexes requests from one or more applications via the same transport layer connection maintained by the acceleration program. As such, the acceleration program can utilize the idle time of one application in using the transport layer connection to service a request of a second application through the same transport layer connection.

  • Pub Date: 2005/30/12
  • Number: 08549149
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing client-side accelerated access to remote applications via TCP buffering

The present invention is directed towards systems and methods for dynamically deploying and executing acceleration functionality on a client to improve the performance and delivery of remotely accessed applications. In one embodiment, the client-side acceleration functionality is provided by an acceleration program that performs a transport layer connection buffering technique for improving performance of communications and delivery of a remotely-accessed application. The acceleration program establishes a transport layer connection from the client to the server and buffers requests of the client based on determining a difference between a rate of consumption of responses received by the client from a server and a rate of production of requests transmitted by the client to the server. As such, the acceleration program can throttle transmissions of the client if the client's rate of consumption falls behind the rate of submission of requests.

  • Pub Date: 2005/30/12
  • Number: 08954595
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for automatic installation and execution of a client-side acceleration program

The present invention is directed towards systems and methods for dynamically deploying and executing an acceleration program on a client to improve the performance and delivery of remotely accessed applications. The acceleration program of the present invention is automatically installed and executed on a client in a manner transparent to and seamless with the operation of the client. An appliance may intercept a request of the client to establish a communication session or connection with a server, and transmit the acceleration program to the client. In some cases, the appliance determines whether the application being accessed by the client can be accelerated and only provides the acceleration program if the application can be accelerated. Upon receipt of the acceleration program, the client automatically performs a silent installation of the acceleration program and executes the acceleration program upon completion of the installation.

  • Pub Date: 2005/30/12
  • Number: 07810089
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program product for general environment mapping

A reflection image and an environment map are loaded into memory. During rendering of an object, an environment texture sample is retrieved from the environment map based on a reflection vector stored in a pixel of the reflection image. The retrieved environment texture sample is then applied to the object. The object thus rendered is stored in a frame buffer.

  • Pub Date: 2005/30/12
  • Number: 2024054
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for performing granular invalidation of cached dynamically generated objects in a data communication network

The present invention is directed towards a method and system for providing granular timed invalidation of dynamically generated objects stored in a cache. The techniques of the present invention incorporates the ability to configure the expiration time of objects stored by the cache to fine granular time intervals, such as the granularity of time intervals provided by a packet processing timer of a packet processing engine. As such, the present invention can cache objects with expiry times down to very small intervals of time. This characteristic is referred to as “invalidation granularity.” By providing this fine granularity in expiry time, the cache of the present invention can cache and serve objects that frequently change, sometimes even many times within a second. One technique is to leverage the packet processing timers used by the device of the present invention that are able operate at time increments on the order of milliseconds to permit invalidation or expiry granularity down to 10 ms or less.

  • Pub Date: 2005/30/12
  • Number: 08301839
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for performing flash crowd caching of dynamically generated objects in a data communication network

The present invention is directed towards a “flash crowd” technique for handling situations where the cache receives additional requests, e.g.,. nearly simultaneous requests, for the same object during the time the server is processing and returning the response object for a first requester. Once all such nearly simultaneous requests are responded to by the cache, the object is flushed from the cache, with no additional expire time or invalidation action needed. This technique of the present invention enables data to be cached and served for very small amounts of time for objects that would otherwise be considered non-cacheable. As such, this technique yields a significant improvement in applications that serve fast changing data to a large volume of concurrent users, such, for example, as real time stock quotes, or a fast evolving news story.

  • Pub Date: 2005/30/12
  • Number: 07921184
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for performing flash caching of dynamically generated objects in a data communication network

The present invention is directed towards a method and system for providing a technique referred to as flash caching to respond to requests for an object, such as a dynamically generated object, from multiple clients. This technique of the present invention uses a dynamically generated object stored in a buffer for transmission to a client, for example in response to a request from the client, to also respond to additional requests for the dynamically generated object from other clients while the object is stored in the buffer. Using this technique, the present invention is able to increase cache hit rates for extremely fast changing dynamically generated objects that may not otherwise be cacheable.

  • Pub Date: 2005/30/12
  • Number: 08255456
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network

The present invention is directed towards a method and system for modifying by a cache responses from a server that do not identify a dynamically generated object as cacheable to identify the dynamically generated object to a client as cacheable in the response. In some embodiments, such as an embodiment handling HTTP requests and responses for objects, the techniques of the present invention insert an entity tag, or “etag” into the response to provide cache control for objects provided without entity tags and/or cache control information from an originating server. This technique of the present invention provides an increase in cache hit rates by inserting information, such as entity tag and cache control information for an object, in a response to a client to enable the cache to check for a hit in a subsequent request.

  • Pub Date: 2005/30/12
  • Number: 07849269
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for associating keywords with a web page

A web page optimization engine for optimizing a web page is described. The web page optimization engine includes a keyword mapping engine configured to generate a keyword map including a listing of keywords, where each keyword is associated with one or more web pages. The web page optimization engine further includes a map reversal engine configured to generate a web page map including a listing of web page subject matters, where each web page subject matter is associated with one or more keywords based on the associations from the keyword map. The web page optimization engine yet further includes a web page generation engine configured to generate a web page for a web page subject matter in the web page map to include at least one of the one or more keywords for that web page subject matter.

  • Pub Date: 2005/30/12
  • Number: 09141713
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for an automated project office and automatic risk assessment and reporting

In the automation of project risk identification, various qualitative and quantitative measures are combined to report a project's risk level, areas, and mitigation in an automatic and objective manner. The software package includes a risk assessment and report framework and a risk engine, a portfolio analysis, a project plan validator, an integrated project management office toolkit and process asset library, and an integrated skills tracking, locating and availability module with a skills engine.

  • Pub Date: 2005/30/12
  • Number: 08041647
  • Owner: Computer Aid Inc.
  • Location: Allentown, US
  • Details: Visit USPTO

Visit USPTO Page


Runtime adaptable search processor

A runtime adaptable search processor is disclosed. The search processor provides high speed content search capability to meet the performance need of network line rates growing to 1 Gbps, 10 Gbps and higher. The search processor provides a unique combination of NFA and DFA based search engines that can process incoming data in parallel to perform the search against the specific rules programmed in the search engines. The processor architecture also provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide packet inspection through Layer 7. Further, a runtime adaptable processor is coupled to the protocol processing hardware and may be dynamically adapted to perform hardware tasks as per the needs of the network traffic being sent or received and/or the policies programmed or services or applications being supported. A set of engines may perform pass-through packet classification, policy processing and/or security processing enabling packet streaming through the architecture at nearly the full line rate. A high performance content search and rules processing security processor is disclosed which may be used for application layer and network layer security. Scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to/from an additional memory. An application running on an initiator or target can in certain instantiations register a region of memory, which is made available to its peer(s) for access directly without substantial host intervention through RDMA data transfer. A security system is also disclosed that enables a new way of implementing security capabilities inside enterprise networks in a distributed manner using a protocol processing hardware with appropriate security features.

  • Pub Date: 2005/30/12
  • Number: 07685254
  • Details: Visit USPTO

Visit USPTO Page


RSS feed generator

A really simple syndication (RSS) feed generator provides a user access to a set of data in the form of an RSS feed containing an object. The RSS feed generator allows the user to generate a feed definition using any of a user interface, a web based application programming interface, and an HTTP request. The RSS feed generator uses the feed definition provided by the user to generate the RSS feed and exposes the RSS feed in the form of RSS XML data. The RSS feed generator allows a business system to dynamically update the set of data contained in the RSS feed in a manner that allows a user to perform a plurality of functions on the RSS feed.

  • Pub Date: 2005/30/12
  • Number: 08606845
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Personalized user specific grammars

Improved systems and methods are provided for transcribing audio files of voice mails sent over a unified messaging system. Customized grammars specific to a voice mail recipient are created and utilized to transcribe a received voice mail by comparing the audio file to commonly utilized words, names, acronyms, and phrases used by the recipient. Key elements are identified from the resulting text transcription to aid the recipient in processing received voice mails based on the significant content contained in the voice mail.

  • Pub Date: 2005/30/12
  • Number: 07693267
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Page coloring to associate memory pages with programs

Apparatuses and methods for page coloring to associate memory pages with programs are disclosed. In one embodiment, an apparatus includes a paging unit and an interface to access a memory. The paging unit includes translation logic and comparison logic. The translation logic is to translate a first address to a second address. The first address is to be provided by an instruction stored in a first page in the memory. The translation is based on an entry in a data structure, and the entry is to include a base address of a second page in the memory including the second address. The comparison logic is to compare the color of the first page to the color of the second page. The color of the first page is to indicate association of the first page with a first program including the first instruction. The data structure entry is also to include the color of the second page to indicate association of the second page with the first program or a second program.

  • Pub Date: 2005/30/12
  • Number: 09390031
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for displaying animation with an embedded system graphics API

An animation file player can display animation files with an embedded system graphics application programming interface (graphics API). In an example implementation, an animation file comprises a Flash® animation file such as, a Shockwave Flash® animation file, and the embedded system graphics API comprises an OpenGL®|ES graphics API. The present invention is not intended to be so limited, and other types of animation files and embedded system graphics APIs can be used.

  • Pub Date: 2005/30/12
  • Number: 07911467
  • Owner: Hooked Wireless, Inc.
  • Location: Los Altos, US
  • Details: Visit USPTO

Visit USPTO Page


Method and device for performing caching of dynamically generated objects in a data communication network

A method for maintaining a cache of dynamically generated objects. The method includes storing in the cache dynamically generated objects previously served from an originating server to a client. A communication between the client and server is intercepted by the cache. The cache parses the communication to identify an object determinant and to determine whether the object determinant indicates whether a change has occurred or will occur in an object at the originating server. The cache marks the object stored in the cache as invalid if the object determinant so indicates. If the object has been marked as invalid, the cache retrieves the object from the originating server.

  • Pub Date: 2005/30/12
  • Number: 08495305
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Direct macroblock mode techniques for high performance hardware motion compensation

Direct macroblock mode techniques for high performance hardware motion compensation are described. An embodiment includes a hardware motion compensation graphics display device driver. More specifically, an embodiment mitigates a macroblock data parsing bottleneck in the display device driver by directly generating macroblock instructions and storing them in a dedicated buffer. For example, an embodiment includes an independent direct memory access instruction execution buffer for macroblock instructions separate from the direct memory access instruction execution buffer for all other hardware motion compensation instructions. Other embodiments are described and claimed.

  • Pub Date: 2005/30/12
  • Number: 08249140
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Architectural design for time recording application software

Methods, systems, and apparatus, including computer program products, for implementing a software architecture design for a software application implementing time recording. The application is structured as multiple process components interacting with each other through service interfaces, and multiple service interface operations, each being implemented for a respective process component. The process components include a Project Processing component that is responsible for structuring, planning, and executing measures or projects, a Time and Labor Management process component that supports the definition of employees' planned working time as well as the recording or the actual working times and absences, an Accounting process component that records relevant business transactions, and a Goods and Service Acknowledgement process component that includes the Goods and Service Acknowledgement business object, which is a document that states the recipient's obligation to pay the supplier for goods received or services rendered.

  • Pub Date: 2005/30/12
  • Number: 08688495
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Architectural design for service procurement application software

Methods, systems, and apparatus, including computer program products, for implementing a software architecture design for a software application implementing service procurement. The application is structured as multiple process components interacting with each other through service interfaces, and multiple service interface operations, each being implemented for a respective process component. The process components include a Project Processing process component; a Purchase Request Processing process component; a Purchase Order Processing process component; a Purchasing Contract process component; a Goods and Service Acknowledgement process component; a Supplier Invoice Processing process component; an RFQ Processing process component that; and a Time and Labor Management process component.

  • Pub Date: 2005/30/12
  • Number: 08396731
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Architectural design for plan-driven procurement application software

Methods, systems, and apparatus, including computer program products, for implementing a software architecture design for a software application implementing plan-driven procurement. The application is structured as multiple process components interacting with each other through service interfaces, and multiple service interface operations, each being implemented for a respective process component. The process components include an Inbound Delivery Processing process component, a Material Inspection Processing process component, a Site Logistics Processing process component, a Confirmation and Inventory process component, a Purchase Request Processing process component, a Purchase Order Processing process component, a Purchasing Contract process component, a Supplier Invoice Processing process component, a Demand Forecast Processing process component, a Supply and Demand Matching process component, an External Procurement Trigger and Response process component, and a Logistics Execution Control process component.

  • Pub Date: 2005/30/12
  • Number: 08380553
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Architectural design for internal projects application software

Methods, systems, and apparatus, including computer program products, for implementing a software architecture design for a software application implementing an internal projects application useful for planning and executing internal projects and measures, including network scheduling, resource staffing, cost estimation and management, time confirmation, and progress monitoring. The application is structured as multiple process components interacting with each other through service interfaces, and multiple service interface operations, each being implemented for a respective process component. The process components include a Costing process component that maintains project cost estimates; an Accounting process component that records relevant business transactions; a Project Processing process component that structures, plans and executes simple, short-term measures and complex projects; and a Time and Labor Management process component that supports the definition of employees' planned working times as well as the recording of the actual working times and absences and their evaluation.

  • Pub Date: 2005/30/12
  • Number: 08321831
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Technique for coupling meteorology to acoustics in forests

A system and method of predicting multi-dimensional meteorological and acoustic effects within and above a forest environment comprises collecting input data comprising meteorological and forest canopy characterization data for a specified forest environment; inputting the input data into program meteorology modules comprising an embedded radiative transfer and energy budget methodology module adapted to predict a heat source within and above the forest environment for any location at any time; calculating an incoming total radiation at a top of the forest environment; outputting multi-dimensional acoustics and meteorology numerical codes based on the program meteorology modules and the calculated total radiation; and formulating sound speeds within and above the forest environment based on the numerical codes.

  • Pub Date: 2005/29/12
  • Number: 07634393
  • Owner: United States of America
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for displaying market information and order placement in an electronic trading environment

A system and method are provided for displaying a trading screen and placing an order in an electronic trading environment. The system and method may be used to assist a trader in selecting an item of interest, such as the inside market (best bid and best ask) to be displayed relative to a user configured location on the trading screen, such as the center of the trading screen. In a preferred embodiment, the inside market will stay located relative to center of the trading screen and the price levels associated to the inside market will move as the market conditions fluctuate. Other features and advantages are described herein.

  • Pub Date: 2005/29/12
  • Number: 2026191
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Support of a platform-independent model including descriptions of modeling language entities

Methods and apparatus, including computer program products, for supporting a model including descriptions of modeling language entities in a visual modeling environment. A method includes providing a visual modeling tool and modeling language entities being entities of a language of expressing applications designed in a visual modeling language environment, receiving input defining an application in the visual modeling language environment, and generating a platform-independent model of the application based on the input and the modeling language entities. In that method, the modeling language entities have a corresponding syntactic description that can be in accordance with the language, the input defines the application as a selection of the modeling language entities and a configuration of the selection, and the platform-independent model includes the selection, the configuration, and a syntactic description of the modeling language entities in the selection.

  • Pub Date: 2005/29/12
  • Number: 07840936
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Programmable virtual book system

An electronic information browsing system that provides a book-like interface—a virtual book—for presenting electronic contents. Specifically, an electronic information browsing system that allows users to configure its behavior via data and program specification encapsulated in a dynamic file format. Configurable behavior includes but not limited to the kind of contents to be displayed in the virtual book, the sources of the contents to be displayed, the static aspects of the virtual book such as the book dimensions and the dynamic aspects of the virtual book such as when a page is to be flipped, how the flipping of pages is contingent upon the execution of certain pre-specified events, etc.

  • Pub Date: 2005/29/12
  • Number: 1935773
  • Owner: E-Book Systems Pte Ltd
  • Location: Singapore, SG
  • Details: Visit USPTO

Visit USPTO Page


Method and system for increasing holographic data storage capacity using irradiance-tailoring element

A method and system is disclosed for increasing the holographic storage capacity of a holographic recording medium using an irradiance-tailoring (e.g., optical) element by changing the irradiance profile of the modulated object beam (e.g., by imparting motion to an irradiance-tailoring element and/or the holographic recording medium and/or by reconfiguring (e.g., periodically) the phase profile of a stationary irradiance-tailoring (e.g., optical) element) to minimize the effects of fixed-pattern noise buildup from occurring in the holographic recording medium.

  • Pub Date: 2005/29/12
  • Number: 07813017
  • Owner: InPhase Technologies, Inc.
  • Location: Longmont, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for determining interest spaces among online content sources

A method and system for determining interest spaces among online content sources. According to one embodiment, a method may include generating a representation of a network of online content sources, where the representation reflects navigation paths and respective navigation path weights among the online content sources, and where the navigation path weights are indicative of user activity among the online content sources. The method may further include generating one or more interest spaces of the network dependent upon the navigation paths and respective navigation path weights, where each interest space includes at least a subset of the online content sources.

  • Pub Date: 2005/29/12
  • Number: 07860895
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for determining interest levels of online content navigation paths

A method and system for determining interest levels of online content navigation paths. A method may include determining each of a plurality of navigation paths among a plurality of online content sources, and for each of the navigation paths, determining a corresponding path weight, where a given corresponding path weight is indicative of user activity along a corresponding navigation path. The method may further include identifying a particular aggregate path within the online content sources, where the particular path includes some of the navigation paths, where an aggregate path weight corresponding to the particular path is dependent upon the path weights corresponding to the navigation paths included in the particular path, and where the aggregate path weight satisfies an optimization criterion relative to other aggregate paths. A given navigation path included in the particular aggregate path may correspond to a possible user traversal from a first to a second online content source.

  • Pub Date: 2005/29/12
  • Number: 2095325
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for associating keywords with online content sources

A method and system for associating keywords with online content sources. According to one embodiment, a method may include identifying a result set including one or more of a plurality of online content sources, wherein each of the included one or more online content sources satisfies a keyword query including one or more keywords. The method may further include, for a given one of the online content sources included in the result set, identifying one or more aggregate paths including the given online content source, wherein a given one of the one or more aggregate paths includes one or more navigation paths among the plurality of online content sources, and in response to detecting a selection of a particular online content source from one of the identified aggregate paths, associating the one or more keywords included in the keyword query with the particular online content source.

  • Pub Date: 2005/29/12
  • Number: 07831582
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Instruction set architecture-based inter-sequencer communications with a heterogeneous resource

In one embodiment, the present invention includes a method for directly communicating between an accelerator and an instruction sequencer coupled thereto, where the accelerator is a heterogeneous resource with respect to the instruction sequencer. An interface may be used to provide the communication between these resources. Via such a communication mechanism a user-level application may directly communicate with the accelerator without operating system support. Further, the instruction sequencer and the accelerator may perform operations in parallel. Other embodiments are described and claimed.

  • Pub Date: 2005/29/12
  • Number: 08914618
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Document management system user interfaces

Systems, methods, and software to provide document management system user interfaces to clients. Some embodiments include an intermediary server to provide document management system indexing data to a client in a form that is displayable within an existing client file browsing user interface, such as Windows Explorer.

  • Pub Date: 2005/29/12
  • Number: 08122070
  • Owner: United States Automobile Association (USAA)
  • Location: San Antonio, US
  • Details: Visit USPTO

Visit USPTO Page


Application performance acceleration

Responding to IO requests made by an application to an operating system within a computing device implements IO performance acceleration that interfaces with the logical and physical disk management components of the operating system and within that pathway provides a system memory based disk block cache. The logical disk management component of the operating system identifies logical disk addresses for IO requests sent from the application to the operating system. These addresses are translated to physical disk addresses that correspond to disk blocks available on a physical storage resource. The disk block cache stores cached disk blocks that correspond to the disk blocks available on the physical storage resource, such that IO requests may be fulfilled from the disk block cache. Provision of the disk block cache between the logical and physical disk management components accommodates tailoring of efficiency to any applications making IO requests, and flexible interaction with various different physical disks.

  • Pub Date: 2005/29/12
  • Number: 07752386
  • Owner: DataCore Software Corporation
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for computer aided inventing

Methods and systems are provided for a systematic approach to computer aided inventing. In a modeling environment, a model representing any item, composition or process can be defined and configured using the lexicon and specification of an innovation database. In the model, objects can be identified, defined, and configured to provide the model with constituent products, components, features and materials. An innovation engine automatically applies one or more morphs from the innovation database to the objects of the model to generate morphed versions of the model that may provide innovations of or invention to the item, composition or process represented by the model.

  • Pub Date: 2005/28/12
  • Number: 08229871
  • Details: Visit USPTO

Visit USPTO Page


Selectively searching restricted documents

A first subset of attributes of documents responsive to at least one restriction may be displayed. Thereafter, a selection of a graphical user interface element associated with one of the attribute in the first subset may be received resulting in a display of a window comprising an alphanumeric input element. A key word search query may be received in the input element so that a second subset of attributes of documents responsive to the at least one restriction, the attribute associated with the selected graphical user interface element, and the key word search query may be displayed. Related methods, apparatuses, computer program products, and computer systems are also described.

  • Pub Date: 2005/28/12
  • Number: 07895233
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Real time lockdown

A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new executables added to the machine as well as previously existent executables that have been modified, moved, renamed or deleted. In certain embodiments, the system will tag the file with a flag as modified or newly added. Once tagged, the system intercepts particular types of file accesses for execution, network or registry. The system determines if the file performing the access is flagged and may apply one or more policies based on the requested access. In certain embodiments, the system intercepts I/O operations by file systems or file system volumes and flags metadata associated with the file. For example, the NT File System and its extended attributes and alternate streams may be utilized to implement the system.

  • Pub Date: 2005/28/12
  • Number: 08453243
  • Owner: Websense, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method for verifications and fast QoS establishment

A wireless communication system is provided for rapidly establishing the QoS resource on different communication networks. In this system, the NAP evaluates a network resource used by the MT, and generates the QoS history information unit indicating the evaluation result. The AAA authenticates the QoS history information unit generated by the NAP. The NAP transmits the authenticated QoS history information unit to the MT. The MT request for a resource establishment to the NAP when switching the communicating party from the NAP to the NAP, and transmits the QoS history information unit. The NAP verifies the authenticity of the QoS history information unit to the AAA when receiving the request for resource establishment from the MT and allocates the network resource to the MT based on the QoS history information unit.

  • Pub Date: 2005/28/12
  • Number: 08195175
  • Owner: Panasonic Corporation
  • Location: Osaka, JP
  • Details: Visit USPTO

Visit USPTO Page


Method, apparatus, and program product for predicting virtual presence in a persistent virtual enviornment

Apparatus, methods, and computer program products are disclosed that access a first coefficient vector that represents a first temporal profile and a second coefficient vector that represents a second temporal profile. The first and second temporal profiles represent presence histories of a first entity and a second entity within a persistent virtual environment. Once the coefficient vectors are accessed, the technology generates a predictive function responsive to the coefficient vectors. The predictive function provides a likelihood with respect to a future time that the first entity and the second entity will be temporally compatible. The technology then presents a representation of said predictive function or information derived from said predictive function.

  • Pub Date: 2005/28/12
  • Number: 09433868
  • Owner: PALO ALTO RESEARCH CENTER INCORPORATED
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Method, apparatus, and program product for modeling presence in a persistent virtual environment

Apparatus, methods, and computer program products are disclosed that accumulate a presence history of an entity within a persistent virtual environment by repeated gathering of virtual presence information. The virtual presence information includes an entity identification value and a sampling time value. Once the virtual presence information is collected, the technology performs a general least-squares-fit to a set of basis functions on a portion of the presence history to create a coefficient vector. The coefficient vector represents a temporal profile consistent with the presence history and includes coefficients responsive to the general least-squares-fit. Once the coefficient vector is created, the technology characterizes the entity responsive to its coefficient vector and presents the characterization of the entity.

  • Pub Date: 2005/28/12
  • Number: 08562440
  • Owner: Palo Alto Research Center Incorporated
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Method, apparatus, and program product for clustering entities in a persistent virtual environment

Apparatus, methods, and computer program products are disclosed that accesses coefficient vectors each of which represent an entity within a persistent virtual environment. Each accessed coefficient vector includes coefficients having coefficient values related to the represented entity. The coefficients represent a temporal profile of the entity in the persistent virtual environment. This aspect assigns a coefficient weight to at least one of the coefficients. and partitions the coefficient vectors responsive to the coefficient weight and at least one of the coefficients of each of the coefficient vectors into clusters. Finally, the technology presents a recommendation responsive to the clusters. Furthermore, a compatibility metric can be determined by comparing weighted coefficient vectors of two entities, and the compatibility metric can also be presented.

  • Pub Date: 2005/28/12
  • Number: 08328639
  • Owner: Palo Alto Research Center Incorporated
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Heat exchanger with perforated plate in header

A heat exchanger includes an inlet header, an outlet header and a plurality of flat, multi-channel heat exchange tubes extending therebetween. A longitudinally extending member divides the interior of the header into a first chamber on one side thereof for receiving a fluid and a second chamber on the other side thereof. A plurality of multi-channel heat exchange tubes extend between the headers with the respective inlet end of each heat exchange tube passing into the second chamber of the inlet header. Fluid passes through a series of longitudinally spaced openings in the longitudinally extending member for distribution to the inlets to the channels of the multi-channel heat exchange tubes. The fluid may undergo expansion as it passes through the openings.

  • Pub Date: 2005/28/12
  • Number: 07562697
  • Owner: Carrier Corporation
  • Location: Farmington, US
  • Details: Visit USPTO

Visit USPTO Page


Breadcrumb with alternative restriction traversal

A breadcrumb may be displayed which identifies at least two restrictions of a plurality of documents in a sequence. The breadcrumb may include a graphical user interface element associated with a selected one of the restrictions having at least one subsequent restriction in the sequence. Once this graphical user interface element is selected, at least one attribute and a numeric indication of a number of the documents responsive to each restriction prior to the selected restriction that contain the attribute and each restriction in the sequence subsequent to the selected restriction may be displayed.

  • Pub Date: 2005/28/12
  • Number: 2068294
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Integrated multidimensional view of hierarchical objects

Embodiments of the present invention address deficiencies of the art in respect to the display of multidimensional structures and provide a method, system and computer program product for managing an integrated multidimensional view of a structured collection of objects. In one embodiment of the invention, a data processing system can be configured to render an integrated view of a multidimensional structured collection of objects. The data processing system can include a GUI for a host application in a computing platform and multidimensional view processing logic coupled to the host application. The logic can include program code enabled to render a single, integrated multidimensional view of a structured collection of objects in the GUI.

  • Pub Date: 2005/27/12
  • Number: 09557887
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated multidimensional view of hierarchical objects

Embodiments of the present invention address deficiencies of the art in respect to the display of multidimensional structures and provide a method, system and computer program product for managing an integrated multidimensional view of a structured collection of objects. In one embodiment of the invention, a data processing system can be configured to render an integrated view of a multidimensional structured collection of objects. The data processing system can include a GUI for a host application in a computing platform and multidimensional view processing logic coupled to the host application. The logic can include program code enabled to render a single, integrated multidimensional view of a structured collection of objects in the GUI.

  • Pub Date: 2005/27/12
  • Number: 09557887
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Importing and exporting markup language data in a spreadsheet application document

Data presented in a hierarchical format is rendered in a form allowing the data to be imported into a spreadsheet document where the data can be modified and new data can be added. A data file containing the hierarchically formatted data is selected for importing. A mapping relating a plurality of elements within the hierarchical data to a plurality of respective locations in the spreadsheet document is accessed. The hierarchical data is rendered in the spreadsheet document according to the mapping. Input is received to modify the hierarchical data rendered in the spreadsheet document. The mapping is updated to include the modifications to the hierarchical data. The modifications to the hierarchical data and the updated mapping are exported for subsequent rendering in a second spreadsheet document according to the updated mapping.

  • Pub Date: 2005/27/12
  • Number: 2065927
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Data structure and management techniques for local user-level thread data

Data structure creation, organization and management techniques for data local to user-level threads are provided. In one embodiment, a method includes generating, for a user-level thread (“shred”) to run on a thread unit that is not managed by an operating system (“OS”), a storage area for local data and maintaining state in the storage area across a context switch from the thread unit that is not managed by the OS to a second thread unit that is managed by the OS. Other embodiments are also described and claimed.

  • Pub Date: 2005/27/12
  • Number: 08079035
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Tracing errors in software

An error tracing analysis tool applies static code analysis to software source code to identify error paths in the code and determine how many of these error paths have trace statements.

  • Pub Date: 2005/23/12
  • Number: 2095600
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for communicating data between wireless mobile hand-held computer and a back-end computer system

An asynchronous, middleware system positioned between a larger computer system and a wireless mobile hand-held computer anticipates the needs of a wireless mobile hand-held computer that is served by the middleware system. The middleware system can anticipate and process needs for a mobile hand-held computer when the hand-held computer is not “synchronized” with a larger computer network. The middleware system can be designed to prepare information for downloading from a larger computer system to a wireless mobile hand-held computer well in advance of a communication link while the hand-held computer is not “synchronized” with the larger computer network. The middleware system can provide a network architecture that is very durable, scaleable, and flexible to serve hundreds and thousands of wireless mobile hand-held computers.

  • Pub Date: 2005/23/12
  • Number: 08028039
  • Owner: Reflexis Systems, Inc.
  • Location: Needham, US
  • Details: Visit USPTO

Visit USPTO Page


Speech modeling and enhancement based on magnitude-normalized spectra

A frame of a speech signal is converted into the spectral domain to identify a plurality of frequency components and an energy value for the frame is determined. The plurality of frequency components is divided by the energy value for the frame to form energy-normalized frequency components. A model is then constructed from the energy-normalized frequency components and can be used for speech recognition and speech enhancement.

  • Pub Date: 2005/23/12
  • Number: 07930178
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Registration of a telephone/computer association in a computer telephony integration environment

The application relates to the registration of the identity of a telephone terminal in association with the identity of a computer terminal in a Computer Technology Integration environment CTI-enabled switching apparatus and a registration server interconnected by a CTI-link and a telephony link. A registration method whereby the registration is essentially achieved by using the telephony link to present PIN data inputted using the telephone terminal to the registration server and to identify the from the CTI-link the identity of the telephone terminal which presents the PIN data over the telephony link faces the problem of how to tie in the correct CLI to the correct call. This problem is solved by the application in that the port of telephony link used by the switching apparatus for the call by which the PIN data is transmitted is transmitted in combination with the CLI over the CTI-link. The registration server retains information on which port of the switching apparatus is associated with which registration server port and a table look-up is being used to find out at which port of the registration server the call over said telephony link is received.

  • Pub Date: 2005/23/12
  • Number: 08280032
  • Owner: British Telecommunications Public Limited Company
  • Location: London, GB
  • Details: Visit USPTO

Visit USPTO Page


Registering rules for entity attributes for validation and inference

The present invention provides a method and system for registering rules for attributes of an entity with an entity validation and inference unit. The entity validation and inference unit can further validate input values for an entity and/or infer attributes of an entity using the associated registered rules. The entity validation and inference unit can also provide information regarding attributes, relations, and behaviors of an entity using the associated registered rules in response to a query. The present invention also provides a mechanism for a user to query an entity or the entity validation and inference unit regarding valid values for an entity. The mechanism also allows the user to query the registered rule associated with the entity.

  • Pub Date: 2005/23/12
  • Number: 1995843
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Platinum IV complex inhibitor

The invention disclosed herein provides methods for diagnosing and treating diseases and/or conditions associated with dysregulated Stat3-mediated activity.

  • Pub Date: 2005/23/12
  • Number: 07807662
  • Owner: University of South Florida
  • Location: Tampa, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-functional yarns and fabrics having anti-microbial, anti-static and anti-odor characterisitics

The present invention is directed to yarns and fabrics that exhibit anti-static, anti-odor, and anti-microbial properties. The yarn is comprised of several groups of predetermined fibers. One of these groups of predetermined fibers comprises fibers that exhibit anti-microbial, anti-odor and anti-static characteristics. In one embodiment, the yarn comprises a first plurality of fibers, a second plurality of fibers that are different from the fibers of the first plurality, and a third plurality of fibers that are different from the fibers of the first and second pluralities. In one embodiment, the fibers which exhibit anti-microbial, anti-odor and anti-static properties are metallic coated fibers. Other fibers used to form different embodiments of the yarns include cotton, nylon, polyester, wool, meta-aramid fibers, para-aramid fibers, and stretch fibers.

  • Pub Date: 2005/23/12
  • Number: 08771831
  • Owner: The United States of America as Represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing customer controlled notifications in a managed network services system

An approach for supporting automated fault isolation and recovery is provided. A notification configuration option is transmitted to a browser interface utilized by a user associated with a customer network that is monitored by a service provider, wherein the user selects the notification configuration option to input notification information. The notification information is received, via the browser interface, from the customer. A notification message is received from a platform configured to create a workflow event in response to an alarm indicative of a fault within the customer network, wherein isolation and recovery of the fault is performed according to the workflow event, the notification message including information about the customer network during the fault isolation and recovery process. The notification message is transmitted in accordance with the stored notification information.

  • Pub Date: 2005/23/12
  • Number: 1977772
  • Owner: Verizon Business Global LLC
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing automated fault isolation in a managed services network

An approach provides support for automatic fault isolation in a managed services system. A fault indication corresponding to a communications network of a customer is determined. An analysis is performed to determine a root cause of the fault indication using information associated with the determined fault to output an alarm. A determination is made whether the alarm is associated with a maintenance event to update the alarm. Further, a workflow event corresponding to the alarm is created.

  • Pub Date: 2005/23/12
  • Number: 08924533
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing automated data retrieval in support of fault isolation in a managed services network

An approach for supporting automated fault isolation is provided. An alarm is received indicating a fault within a customer network that includes one or more network elements. The customer network being monitored by a service provider. A script is retrieved for specifying a dialogue with the network elements for data collection. A command is transmitted to the customer network according to the one script to obtain data from the network elements, wherein the data is utilized to determine the fault. Further, a workflow event corresponding to the alarm is generated, wherein resolution of the fault is automated according to the workflow event.

  • Pub Date: 2005/23/12
  • Number: 08738760
  • Owner: Verizon Business Global LLC
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for processing fault alarms and trouble tickets in a managed network services system

An approach for supporting automated fault isolation and recovery is provided. An alarm indicative of a fault within a customer network is received. An event within a workflow is created in response to the alarm, wherein a new trouble ticket is generated as part of the workflow. Communication with a trouble management system is performed to correlate the alarm with an existing trouble ticket. The new trouble ticket is associated with the existing trouble ticket.

  • Pub Date: 2005/23/12
  • Number: 08812649
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for processing fault alarms and maintenance events in a managed network services system

An approach for supporting automated fault isolation and recovery is provided. A workflow event corresponding to an alarm indicative of a fault within a customer network is generated. Recovery from the fault is automated according to the workflow event. Alarm information is transmitted to a maintenance management system, wherein the alarm information specifies information about the alarm. A maintenance event information from the maintenance management system is received in response to the transmitted alarm information. Additionally, it is determined whether the alarm is correlated to a maintenance event based on the maintenance event information. Automated handling of the alarm is differentiated based on the correlation.

  • Pub Date: 2005/23/12
  • Number: 08676945
  • Owner: Verizon Business Global LLC
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Induced answering method and system for circuit switching-based telephony

Induced answering method and system for CS-based telephony. A user terminal () for communication over a telecommunications network () includes at least a CS-telephony device (CSO) for processing CS-based telephony signals (CS, CS), the CS-based telephony signals being received and transmitted over a circuit switched bearer service. The user terminal is arranged for receiving an additional answer-related signal (PS; CS), the additional answer-related signal being associated with an incoming CS-alert signal (CS) of an incoming call. Further, the user terminal is arranged for transmitting a response signal or CS-answer signal (CS) over the circuit switched bearer service in response to information included in, or derived from, the additional answer-related signal.

  • Pub Date: 2005/23/12
  • Number: 08077703
  • Owner: Telefonaktiebolaget LM Ericsson (publ)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


End-to-end publish/subscribe middleware architecture

Message publish/subscribe systems are required to process high message volumes with reduced latency and performance bottlenecks. The end-to-end middleware architecture proposed by the present invention is designed for high-volume, low-latency messaging by, among other things, reducing intermediary hops with neighbor-based routing, introducing efficient native-to-external and external-to-native protocol conversions, monitoring system performance, including latency, in real time, employing topic-based and channel-based message communications, and dynamically optimizing system interconnect configurations and message transmission protocols.

  • Pub Date: 2005/23/12
  • Number: 07970918
  • Owner: Tervela, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic account mapping system for computerized asset trading

Methods and apparatuses for processing orders in a computerized asset trading system when the order contains trading requirements for trading accounts that do not map to trading accounts recognized by the provider trading system. The invention books trading requirements associated with the unrecognized trading accounts against a default trading account set up for the customer by the provider, thereby allowing the order to be processed instead of rejected merely because one or more of the customer-specified trading accounts has not yet been approved by the provider. The invention also allows providers to specifically block customer trading accounts, and to dynamically create approved trading accounts as they are needed so that subsequent transactions involving the previously unapproved trading accounts will be executed without using the default trading account. The invention also rejects orders for customer trading accounts that have been specifically blocked by the provider.

  • Pub Date: 2005/23/12
  • Number: 07634438
  • Owner: FX Alliance, LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Changing a scheduler in a virtual machine monitor

Machine-readable media, methods, and apparatus are described to change a first scheduler in the virtual machine monitor. In some embodiments, a second scheduler is loaded in a virtual machine monitor when the virtual machine monitor is running; and then is activated to handle a scheduling request for a scheduling process in place of the first scheduler, when the virtual machine monitor is running.

  • Pub Date: 2005/23/12
  • Number: 08181179
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for using a quantitative application measurement to determine whether to instantiate an application

Systems and methods are disclosed for quantitative measurements of an application and a computer. In one exemplary embodiment, there is provided a method for determining whether to instantiate an application on one of a plurality of interconnected computers. Moreover, the method includes receiving information regarding the application to be instantiated on the computer; receiving information regarding the computer on which the application is to be instantiated; determining a dual measurement based on the received application information and the received computer information; and determining whether to instantiate the application based on the determined dual measurement.

  • Pub Date: 2005/22/12
  • Number: 08627326
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Spatial noise suppression for a microphone array

A microphone array having at least three microphones provides a captured signal. Spatial noise suppression estimates a desired signal from a captured signal using spatio-temporal distribution of the speech and the noise. In particular, spatial information indicative of at least two quantities of direction are used. A first quantity is based on a first combination of the signals from the at least three microphones, a second quantity is based on a second combination of the signals of the at least three microphones.

  • Pub Date: 2005/22/12
  • Number: 07565288
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Software development and testing environment

The invention is directed to method of generating database encoded software for controlling operation of a data processing device. The method comprises providing a formal language specification representative of source code for the software, translating said formal language specification into data suitable for storing in database structures and in a form suitable for being queried by a database query language and storing said data in database structures of a database. The method includes using a software development tool in a software development and testing environment to manipulate the database encoded software using a database query language such as SQL and XQuery to develop new software features. The query language can also be used to control replication and/or synchronization of the database encoded software with the contents of a data processing device control program database by way of installing said control program on said device or upgrading the control program software of said device.

  • Pub Date: 2005/22/12
  • Number: 08464210
  • Owner: Rockstar Consortium US LP
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Soft tissue repair and regeneration using postpartum-derived cells and cell products

Cells derived from postpartum tissue and products thereof having the potential to support cells of and/or differentiate to cells of a soft tissue lineage, and methods of preparation and use of those postpartum tissue-derived cells, are provided by the invention. The invention also provides methods for the use of such postpartum-derived cells and products related thereto in therapies for conditions of soft tissue.

  • Pub Date: 2005/22/12
  • Number: 09504719
  • Owner: DePuy Synthes Products, Inc.
  • Location: Raynham, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time software receiver

A real-time software receiver that executes on a general purpose processor. The software receiver includes data acquisition and correlator modules that perform, in place of hardware correlation, baseband mixing and PRN code correlation using bit-wise parallelism.

  • Pub Date: 2005/22/12
  • Number: 1935889
  • Owner: Cornell Research Foundation, Inc.
  • Location: Ithaca, US
  • Details: Visit USPTO

Visit USPTO Page


Process scheduler employing adaptive partitioning of process threads

A system is set forth comprising a processor and memory storage units storing software code. The software code comprises code for a scheduling system and for generating a plurality of adaptive partitions that are each associated with one or more software threads and that each have a corresponding processor budget. The code also is executable to generate at least one sending thread and at least one receiving thread which responds to communications from the sending thread to execute one or more tasks corresponding to the communications. In operation, the scheduling system selectively allocates the processor to each sending and receiving thread based on the processor budget of the adaptive partition associated with the respective thread. The scheduling system bills the processor budget of the adaptive partition associated with the sending thread for processor allocation used by the receiving thread to respond to communications sent by the sending thread.

  • Pub Date: 2005/22/12
  • Number: 08434086
  • Owner: QNX Software Systems Limited
  • Location: Kanata, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer program products for invoking trust-controlled services via application programming interfaces (APIs) respectively associated therewith

A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially untrustworthy network element poses in the communication network. Application programming interfaces (APIs) may automate the invocation of trust-controlled services, such as a traffic mirroring service for a network element, a traffic monitoring service for a network element, a traffic examination service for traffic associated with a network element, a traffic blocking service for traffic associated with a network element, a traffic storage service for traffic associated with a network element, a traffic logging service for traffic associated with a network element, an endpoint resource selection service for traffic associated with a network element, a midpoint selection service for traffic associated with a network element, a tunneling service for traffic associated with a network element, and/or an application management service for a network element. An API for a trust-controlled service may be used to directly perform a function on one or more resources in the communication network or may be used to set up an ongoing function on one or more resources in the communication network that may continue until the API is used to terminate the function.

  • Pub Date: 2005/22/12
  • Number: 08380979
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Items on workplaces

This document discusses, among other things, a system and a method for using a meta-model to manage relationships between software artifacts, the method comprising determining a meta-model; identifying one or more available artifacts in one or more software applications; using the meta-model to define one or more relationships between the one or more available artifacts, wherein each relationship is a specific instance of a possible association defined in the meta-model; and providing the one or more relationships as one or more configurations to the one or more software applications.

  • Pub Date: 2005/22/12
  • Number: 07761850
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Inhalable formulations for treating pulmonary hypertension and methods of using same

The present invention is directed to an inhalable formulation for the treatment of pulmonary hypertension in a mammal (e.g., humans), wherein the formulation comprises at least one hypertension reducing agent, including but not limited to an angiotensin converting enzyme inhibitor, angiotensin receptor blocker, beta-blocker, calcium-channel blocker or vasodilator, or any combination thereof. The formulations of the present invention may be a solution or suspension, and preferably are suitable for administration via nebulization. The present invention is also directed to a method and kit for treating a mammal suffering from pulmonary hypertension.

  • Pub Date: 2005/22/12
  • Number: 09498437
  • Owner: Mylan Specialty L.P.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid absorbent foam and articles containing it

A hybrid absorbent foam includes an integrated hybrid foam layer having an open surface, a closed surface, and a foam body extending between the open and closed surfaces. The integrated hybrid foam layer has an open-cell content of at least 50%, while the closed surface provides a barrier to aqueous liquids. The integrated hybrid foam layer is formed as a single layer, and has a substantially uniform polymer composition throughout its thickness. The integrated hybrid foam layer combines the functions of liquid absorbency, retention, and barrier into a single layer, and is useful in a wide variety of absorbent articles.

  • Pub Date: 2005/22/12
  • Number: 08158689
  • Owner: Kimberly-Clark Worldwide, Inc.
  • Location: Neenah, US
  • Details: Visit USPTO

Visit USPTO Page


Global electronic commerce system

A comprehensive system effectuates global electronic commerce on the Internet across frontiers of nations, cultures, and languages. Referral Websites serving various locales offer Buyers the opportunity to view products for purchase. A Buyer selects categories of products for viewing by using drop-down menus that organize products into a clear taxonomy that can be expressed across all languages. Having selected a category of products for viewing, a Buyer receives, from a multi-version relational database, a version of marketing information about each product. The version is one automatically sent from the database to match the Buyer's language, culture, and nationality, as deduced from the use of a particular Referral Website. A shopping cart allows Buyers to select a product for purchase in an interactive way that encourages completion of the purchase. Products can be offered with custom options and in wholesale quantities. Personalized Web pages allow comprehensive customer service after a sale.

  • Pub Date: 2005/22/12
  • Number: 08150736
  • Owner: S.F. Properties 58 LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Accessible role and state information in HTML documents

Accessible role and state information may be included in hypertext markup language documents by encoding an accessibility definition into a class attribute. The accessibility definition corresponds with an object of a hypertext markup language document and comprises role information and state information if state information is applicable to the corresponding role information. A script is associated with the hypertext markup language document and is configured for parsing at least a portion of the hypertext markup language document to identify the accessibility definition. The script further maps the role information and the state information in the accessibility definition to corresponding namespaced role and state attributes.

  • Pub Date: 2005/22/12
  • Number: 07895570
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Universal stereographic trigger peripheral for electronic equipment

A peripheral device is coupled to a system bus of an apparatus via a system bus compatible cable, and transmits to an operating system a request to transmit to the output multiple image stream 3D video data and a request to access a video subsystem for monitoring a status of page flip signals. The peripheral device transmits sync signals to at least one output of the peripheral device representing the page flip signals detected in response to monitoring page flip signal status. The apparatus transmits the multiple image stream 3D video data to the output. The multiple image stream 3D video data is received at a stereographic projection apparatus input. Each stream data contains a plurality of frames. The stereographic projection apparatus comprises an alternating polarizing filter, synced with the alternately projecting images, for separately filtering images from each of the image stream 3D video data at different polarization angles.

  • Pub Date: 2005/21/12
  • Number: 08167431
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Stereographic projection apparatus with passive eyewear utilizing a continuously variable polarizing element

An apparatus and method for stereoscopic 3D image projection and viewing using a single projection source, polarization modulation, and passive eyewear. This approach is applicable to frame sequential video created using existing 3D graphics APIs, as well as other video signal formats, and is compatible with existing digital light processor (DLP) technology for both front and rear projection systems. An alternating polarizer is used to modulate the projected image, and an electronic control circuit is described which can stabilize the alternating polarizer in both frequency and phase lock with a DLP visual signal (as an alternate embodiment, a frequency lock with a fixed phase offset may be employed). A preferred embodiment enables an existing DLP projection system to be enhanced with 3D capability, while an alternate embodiment allows this capability to be integrated into the design of new DLP based projection systems.

  • Pub Date: 2005/21/12
  • Number: 08189038
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Signal synthesizer for periodic acceleration and deceleration of rotating optical devices

In a stereographic projector that places a single linear polarizing wheel in the light path of the projector to impart a desired polarization state onto the projected light, a method and apparatus for periodically slowing the wheel down while in optimal states, and accelerating through invalid states. Stereo separation is greatly increased providing a marked improvement in visual quality and perceived depth when this invention is applied to such a polarizing filter wheel.

  • Pub Date: 2005/21/12
  • Number: 08152303
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Removable memory devices for displaying advertisement content on host systems using applications launched from removable memory devices

A removable memory device is provided. The device includes a plurality of re-programmable non-volatile memory cells; and a controller including a processor and a controller memory, wherein an application is launched from the removable memory device and executed on a host system when the removable memory device interfaces with the host system, and the application launches a display window on a display device, wherein the display window is controlled by the application and is used to display advertisement content that is stored in the plurality of memory cells or from a server that is accessible by the host system.

  • Pub Date: 2005/21/12
  • Number: 08683082
  • Owner: Sandisk Technologies Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Providing version control for electronic mail attachments

A system for providing version control for documents attached to electronic mail messages in which a user's personal document library is used to store documents attached to the email messages the user sends and/or receives. Each time an attached document is transmitted or received within a message thread, a different version of the document is created and stored in the personal document library. The multiple document versions created allow the disclosed system to provide the user with the options of opening the most recent version of an attached document and/or opening the version of the attached document that is associated with the specific opened message. An attached document is represented within an email message using a URL (Uniform Resource Locator), where the stored URL points to the version of the attached document for that message that is stored in the user's personal document library. Through an API (Application Programming Interface) provided by the personal document library, the most recent version of a document can be requested, or another specific version of the document can be indicated for opening.

  • Pub Date: 2005/21/12
  • Number: 08650254
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Noise immune optical encoder for high ambient light projection imaging systems

A method and apparatus for bitstream modulation of an infrared light source used by an optical sensor in a stereoscopic projection system, combined with a bitstream filter on the receiver electronics.

  • Pub Date: 2005/21/12
  • Number: 08182099
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for displaying advertisement content on host system using application launched from removable memory device

A method for displaying advertisement content is provided. The method includes, launching an application from a removable memory device with a plurality of non-volatile memory cells and a controller including a processor, wherein the application is launched when the removable memory device interfaces with a host system; launching a display window on a display device that is controlled by the application; and displaying advertisement content on the display window, real-time from a server or offline using the advertisement content stored on the removable memory device.

  • Pub Date: 2005/21/12
  • Number: 08683081
  • Owner: Sandisk Technologies Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Method to synchronize stereographic hardware to sequential color rendering apparatus

A method and apparatus for extracting synchronization information at the output of a projection apparatus, without modifying its rotating color segmented filter wheel or drive electronics. Three photodiodes, each with a different principle color filter, is placed at the projector output to detect output of the different colors in the filter wheel. An exclusive OR circuit is used to detect white light passing through the filter wheel.

  • Pub Date: 2005/21/12
  • Number: 08157381
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for synchronizing opto-mechanical filters to a series of video synchronization pulses and derivatives thereof

A method and system for synchronizing rotating machinery or other electromechanical actuator devices to a series of sync pulses derived from a video stream comprising point optimized control laws.

  • Pub Date: 2005/21/12
  • Number: 07635189
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Lumen optimized stereo projector using a plurality of polarizing filters

A stereo 3D projector with the ability to provide the native lumen output of the projector when not in 3D mode. This is accomplished by using two rotating polarizing filters at least partially overlapping, each with at least two or more segments, some of which are fully transparent and at least some of which are polarized linearly or circularly.

  • Pub Date: 2005/21/12
  • Number: 08172399
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Digital license migration from first platform to second platform

A digital license is migrated from a source platform to a target platform. At the source platform, a migration image is produced to include the license and corresponding data therein, and the license is deleted from such source platform. At the target platform, permission is requested from a centralized migration service to migrate the license in the migration image to the target platform. The migration service determines whether to permit migration of the license based on predetermined migration policy. Upon receiving the requested permission as a response from the migration service, the migration image is applied to the target platform by un-tying the license from the source platform and re-tying the license to the target platform.

  • Pub Date: 2005/21/12
  • Number: 07805375
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Circuit for detecting a clock error in a swept-beam system and related systems and methods

A circuit for detecting a phase error between a clock signal and a beam position includes a beam generator, sensor, and phase detector. The beam generator directs a beam toward a beam sweeper in response to a clock signal. The sensor, which is disposed at a mid line of a region that the beam sweeper scans, detects the beam from the beam sweeper, and the phase detector detects an error in the clock phase from the detected beam. Such a circuit can automatically detect the phase error in the pixel clock and correct this error, thus eliminating the need for a manual phase-error corrector.

  • Pub Date: 2005/21/12
  • Number: 2084173
  • Owner: Microvision, Inc.
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Video on demand system with selectable options of configurable random-access control

The present invention provides a method for an interactive media services system to provide media to a user through an interactive media services client device. The client device is coupled to a programmable media services server device. The method includes the step of implementing an interactive media guide. Additionally, the client device is implemented to present the interactive media guide to the user. A system operator is provided an interface to the programmable media services server. Control options are provided within the interface to allow the system operator to configure a plurality of rental options available to the user. Finally the interactive media service system is implemented such that the plurality of rental options can be executed by the user in a requested active media session.

  • Pub Date: 2005/20/12
  • Number: 08037504
  • Details: Visit USPTO

Visit USPTO Page


Video on demand system with dynamic enablement of random-access functionality

The present invention provides a method for an interactive media services system to provide media to a user through an interactive media services client device. The client device is coupled to a programmable media services server device. The method includes the step of implementing an interactive media guide. Additionally, the client device is implemented to present the interactive media guide to the user. A system operator is provided an interface to the programmable media services server. Control options are provided within the interface to allow the system operator to configure a plurality of rental options available to the user. Finally the interactive media service system is implemented such that the plurality of rental options can be executed by the user in a requested active media session.

  • Pub Date: 2005/20/12
  • Number: 08056106
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for enhanced meassage support using a generic client proxy

Methods and apparatus, including computer program products, are provided for controlling message communication between a first computer and a second computer. An exemplary method includes receiving, at the first computer, one or more messages from the second computer, the messages being stored in a buffer associated with an interface at the first computer. The method also includes calling, by a user interface, the interface at the first computer to retrieve the messages from the buffer. Moreover, the method includes identifying, by the user interface, the messages for presentation based on one or more parameters of the message, and providing the identified messages to the user interface for presentation.

  • Pub Date: 2005/20/12
  • Number: 07769821
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System and method for obtaining a markup language template through reversing engineering

Process for reverse engineering a program application written in a legacy programming language (e.g., COBOL), where the program application was specifically designed using a markup language template so as to process documents in the markup language. The process involves extracting from the program application, line by line, content fragments of the original markup language template and reassembling them to obtain the original template.

  • Pub Date: 2005/20/12
  • Number: 07747942
  • Owner: American Express Travel Related Services Company, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Programmable multimedia controller with programmable services

An integrated multimedia, entertainment, communications and control system. The system is based on a general purpose computer and is capable of interfacing with, controlling or managing a wide variety of audio, video, telecommunications, data communications or other devices. The system includes a programming environment for creating services or user experiences that may incorporate features or functionalities of several devices that are conventionally operated as separate, standalone devices.

  • Pub Date: 2005/20/12
  • Number: 09153125
  • Owner: Savant Systems, LLC
  • Location: Hyannis, US
  • Details: Visit USPTO

Visit USPTO Page


On-line gaming session and party management

A game hosting service manages game sessions and groups of players. The service creates, starts, and ends a game session. The service also manages the joining and deleting of players and groups of players both prior to and during game play. The service collects, stores, and optionally arbitrates statistics for each player such a game score and relative ranking with other players. The service assigns a group ID to a group of players to allow the group to migrate across game sessions. The game hosting service utilizes session management APIs to nest multiple sessions, thus enabling groups of players to remain intact across multiple sessions.

  • Pub Date: 2005/20/12
  • Number: 08585501
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-threaded stack cache

Systems and methods for storing stack data for multi-threaded processing in a specialized cache reduce on-chip memory requirements while maintaining low access latency. An on-chip stack cache is used store a predetermined number of stack entries for a thread. When additional entries are needed for the thread, entries stored in the stack cache are spilled, i.e., moved, to remote memory. As entries are popped off the on-chip stack cache, spilled entries are restored from the remote memory. The spilling and restoring processes may be performed while the on-chip stack cache is accessed. Therefore, a large stack size is supported using a smaller amount of die area than that needed to store the entire large stack on-chip. The large stack may be accessed without incurring the latency of reading and writing to remote memory since the stack cache is preemptively spilled and restored.

  • Pub Date: 2005/20/12
  • Number: 07805573
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-channel digital wireless audio system

In a multi-channel digital wireless audio system with at least one transmit node and at least one receive node, each node can both receive and transmit digital audio signals. Signals sent from a receive node to a transmit node may acknowledge satisfactory signal receipt, or may requesting retransmission of data packets received in a corrupted state. Original and retransmitted signals may be sent in compressed form to enable use of narrow-band digital radios. The system preferably incorporates a dual control channel to enable transmission of meta data. Each system node preferably incorporates a hardware-multithreaded processor adapted to implement various functions such as baseband functions, RF protocol functions, error correction functions, and audio processing functions, with each independent thread being adapted to implement a different functional block.

  • Pub Date: 2005/20/12
  • Number: 08050203
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer program products for providing automated call acknowledgement and answering services

A method, system, and computer program product for responding to an incoming communication attempt, sent from a sender to a recipient. The method includes receiving the incoming communication attempt and presenting options for responding to the incoming communication attempt. The options include at least one of acknowledgement message options and communication answering-related options. The method also includes receiving an option selection and responding to the incoming communication attempt according to the instructions of the selected option. The acknowledgement message options provide information to the sender without requiring that the recipient answer the incoming communication attempt.

  • Pub Date: 2005/20/12
  • Number: 08699687
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Hypermedia management system

A system supplies links between objects. A link service receives a link request from a client. The request identifies a source object. The link service aggregates links from link providers for which the source object is a source of the links, and provides the aggregated links to the client.

  • Pub Date: 2005/20/12
  • Number: 07970867
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Batch loading and self-registration of digital media files

Methods and apparatus for batch loading and self-registration of digital media files is provided. The system provides numerous methods of interfacing with a content outlet. The methods further include comparing attributes of content to be downloaded with attributes of content in a media database. The methods also includes providing restrictions based on a result of the comparing. The methods further include monetizing the methods between both retailers and right-holders using the system. Additionally, the method may include providing retail analysis, resolving disputes, and distributing royalty payments to rights-holders of content.

  • Pub Date: 2005/20/12
  • Number: 08117130
  • Owner: Stragent, LLC
  • Location: Longview, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for software support

This invention relates to methods and a system for supporting software. In one embodiment, a method for providing an updated version of a software program includes receiving an indication of a fault in a software program, distributing the faulty software program to a distributed community of programmers, receiving updated versions of the faulty software program from a subset of the distributed community of programmers, and determining a preferred updated software program from the received updated versions of the software program. In another embodiment, a system for providing an updated version of a software program includes a communication server for communicating faulty software programs and updates of the programs to and from the distributed community of programmers, a component storage module for storing the faulty software program, and a software testing module for determining a preferred updated version of the faulty software program.

  • Pub Date: 2005/19/12
  • Number: 08776042
  • Owner: TopCoder, Inc.
  • Location: Glastonbury, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for an enterprise services framework using a state model

Embodiments consistent with the principles of the invention check, before the data underlying a changed primary object is persistently save, for related objects whose data is also affected by the change. The related objects may be two or more degrees removed from the primary object. The changed primary object and all its changed related objects are then persistently saved together, so that the saved data is consistent across the related objects. Embodiments consistent with the principles of the invention also provide a state model for controlling access to services by clients and for making services available by servers.

  • Pub Date: 2005/19/12
  • Number: 07844615
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Speech controls for use with a speech system

Systems and methods are described for a speech system that includes one or more speech controls incorporated into one or more speech-enabled applications that run on the speech system. The controls allow applications to be developed with minimal programming effort to incorporate common speech-enabled application functions. A question control provides a customizable template for requesting information from a user. An announcer control allows a speech-enabled application to provide a user with information without having to re-create an entire announcer process each time it is used. A command control provides a simple way to attach command and control functions to speech-enabled applications. A word trainer control provides a way to associate user-selected voice tags with certain information. Providing the controls for use with speech-enabled applications ensures standardized user interfaces across multiple speech-enabled applications.

  • Pub Date: 2005/19/12
  • Number: 07742925
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Security tokens including displayable claims

A system for providing a digital identity includes a claims transformer programmed to generate a security token including a computational token and a display token, the computational token including one or more claims associated with an identity of a principal, and the display token including display information about the claims in the computational token. The display information is configured to allow the principal to view the display token.

  • Pub Date: 2005/19/12
  • Number: 07788499
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Providing SIP signaling data for third party surveillance

A method for facilitating surveillance of a targeted user participating in communication sessions conducted over a communications network, such as a voice over Internet protocol (VoIP) network, that employs a session initiation protocol (SIP). The method includes receiving a subscription request from a third party subscriber, the subscription request identifying a targeted user to be monitored, monitoring communication sessions in which the targeted user is a participant, to detect SIP events corresponding to state transitions associated with the communication sessions. A system for facilitating surveillance of a targeted user includes an application programming interface (API) operable to receive a subscription request from a third party subscriber, the subscription request identifying the targeted user, wherein the third party subscriber is not a participant in the one or more communication sessions, and a SIP events monitoring module operable to detect one or more predetermined SIP events associated with the communication sessions based on the subscription request and notify the third party subscriber of the detected SIP events.

  • Pub Date: 2005/19/12
  • Number: 08689317
  • Owner: Level 3 Communications, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-segment string search

A method and system for searching multi-segment strings is provided. The search system receives a query string containing part or all of the segments that are to be matched as query segments. Upon receiving the query string, the search system compares the query segments provided in the query string with segments gathered from previously stored strings. If any segments match the query segments, the search system selects the strings that contain matching segments as search results.

  • Pub Date: 2005/19/12
  • Number: 07756859
  • Owner: Intentional Software Corporation
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for performing fast power control in a mobile communication system

A method and apparatus for controlling transmission power in a mobile communication system is disclosed. The method disclosed provides for a closed-loop power control method for variable rate transmissions. The power of transmissions is varied in accordance with the rate of the frames of data being transmitted. The transmission power between the rates can be a fixed or variable difference.

  • Pub Date: 2005/19/12
  • Number: 07986749
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying changes to an image file

Editing an image is disclosed. Editing may include receiving a marking on the image, activating a command interface in response to the marking, receiving a command via the command interface, and applying the command to a portion of the image, where the portion is determined based at least in part on the marking.

  • Pub Date: 2005/19/12
  • Number: 07986298
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing multiple grammars in a speech recognition system

Systems and methods are described for a speech system that manages multiple grammars from one or more speech-enabled applications. The speech system includes a speech server that supports different grammars and different types of grammars by exposing several methods to the speech-enabled applications. The speech server supports static grammars that do not change and dynamic grammars that may change after a commit. The speech server provides persistence by supporting persistent grammars that enable a user to issue a command to an application even when the application is not loaded. In such a circumstance, the application is automatically launched and the command is processed. The speech server may enable or disable a grammar in order to limit confusion between grammars. Global and yielding grammars are also supported by the speech server. Global grammars are always active (e.g., “call 9-1-1”) while yielding grammars may be deactivated when an interaction whose grammar requires priority is active.

  • Pub Date: 2005/16/12
  • Number: 07720678
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing interactions from multiple speech-enabled applications

Systems and methods are described for speech systems that utilize an interaction manager to manage interactions—also known as dialogues—from one or more applications. The interactions are managed properly even if multiple applications use different grammars. The interaction manager maintains an interaction list. An application wishing to utilize the speech system submits one or more interactions to the interaction manager. Interactions are normally processed in the order in which they are received. An exception to this rule is an interaction that is configured by an application to be processed immediately, which causes the interaction manager to place the interaction at the front of the interaction list of interactions. If an application has designated an interaction to interrupt a currently processing interaction, then the newly submitted application will interrupt any interaction currently being processed and, therefore, it will be processed immediately.

  • Pub Date: 2005/16/12
  • Number: 08374879
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Scalable integrated high density optical data/media storage delivery system

An apparatus and system for recording, playing, handling, and storing a plurality of media disks in a plurality of configurations and a device for moving any disk into and out of a media disk storage mechanism and into or out of a selected media player/recorder on demand, and a controller for directing operation of the device for moving the disks and controlling selection of operation of the media disk storage mechanism.

  • Pub Date: 2005/16/12
  • Number: 07673309
  • Owner: Hie Electronics, Inc.
  • Location: McKinney, US
  • Details: Visit USPTO

Visit USPTO Page


Online storage volume shrink

Described is a technology by which a new volume or partition may be created on a disk, e.g., by running a shrink program and then reclaiming freed space. Shrink occurs online, while the user or system processes may be otherwise using the disk for reads and writes. Further, the technology operates while protecting snapshot versions of the volume. To shrink, upon receiving a request to shrink a volume to within a boundary, new allocations are restricted such that any allocation is to a volume area within the boundary. Data is moved from outside the boundary to within the boundary, and the shrink is committed when no volume data remains outside the boundary. A reduced-size volume or partition that does not include the specified region is committed when the data has been moved out of the specified region. A new volume or partition may be freed that corresponds to the region.

  • Pub Date: 2005/16/12
  • Number: 07409523
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Interfacing with ink

The present invention relates to interfacing with electronic ink. Ink is stored in a data structure that permits later retrieval by applications. The ink includes stroke information and may include property information. Through various programming interfaces, one may interact with the ink through methods and setting or retrieving properties. Other objects and collections may be used as well in conjunction with the ink objects.

  • Pub Date: 2005/16/12
  • Number: 2071448
  • Owner: Mircosoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Graphical interface for defining mutually exclusive destinations

A user defines mutually exclusive inbox and spam folders to which emails are routed based on a rating assigned to each email. A variable user-defined range defines a mapping of the ratings to each folder. Incoming emails are routing to one of the folders according to the range. A reference set of emails is designated, each having a rating and either an inbox label or a spam label. A display indicates the number the reference emails in each folder if the reference emails are routed to one of the folders according to their ratings and according to the user-defined range.

  • Pub Date: 2005/16/12
  • Number: 2076769
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Fault-tolerant communications in routed networks

A method for providing fault-tolerant network communications between a plurality of nodes for an application, including providing a plurality of initial communications pathways over a plurality of networks coupled between the plurality of nodes, receiving a data packet on a sending node from the application, the sending node being one of the plurality of nodes, the data packet being addressed by the application to an address on one of the plurality of nodes, and selecting a first selected pathway for the data packet from among the plurality of initial communications pathways where the first selected pathway is a preferred pathway.

  • Pub Date: 2005/16/12
  • Number: 07821930
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic document versioning method and updated document supply method using version number based on XML

Methods and apparatus for versioning an electronic document based on XML and methods and apparatus for providing an updated electronic document based on XML can use a version value. The electronic document being managed can use a syntax defining a structure of the structured electronic document. One method is characterized in that date information of when a content of the electronic document is changed is used as a version value.

  • Pub Date: 2005/16/12
  • Number: 07398466
  • Owner: LG Electronics, Inc.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Application-based specialization for computing nodes within a distributed processing system

A distributed processing system is described that employs “application-based” specialization. In particular, the distributed processing system is constructed as a collection of computing nodes in which each computing node performs a particular processing role within the operation of the overall distributed processing system. Each of the computing nodes includes an operating system, such as the Linux operating system, and includes a plug-in software module to provide a distributed memory operating system that employs the role-based computing techniques. An administration node maintains a database that defines a plurality of application roles. Each role is associated with a software application, and specifies a set of software components necessary for execution of the software application. The administration node deploys the software components to the application nodes in accordance with the application roles associates with each of the application nodes.

  • Pub Date: 2005/16/12
  • Number: 08151245
  • Owner: Computer Associates Think, Inc.
  • Location: Islandia, US
  • Details: Visit USPTO

Visit USPTO Page


Tracking and blocking of spam directed to clipping services

A method and apparatus tracks and blocks content requested by a first remote device for forwarding over a network to a second remote device. For a given content item, one or more usage identities are tracked. Usage identities may include any combination of one or more of a source identity, a content identity, and/or a destination identity. One or more thresholds associated with the tracked usage identities are applied to determine whether a request to forward content should be blocked; a threshold is a limit on the number of times a content item having a particular usage identity may be forwarded within a time period. Misuse of content-forwarding messaging services by spammers and the like may thereby be discouraged. In one embodiment, the invention may be employed as part of a content clipping service for forwarding content to mobile devices by way of SMS or another mobile messaging technology.

  • Pub Date: 2005/15/12
  • Number: 2067635
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Time-anchored posterior indexing of speech

A computer-implemented method of indexing a speech lattice for search of audio corresponding to the speech lattice is provided. The method includes identifying at least two speech recognition hypotheses for a word which have time ranges satisfying a criteria. The method further includes merging the at least two speech recognition hypotheses to generate a merged speech recognition hypothesis for the word.

  • Pub Date: 2005/15/12
  • Number: 07831425
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Telephony and data network services at a telephone

A packetised data network includes IP telephones (ITs) and a network intelligence (NI). All of the keys of each IT are “soft” keys (i.e., they have no fixed function). The NI associates a configuration data structure with the IT which correlates the keys with functions, and, based on this, may control the display of the IT to indicate the current function of certain of the soft keys. Some of the functions are requests for data services at the telephone (e.g., video or programmed audio over the internet). When a user requests such a service with a key press, the NI sets up the service between the data source and the telephone. This may require associating a new configuration data structure with the keys of the IT. The IT user may activate multiple data services through the NI.

  • Pub Date: 2005/15/12
  • Number: 07660295
  • Owner: Nortel Networks Limited
  • Location: St. Laurent, Quebec, CA
  • Details: Visit USPTO

Visit USPTO Page


Smart soft keyboard

Methods of using a soft keyboard are disclosed. A soft keyboard having one or more soft keys with a symbol displayed on the one or more soft keys is provided. A modifier may be applied to one of the symbols displayed on one of the soft keys by selecting the soft key and then providing a directional input. In an embodiment, different directional inputs are associated with different modifiers so that different symbols are inputted depending on the directional input. In an embodiment, a user may prove the direction input with a touch and directional drag of a selector across a touch sensitive screen. In an embodiment, a plurality of symbols associated with a plurality of modifying keys are made visible after the soft key is selected so that the user can visually determine which directional input will provide the desired symbol.

  • Pub Date: 2005/15/12
  • Number: 07554529
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Single logical network interface for advanced load balancing and fail-over functionality

The invention sets forth an approach for aggregating a plurality of NICs in a computing device into a single logical NIC as seen by that computing device's operating system. The combination of the single logical NIC and a network resource manager provides a reliable and persistent interface to the operating system and to the network hardware, thereby improving the reliability and ease-of-configuration of the computing device. The invention also may improve communications security by supporting the 802.1X and the 802.1Q networking standards.

  • Pub Date: 2005/15/12
  • Number: 08572288
  • Owner: Nvidia Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Secure and stable hosting of third-party extensions to web services

Described herein are one or more computer operating environments that include a standard set of web services via a communications network (e.g., the Internet) and a mechanism for extending the standard set of web services to execute one or more extended web services. Since these extended web services may be produced by an unconfirmed or untrusted source (e.g., a third-party software developer), the described computer operating environments isolate the extended web services from the standard set of web services and from the communication network. Furthermore, each extended web service is an isolated process (isoproc) with a limited ability to communicate with other services. In particular, each isoproc's ability to communicate is limited to only associated defined communication channels over which it has express permission to communicate.

  • Pub Date: 2005/15/12
  • Number: 08849968
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Scheduling and searching meetings in a network environment

Provided are a method, system, and program for scheduling and searching meetings in a network environment. A form is transmitted over a network to be rendered at an organizer computer to enable entry of information on a meeting. The form is received having organizer entered information on one meeting. The information in the received form is stored in a meeting database, wherein the stored information from the received form is associated with the meeting identified in the received form. A user computer accessed by a user is enabled to register for at least one selected meeting. An email database accessed by the user is updated automatically to include information on the at least one selected meeting indicated.

  • Pub Date: 2005/15/12
  • Number: 08171104
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Providing meeting information from a meeting server to an email server to store in an email database

Provided are a method, system, and program for providing meeting information from a meeting server to an email server to store in an email database. A meeting database has information on scheduled meetings. A meeting server manages access to the meeting database. The meeting server calls an email server to provide information on meetings from the meeting database to an email database including email accounts and calendars of scheduled events for users. The email server manages access to the email database. The email server stores the provided information on the meetings in the email database in response to the call from the meeting server. The email server updates the calendar of scheduled events in the email database for one of the users to include information from the email database on at least one meeting.

  • Pub Date: 2005/15/12
  • Number: 08433753
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for dynamically generating a watermarked document during a printing or display operation

A dynamic watermarking capability is implemented in an enterprise rights management (ERM) or similar system that comprises a central server to which end user client machines are connectable. The central server has a database in which watermark definitions created by authorized entities are centrally stored. An end user client machine is provided with a client component that typically includes wrapper code, and watermarking rendering code. The wrapper and rendering code are instantiated when a given calling application is started, or when the application initiates a given rendering function such as a print or display operation. When the calling application begins the rendering operation, the wrapper code intercepts a given rendering function call, connects to the central server and then retrieves a watermark definition. Alternatively, the watermark definition is retrieved when a document to be rendered is first accessed on the client machine. The watermark definition is then applied by the watermark rendering code, preferably using local rendering resources.

  • Pub Date: 2005/15/12
  • Number: 08321947
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Learning statistically characterized resonance targets in a hidden trajectory model

A statistical trajectory speech model is constructed where the targets for vocal tract resonances are represented as random vectors and where the mean vectors of the target distributions are estimated using a likelihood function for joint acoustic observation vectors. The target mean vectors can be estimated without formant data. To form the model, time-dependent filter parameter vectors based on time-dependent coarticulation parameters are constructed that are a function of the ordering and identity of the phones in the phone sequence in each speech utterance. The filter parameter vectors are also a function of the temporal extent of coarticulation and of the speaker's speaking effort.

  • Pub Date: 2005/15/12
  • Number: 2053981
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Grid automation bus to integrate management frameworks for dynamic grid management

Methods and apparatus that integrate management frameworks with an enterprise manager in a grid computing environment are disclosed. According to one aspect of the present invention, a grid computing system includes a management arrangement and at least a first management framework. The management arrangement includes an integration arrangement that brokers requests. The first management framework sends a first request to the integration arrangement which effectively allows the first management framework to communicate bi-directionally with the management arrangement.

  • Pub Date: 2005/15/12
  • Number: 07673029
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic quality of service (QOS) provisioning using session initiation protocol (SIP) module in wireless base stations

A method, apparatus and/or system for communicating in a wireless network may dynamically create and/or delete a medium access control (MAC) quality of service (QoS) connection in a wireless link between a base station and a mobile station. Each wireless base station in the network may include a packet classifier to quickly identify packets that may include session initiation protocol (SIP) messages and SIP logic to trigger the MAC QoS connection based on a received SIP message. Various other detailed embodiments and variants are also disclosed.

  • Pub Date: 2005/15/12
  • Number: 07787470
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Data processing system having a plurality of storage systems

It is an object of the present invention to conduct data transfer or data copying between a plurality of storage systems, without affecting the host computer of the storage systems. Two or more auxiliary storage systems B, C are connected to a primary storage system A connected to a host device . The auxiliary storage systems B, C read journals of data update from the primary storage system A at respective independent timings, save the journals in prescribed logical volumes JNL 2, JNL 3, produce copying of the data present in the primary storage system A based on the journals present in the logical volumes JNL 2, JNL 3 at the independent timings, and save the copies in auxiliary logical volumes COPY 1, COPY 3. The primary storage system A holds the journals till both auxiliary storage systems B, C read the journals and restore. The timing of journal read can be controlled according to the journal quantity, processing load, and the like.

  • Pub Date: 2005/15/12
  • Number: 07457929
  • Owner: Hitachi, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Compositions and aqueous dispersions

An aqueous dispersion including (A) at least one base polymer selected from the group consisting of an ethylene-based co-polymer and a propylene-based co-polymer; (B) at least one polymeric stabilizing agent; and at least one filler; wherein the polymeric stabilizing agent is different from the at least one base polymer and is compatible with the at least one base polymer and the at least one filler, and wherein the dispersion has filler in the range of greater than 0 to about 600 parts per hundred parts of a combined amount of the at least one base polymer and the polymeric stabilizing agent is disclosed.

  • Pub Date: 2005/15/12
  • Number: 08043713
  • Owner: Dow Global Technologies LLC
  • Location: Midland, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for managing firmware verification on a wireless device

Apparatus, methods, processors and machine readable media for verifying the integrity of firmware on a wireless device. Aspects include generating a verification scheme for testing the integrity of firmware on a wireless device and transmitting the verification scheme to the wireless device. The wireless device applies the verification scheme to the firmware and obtains a verification test result, which is forwarded for analysis. An analyzer compares the generated verification test result with a predetermined test result to obtain an integrity determination that indicates the integrity of the firmware. In some aspects, control commands to change an operational characteristic of the wireless device may be generated based on the integrity determination.

  • Pub Date: 2005/15/12
  • Number: 07907531
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Polymer composite photonic particles

A method for forming photonic particles, where the method includes the steps of preparing a porous photonic material layer, patterning a soluble polymer on the porous photonic material layer, leaving dividing portions of the material layer untreated, infusing the polymer into the material layer, and removing the dividing portions of the material to obtain the photonic particles.

  • Pub Date: 2005/14/12
  • Number: 08206780
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer program products for implementing bandwidth control services

Methods, systems, and computer program products for implementing bandwidth control services are provided. The method includes assigning a quality of service preference to a device. The method also includes associating a service session with the device. The method further includes executing a control action for at least one other simultaneously occurring service session when a quality of service level of the service session differs from the quality of service preference by a specified degree. The control action is operable for producing and maintaining the quality of service preference.

  • Pub Date: 2005/14/12
  • Number: 08098582
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Messaging system based building control

An arrangement using an Instant Messaging (“IM”) chat-type interface for monitoring and controlling devices in an automated home is provided. The automated home is arranged to be accessible as an IM contact (often called a “buddy”) to a user of an IM service that is located remotely from the automated home. After initiating an IM chat session, the user queries the status of systems and devices in the automated home, and operates devices in the automated home. In various illustrative examples, natural language commands are utilized to enable the user to ask simple questions regarding the status of devices in the home, take a virtual “walk through” the home, and turn devices on and off, among other options. As IM interfaces are being increasingly used on a variety of devices including mobile phones and personal digital assistants, users can conveniently access and control their automated home while traveling.

  • Pub Date: 2005/14/12
  • Number: 07403838
  • Owner: General Instrument Corporation
  • Location: Horsham, US
  • Details: Visit USPTO

Visit USPTO Page


Graphical user interface to facilitate rapid and reliable electronic trading assessment and execution

An electronic trading user interface allows a trader to react to market conditions very quickly in order to give the trader an improved probability of trading at a desired price and volume. The electronic order process is made faster, more efficient, and more reliable. The construction and sending of orders may be performed using a simple “click” of a mouse or other input device. The current market data is presented dynamically and in a user-friendly way to allow a trader to quickly assess the current market situation, including the trader's own orders, and to send orders quickly and reliably. Different embodiments are presented that ensure that the trader sends the order at the price intended, which is particularly desirable when the market is moving simultaneously or very close in time with when the trader is selecting and placing an order.

  • Pub Date: 2005/14/12
  • Number: 07805355
  • Owner: ORC Software AB
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Audio privacy method and system

Provided is a method and system for audio privacy that includes receiving a first sound signal at a microphone proximal to a user's ear, generating a second sound signal based on the first sound signal and a stored filter, the second sound signal interfering with the first sound signal, and emitting the second sound signal from a speaker proximal to the user's ear.

  • Pub Date: 2005/14/12
  • Number: 08059828
  • Owner: TP Lab Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Architecture for a hybrid STM/ATM add-drop multiplexer

Architecture for a SONET network element. The architecture includes an interconnection system for a network element, including a line unit slot, a switch fabric slot, and service unit slots. The line unit slot is connected as a hub to the switch fabric slot and the service unit slots in a first star interconnection configuration. The switch fabric slot is connected as a hub to the line unit slot and the service unit slots in a second star interconnection configuration. The star interconnection configurations provide fault isolation between different units, and allow for replacement of failed units without interfering with the links of other units to the hub. A service unit is provided including a first backplane interface for connecting with an ATM star interconnect configuration within the network element, and a second backplane interface for connecting to an STM star interconnect configuration within the network element.

  • Pub Date: 2005/14/12
  • Number: 07428236
  • Owner: Fujitsu Limited
  • Location: Kanagawa-ken, JP
  • Details: Visit USPTO

Visit USPTO Page


Anti-cancer compounds

The invention provides bradykinin antagonists and pharmaceutically acceptable salts thereof having anti-cancer activity. These anti-cancer compounds are particularly useful for inhibiting the growth of lung and prostate cancers.

  • Pub Date: 2005/14/12
  • Number: 07427496
  • Owner: The Regents of the University of Colorado
  • Location: Denver, US
  • Details: Visit USPTO

Visit USPTO Page


Voltage-gated, pH-sensitive anion channel and its novel splice variant involved in taste sensation

The invention provides a novel splice-variant of the ClC-4 protein, termed ClC-4A. ClC-4A is expressed in taste bud cells and is involved in sour taste perception. The invention provides ClC-4A polynucleotides and ClC-4A polypeptides, vectors, host cells and ClC-4A specific antibodies as well as designing high potency taste stimuli, determining taste preferences in animals, developing breed-specific foods, and modifying the taste of foods and medications.

  • Pub Date: 2005/13/12
  • Number: 07785807
  • Owner: Monell Chemical Senses Center
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Runtime detection for invalid use of zero-length memory allocations

Methods for handling zero-length allocations are disclosed. An example of such a method may include returning a self-describing/diagnosing dynamic address that has all the properties required for a secure implementation. Another example may include returning a series of different addresses (instead of a single address per process) to improve supportability. Yet another example may include maintaining diagnostic information about the original allocation for ease of problem resolution.

  • Pub Date: 2005/13/12
  • Number: 2076971
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Robotics programming interface

A programming interface for a hardware system includes an embedded layer for programmatic access to a physical realization of hardware, a simulation system for simulation of the hardware, and a diagnostics engine that analyzes and compares feedback data from the simulation system and the physical realization. The programming interface may be usefully employed, for example, in the design, purchase, and deployment of robotics for semiconductor manufacturing.

  • Pub Date: 2005/13/12
  • Number: 07890194
  • Owner: Brooks Automation, Inc.
  • Location: Chelmsford, US
  • Details: Visit USPTO

Visit USPTO Page


Object loading and unloading system

An object loading and unloading system for loading and unloading objects in a graphically simulated virtual environment, or virtual world, is described. A world object manager manages multiple object loaders to load and unload objects as geographic cells move within and out of a loading radius of each loader based on a position of a camera or view within the virtual world. Each object loader has an associated priority level, and the world object manager notifies a loader to load its corresponding objects in a cell only after all loaders having higher priority levels, which also have that cell in their respective loading radii, have already loaded their corresponding objects in that cell. The world object manager may expose various programming interfaces to provide an extensible object loading system whereby third parties can define new loaders to be incorporated into the hierarchical spatial object loading system.

  • Pub Date: 2005/13/12
  • Number: 07804501
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing end-to-end testing of an IP-enabled network

Systems and methods are disclosed for providing network testing. The disclosed systems and methods may include connecting to at least one element within a network. Furthermore, the disclosed systems and methods may include performing a test on the network through at least one element. The test may be associated with at least one addressable device connected to the network. In addition, the disclosed systems and methods may include analyzing data associated with the test.

  • Pub Date: 2005/13/12
  • Number: 07940676
  • Owner: AT&T Intellectual Property I, LP
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Joint IP/optical layer restoration after a router failure

A method and system for providing joint IP/Optical Layer restoration mechanisms for the IP over Optical Layer architecture, particularly for protecting against router failure within such architecture, includes any one of plural node elements participating in the detection and restoration of the joint IP/Optical Layer architecture upon the failure of a router in one of the nodes. The plural node elements may include, but are not limited to, one of plural routers and an optical cross-connect.

  • Pub Date: 2005/13/12
  • Number: 09042720
  • Owner: AT&T Intellectual Property II, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic replacement of system call tables

Techniques are disclosed that exploit system call mechanism to effect robust security applications. In one particular case, security software is able to effectively “sandbox” user mode applications at the thread granularity level, by replacing the system call mechanism of the operating system with a custom mechanism that limits the rights available to a target application that is vulnerable to malicious attack. The techniques allow the security software to create service tables with varying degrees of security levels, and do not impact performance of non-targeted running processes/threads.

  • Pub Date: 2005/13/12
  • Number: 07685638
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Communication system with configurable shared line privacy feature

A PBX system with a shared line connected to a plurality of telephone devices includes one or more processors that control a connection for an incoming call from a caller, the one or more processors being operable to access a listing that includes one or more callers or calling numbers designated as private to a first telephone device. The one or more processors being further operable to send an alert to only the first telephone device in the event that the one or more callers or the calling numbers in the listing includes a caller or calling number associated with the incoming call. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.

  • Pub Date: 2005/13/12
  • Number: 08243895
  • Owner: Cisco Technology, Inc.
  • Location: Islandia, US
  • Details: Visit USPTO

Visit USPTO Page


Using virtual hierarchies to build alternative namespaces

A containment mechanism provides for the grouping and isolation of multiple processes running on a single computer using a single instance of the operating system. A system is divided into one or more side-by-side and/or nested isolated environments enabling the partitioning and controlled sharing of resources by creating different views of hierarchical name spaces via virtual hierarchies.

  • Pub Date: 2005/12/12
  • Number: 08539481
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Using file access patterns in providing an incremental software build

Those files accessed by tools during a build process are invisibly tracked in such a way that the information can then be used to drive an incremental build of just enough files to bring the build fully up to date. The tracking information includes the association between distinct tool processes. Each build tool has its own file activity tracked, each thread of operation within tools are tracked separately and a tracking log is associated with a chain of tool processes so that when the tracking logs are interpreted the context in which they were created is preserved.

  • Pub Date: 2005/12/12
  • Number: 07797689
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Use of rules engine to build namespaces

A containment mechanism provides for the grouping and isolation of multiple processes running on a single computer using a single instance of the operating system. A system environment is divided into one or more side-by-side and/or nested spaces enabling the partitioning and controlled sharing of resources by creating different views of hierarchical name spaces via virtual hierarchies. A set of declarative rules specifying access capabilities may specify a set of filter drivers to be used to limit access to nodes in the hierarchical name space. The rules may be applied in sequence to construct a new name space from an existing one, or to add to an existing hierarchy. Filter drivers are used to limit access to nodes in the new name space or new portion of the name space. Access to nodes can be limited (read-only access instead of read/write) or nodes can be hidden altogether. Rules may be specified in a declarative language such as XML.

  • Pub Date: 2005/12/12
  • Number: 08312459
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Tracking file access patterns during a software build

Those files accessed by tools during a build process are invisibly tracked in such a way that the information can then be used to drive an incremental build of just enough files to bring the build fully up to date. The tracking information includes the association between distinct tool processes. Each build tool has its own file activity tracked, each thread of operation within tools are tracked separately and a tracking log is associated with a chain of tool processes so that when the tracking logs are interpreted the context in which they were created is preserved.

  • Pub Date: 2005/12/12
  • Number: 2073274
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for patient temperature control employing temperature projection algorithm

Embodiments of the invention provide a system for temperature control of the human body. The system includes an indwelling catheter with a tip-mounted heat transfer element. The catheter is fluidically coupled to a console that provides a heated or cooled heat transfer working fluid to exchange heat with the heat transfer element, thereby heating or cooling blood. The heated or cooled blood then heats or cools the patient's body or a selected portion thereof. In particular, methods and devices, including software, are provided for administering cooling or rewarming and controlling the same based on a projected control temperature measured by a temperature sensor within the catheter.

  • Pub Date: 2005/12/12
  • Number: 07914564
  • Owner: Innercool Therapies, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Special group logon tracking

A method of generating a computer user activity log for a user belonging to a specially monitored group includes allowing a user to logon to a local computer. The local computer verifying the user account credentials and creating a user logon session. A token is created by the local computer for identification of any group membership with which the user associated and also having the user access privileges. The group information in the token is compared with a specially monitored group list. The specially monitored group list may be obtained from a domain server or may be configured locally. If the user has membership in the specially monitored group, then a special logon session is created and activities of the user are recorded.

  • Pub Date: 2005/12/12
  • Number: 07690036
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing a kernel of an operating system among logical partitions

Sharing a kernel of an operating system among logical partitions, including installing in a partition manager a kernel of a type used by a plurality of logical partitions; installing in the partition manager generic data structures specifying computer resources assigned to each of the plurality of logical partitions; and providing, by the kernel to the logical partitions, kernel services in dependence upon the generic data structures.

  • Pub Date: 2005/12/12
  • Number: 09189291
  • Owner: International Business Machines Corporation
  • Location: Amonk, US
  • Details: Visit USPTO

Visit USPTO Page


Robust end-of-log processing

A method of invalidating an unused log file in a database includes examining a discard log information storage area and determining if a discard log exists. If the discard log exists, the log is invalidated. The headers of each of the log files that have been fully invalidated are then invalidated. The discard log is then fully invalidated and a new log file may be generated on top of the discarded log. The method may be interrupted by a failure, a changeover, or crash and will be repeated until it completes.

  • Pub Date: 2005/12/12
  • Number: 07756838
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time computer simulation of water surfaces

Real-time simulation of liquids is disclosed. A liquid may be modeled as a collection of particles. Particles separated from one or more nearest neighbor particles by a distance greater than a threshold distance may be separated out as droplets. An iso-surface may then be determined and rendered for the particles not separated out as droplets. The droplets may be rendered as sprites.

  • Pub Date: 2005/12/12
  • Number: 07948485
  • Owner: Sony Computer Entertainment Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Parser, code generator, and data calculation and transformation engine for spreadsheet calculations

A system including spreadsheet sheets, makes calculations and data transformations, which is available through a programming interface, and conforms to the grammar and syntax of a target software development language is presented. The system includes an Object Model with Data Structures representing entities involved in spreadsheets. The system includes a Parser and Code Generator that extracts data from a body of spreadsheet data, instantiates instances of Data Structures of the Object Model to represent the spreadsheet data, parses the data and formulas contained in the cells of the spreadsheets, iterates through the instantiated instances of the Data Structures, and generates source code that performs the calculations and data transformations embodied in the spreadsheet data. The system includes a Calculation Engine with software base classes that implement the common structural and data access features of spreadsheet data, and further implement the operations of common spreadsheet functions and operators.

  • Pub Date: 2005/12/12
  • Number: 07836425
  • Owner: Knowledge Dynamics, Inc.
  • Location: Glenview, US
  • Details: Visit USPTO

Visit USPTO Page


Oxidation resistant coatings for ultra high temperature transition metals and transition metal alloys

The invention provides oxidation resistant coatings for transition metal substrates and transition metal alloy substrates and method for producing the same. The coatings may be multilayered, multiphase coatings or gradient multiphase coatings. In some embodiments the transition metal alloys may be boron-containing molybdenum silicate-based binary and ternary alloys. The coatings are integrated into the substrates to provide durable coatings that stand up under extreme temperature conditions.

  • Pub Date: 2005/12/12
  • Number: 07560138
  • Owner: Wisconsin Alumni Research Foundation
  • Location: Madison, US
  • Details: Visit USPTO

Visit USPTO Page


OS mini-boot for running multiple environments

An intra-operating system isolation mechanism called a silo provides for the grouping and isolation of processes running on a single computer using a single instance of the operating system. The operating system enables the controlled sharing of resources by providing a view of a system name space to processes executing within an isolated application called a server silo. A server silo is created by performing a separate “mini-boot” of user-level services within the server silo. The single OS image serving the computer employs the mechanism of name space containment to constrain which server silos can use which resource(s). Restricting access to resources is therefore directly based on the process or application placed in the server silo rather than who is running the application because if a process or application is unable to resolve a name used to access a resource, it will be unable to use the resource.

  • Pub Date: 2005/12/12
  • Number: 07447896
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for determining inventory health with respect to a disposition channel

A method and system for determining inventory health with respect to a disposition channel. A method may include specifying a target inventory level of an inventory item; determining a rate of sales demand of the item; and determining a breakeven holding time of units of the item in excess of the target level, where a cost of holding a unit until the breakeven holding time equals, within an equality threshold, a difference between a sales channel value and a disposition channel value for the item. The method may additionally include determining a healthy inventory level of the item that exceeds the target inventory level by the product of the sales demand rate and the breakeven holding time, and, if a current inventory level of the item exceeds the healthy level, disposing of excess units of the item via the disposition channel.

  • Pub Date: 2005/12/12
  • Number: 2017251
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for analyzing inventory purchasing opportunities with respect to inventory health

A method and system for determining analyzing an inventory purchasing opportunity with respect to inventory health. A method may include receiving an offer to purchase units of an inventory item via a purchasing channel for a purchase price per unit; determining a rate of sales demand of the item; and determining a breakeven holding time of existing units of the item, where a cost of holding a unit until the breakeven holding time equals, within an equality threshold, a difference between a sales channel value and the offer purchase price. The method may additionally include determining a healthy inventory level of the item that exceeds a target inventory level by a function of the sales demand rate and the breakeven holding time, and, if a current inventory level of the item exceeds the healthy level, declining to purchase units of said inventory item for the purchase price.

  • Pub Date: 2005/12/12
  • Number: 2035583
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing authentication using policy-controlled authentication articles and techniques

A method and apparatus provides first or second factor authentication by providing selectability of a plurality of second factor authentication policies associated with a second factor authentication article. The first or second factor authentication article includes authentication information, such as a plurality of data elements in different cells or locations on the authentication article, which can be located by using corresponding location information. The method and apparatus provides second factor authentication based on the first or second factor authentication article by enforcing at least one of the plurality of selected authentication policies.

  • Pub Date: 2005/12/12
  • Number: 09191215
  • Owner: Entrust, Inc.
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing authentication between a sending unit and a recipient based on challenge usage data

A method, apparatus and/or system generates a challenge for user authentication, having a challenge data element from a stored pool of challenge data elements. The challenge is based on rule data and stored usage data associated with at least some of the challenge data elements in the stored pool of challenge data elements. The generated challenge is sent for use in an authentication of a user to a sender. A method, apparatus and/or system also generates sender authentication and corresponding location information, having a data element from a stored pool of challenge data elements. Selection of the data elements is based on rule data and stored usage data associated with at least some of the data elements in the stored pool of data elements.

  • Pub Date: 2005/12/12
  • Number: 08966579
  • Owner: Entrust, Inc.
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


Interfaces for creation and access of extensible markup language paper specification documents

XPS documents are created and accessed via a collection of interfaces of various classes of an application programming interface. The application programming interface includes a document sequence class for reading and writing the document sequence of the XPS document, a fixed document class for reading and writing the fixed documents of the document sequence, a page class for reading and writing the pages of the fixed documents, and a resource class for accessing the resources of each page. Applications seeking to create or read XPS documents may utilize the application programming interface such that the complexities of creating and accessing the XPS document are abstracted away.

  • Pub Date: 2005/12/12
  • Number: 2071928
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Instrument-based distributed computing systems

An instrument-based distributed computing system is disclosed that accelerates the measurement, analysis, verification and validation of data in a distributed computing environment. A large computing work can be performed in a distributed fashion using the instrument-based distributed system. The instrument-based distributed system may include a client that creates a job. The job may include one or more tasks. The client may distribute a portion of the job to one or more remote workers on a network. The client may reside in an instrument. One or more workers may also reside in instruments. The workers execute the received portion of the job and may return execution results to the client. As such, the present invention allows the use of instrument-based distributed system on a network to conduct the job and facilitate decreasing the time for executing the job.

  • Pub Date: 2005/12/12
  • Number: 07908313
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Composite material with electron-donating and electron-accepting property, method for forming the same, and their application

The present invention discloses a composite material with electron-donating and electron-accepting property is disclosed, wherein the composite material comprises a plurality of nanoparticles with electron-accepting property, a plurality of diblock copolymers, and a bi-continuous structure. Each diblock copolymer comprises a first polymer chain with electron-donating property and a second polymer chain connected with the mentioned nanoparticles. Additionally, the bi-continuous structure containing a first domain and a second domain, wherein the bi-continuous structure is self-assembled from the diblock copolymers, wherein the first polymer chain is in the first domain, and the second polymer chain and the plurality of nanoparticles are in the second domain. Furthermore, this invention also discloses methods for forming the composite material and their applications.

  • Pub Date: 2005/12/12
  • Number: 2066701
  • Owner: National Taiwan University
  • Location: Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


Building alternative views of name spaces

A containment mechanism provides for the grouping and isolation of multiple processes running on a single computer using a single instance of the operating system. A system is divided into one or more side-by-side and/or nested spaces enabling the partitioning and controlled sharing of resources by creating different views of hierarchical name spaces by creating a new branch of an existing global system name space or by linking the sub-root level nodes of a new hierarchy to a subset of nodes in an existing global system name space.

  • Pub Date: 2005/12/12
  • Number: 07996841
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for multi-layered network communications

A multi-layered network for transporting data comprises a first network layer that provides a first session topology, and a second network layer that provides a second session topology. The second network layer uses the first network layer to transport data. In one embodiment of the invention, the data sent by the second layer is real-time audio data, such as voice. Each session topology may be either peer-to-peer or client/server. The first and second layers may have different topologies and/or different session hosts. A deterministic algorithm is provided whereby a new session host is selected when the current host leaves the session.

  • Pub Date: 2005/09/12
  • Number: 07668972
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing binary large objects

The invention regards a system () and method for managing BLOBs. The system combines a file subsystem () and a database subsystem (), wherein the database subsystem () comprises relations between file names of files () comprising a BLOB () and BLOB names. In the event of modification of a file () containing a BLOB (), a new file, having a new file name, is created, where a relation between the new file name and the BLOB name is created within a database transaction in the database subsystem (). By thus extending the ACID-properties of database transactions to files, it is ensured that operations on BLOBs in the system () meet the ACID-requirements while keeping the efficiency of operations on files.

  • Pub Date: 2005/09/12
  • Number: 07890481
  • Owner: Nuance Communications Austria GmbH
  • Location: Vienna, AT
  • Details: Visit USPTO

Visit USPTO Page


Method and system for efficiently handling navigational state in a portal

The present invention provides a method and system for efficiently handling navigational state by separating the latest navigational state into a base navigational state part and a delta navigational state part. The base navigational state which describes that part of the latest navigational state that is identical across all URLs is encoded in the header of the page markup to be submitted to the client's browser. The delta navigational part that describes the semantics of that specific URL is encoded in its associated URL. Each user interaction using such URL causes the browser to submit the base part as well as the delta part. On the server side the base and delta part are being merged resulting in new navigation state serving as a base for the rendering of the new page. The navigational state is represented as a hierarchical tree-like structure that can be serialized efficiently and compressed by prior art compression techniques. The hierarchical tree-like structure is based on a well-defined state model that is optimized in terms of state serialization. The state model arranges the contained navigational state information in character based information. That saves processing time as it avoids type conversion of navigational information. In addition the present invention includes further strategies to reduce the amount of information that must be serialized.

  • Pub Date: 2005/09/12
  • Number: 07801970
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Interface for series of tests

Methods and apparatus, including computer program products, for an interface that generates a report including a series of load test results. An interface can generate such a report that includes a series of load test results by initiating load testing of a first and second application during a first and second test run, and initiating combining of test results of the first and second test runs. The report can individually characterize the test results as members of a series of test runs. Load testing and combining of test results can be initiated at a single interface.

  • Pub Date: 2005/09/12
  • Number: 07412349
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Importing and exporting markup language data in a spreadsheet application document

XML data is associated with an XML schema file defining XML data types and data type definitions for applying XML data to the document. An XML data map is prepared that relates that any XML data applied to the document back to corresponding XML elements or attributes defined in the associated schema file. When the document is imported into a spreadsheet application grid, the data map is parsed to find XPATHs in the imported spreadsheet document of XML data and the user entered data. After an imported document has been edited, or after a document is created to include the application of XML data in association with a selected XML schema file, the document may be exported such that the XML data applied to the document is maintained for subsequent import and use of the document.

  • Pub Date: 2005/09/12
  • Number: 07954046
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Spreadsheet cell-based notifications

A workflow includes an activity that takes advantage of spreadsheet calculations. For a spreadsheet activity, calculation and extraction of values from a spreadsheet is performed. Thus, spreadsheet calculations are integrated into workflows without user intervention. After the workflow is complete, or after a spreadsheet activity is calculated, or upon a threshold or condition being met, a user or system may be notified (e.g., by email, instant message, etc.). Values from previous activities in the workflow may be obtained and provided to the spreadsheet (e.g., cell values are set, modified, or adjusted). The spreadsheet may then be recalculated using these obtained values. Moreover, values from the spreadsheet may be used in subsequent parts of the workflow. Also, any number of spreadsheet activities may be incorporated into a workflow, and one spreadsheet activity may provide values to a second spreadsheet activity in the workflow.

  • Pub Date: 2005/08/12
  • Number: 09501463
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Spreadsheet calculation as part of workflow

A workflow includes an activity that takes advantage of spreadsheet calculations. For a spreadsheet activity, calculation and extraction of values from a spreadsheet is performed. Thus, spreadsheet calculations are integrated into workflows without user intervention. Values from previous activities in the workflow may be obtained and provided to the spreadsheet (e.g., cell values are set, modified, or adjusted). The spreadsheet may then be recalculated using these obtained values. Moreover, values from the spreadsheet may be used in subsequent parts of the workflow. Also, any number of spreadsheet activities may be incorporated into a workflow, and one spreadsheet activity may provide values to a second spreadsheet activity in the workflow.

  • Pub Date: 2005/08/12
  • Number: 07908549
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Probability estimate for K-nearest neighbor

Systems and methods are disclosed that facilitate producing probabilistic outputs also referred to as posterior probabilities. The probabilistic outputs include an estimate of classification strength. The present invention intercepts non-probabilistic classifier output and applies a set of kernel models based on a softmax function to derive the desired probabilistic outputs. Such probabilistic outputs can be employed with handwriting recognition where the probability of a handwriting sample classification is combined with language models to make better classification decisions.

  • Pub Date: 2005/08/12
  • Number: 1987155
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for striping message payload data over a network

A method, an apparatus and a recording medium are provided for communicating message payload data, especially noncontiguous message data, from a first node of a network to a second node of the network in response to a request to transmit a message. Such method includes dividing the length of a data payload to be transmitted into a plurality of submessage payload lengths, i.e., into at least a first submessage payload length and a second submessage payload length. Then, a first ordered submessage is transmitted from the first node for delivery to the second node, the first ordered submessage having the first submessage payload length. A first state of an environment is then determined in the first node as if the step of transmitting the first ordered submessage were already completed. Without having to complete the step of transmitting the first ordered submessage, a second ordered submessage is then transmitted from the first node for delivery to the second node, the second submessage having the second submessage payload length, the second submessage being transmitted in a way that takes into account the first state of the environment in the first node.

  • Pub Date: 2005/08/12
  • Number: 07835359
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for performing temporal checking

An apparatus for performing temporal checking is disclosed. A signal logger for performing temporal checking includes a group of edge detection modules and a group of counting modules. During testing, the signal logger is coupled to a device under testing (DUT). Each of the edge detection modules is capable of maintaining edge information after a state transition on a signal within the DUT has been detected. Each of the counting modules is associated with one of the edge detection modules. Each of the countering modules is capable of maintaining a clock cycle count information associated with a detected edge. After the testing has been completed, temporal checking information on a signal within the DUT can be obtained by reconstructing the edge information and the associated clock cycle count information of the signal collected during the test.

  • Pub Date: 2005/08/12
  • Number: 1992940
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Fine silver particle colloidal dispersion, coating liquid for silver film formation, processes for producing these, and silver film

A process for producing a fine silver particle colloidal dispersion the fine silver particles of which have a larger average particle diameter than those in the conventional Carey-Lea process and also which has superior dispersion stability. An aqueous silver nitrate solution is allowed to react with a mixed solution of an aqueous iron(II) sulfate solution and an aqueous sodium citrate solution, and the resultant reaction fluid containing an agglomerate of fine silver particles is left at 0 to 100° C. to obtain an agglomerate of fine silver particles having grown into granular particles. Next, this agglomerate of fine silver particles having grown into granular particles is filtered, and, to the resultant cake of the agglomerate of fine silver particles, pure water is added to obtain a fine silver particle colloidal dispersion having an average particle diameter of 20 to 200 nm. This fine silver particle colloidal dispersion is concentrated and washed, further followed by addition of an organic solvent containing dimethyl sulfoxide, to obtain a coating liquid for silver film formation.

  • Pub Date: 2005/08/12
  • Number: 07922938
  • Owner: Sumitomo Metal Mining Co., Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Dialogue management using scripts and combined confidence scores

Representation-neutral dialogue systems and methods (“RNDS”) are described that include multi-application, multi-device spoken-language dialogue systems based on the information-state update approach. The RNDS includes representation-neutral core components of a dialogue system that provide scripted domain-specific extensions to routines such as dialogue move modeling and reference resolution, easy substitution of specific semantic representations and associated routines, and clean interfaces to external components for language-understanding (i.e., speech-recognition and parsing) and language-generation, and to domain-specific knowledge sources. The RNDS also resolves multi-device dialogue by evaluating and selecting among candidate dialogue moves based on features at multiple levels. Multiple sources of information are combined, multiple speech recognition and parsing hypotheses tested, and multiple device and moves considered to choose the highest scoring hypothesis overall. Confirmation and clarification behavior can be governed by the overall score.

  • Pub Date: 2005/08/12
  • Number: 07904297
  • Owner: Robert Bosch GmbH
  • Location: Stuttgart, DE
  • Details: Visit USPTO

Visit USPTO Page


Wireless controller device

A remote wireless device is provided that operates a user interface specific to a particular target application or device. The wireless device receives information regarding the status or operation of the target's application, and uses that information to determine what information and controls to present to the remote user. The remote user views information regarding the target application, and makes desired control selections using the available controls. The wireless device generates a message according to the control selections, and transmits the message to the target device. The target device acts responsive to the control message, and updated operational information may be sent to the remote wireless device.

  • Pub Date: 2005/07/12
  • Number: 07796982
  • Owner: Tor Anumana, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for shared browsing among a plurality of online co-users

Systems and methods for establishing and maintaining a shared browsing experience are disclosed. A method for establishing a shared browsing experience includes an inviter computer communicating to an invitee computer, via an online messenger communication path, an invitation to establish a co-browsing experience. The invitee computer communicates to the inviter computer, via the first communication path, an acceptance of the invitation. A co-browsing communication path is then established between the inviter computer and the invitee computer. Information relating to the shared browsing experience is then communicated between the inviter and invitee computers via the co-browsing communication path.

  • Pub Date: 2005/07/12
  • Number: 07937440
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for generating signal waveforms in a CDMA cellular telephone system

A system and method for communicating information signals using spread spectrum communication techniques. PN sequences are constructed that provide orthogonality between the users so that mutual interference will be reduced, allowing higher capacity and better link performance. With orthogonal PN codes, the cross-correlation is zero over a predetermined time interval, resulting in no interference between the orthogonal codes, provided only that the code time frames are time aligned with each other. In an exemplary embodiment, signals are communicated between a cell-site and mobile units using direct sequence spread spectrum communication signals. In the exemplary embodiment, transmit power of mobile unit signals is controlled based on signal power received by the mobile unit and power adjustment commands sent to the mobile unit.

  • Pub Date: 2005/07/12
  • Number: 07839960
  • Owner: Qualcomm Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Smart call delivery with GIS integration

A method of delivering a call to a called party's device. The method includes receiving a call directed to a wireline device and validating that a telephone number of the wireline device is associated with a telephone number of a wireless device. The method also includes transmitting a message to the wireless device, delivering the call to the wireline device when a return message is not received from the wireless device, and determining a location of the wireless device when a return message is received from the wireless device. The method further includes comparing the location of the wireless device with a location of the wireline device, delivering the call to the wireless device when the location of the wireless device is not within a predefined vicinity of the location of the wireline device, and delivering the call to the wireline device when the location of the wireless device is within a predefined vicinity of the location of the wireline device.

  • Pub Date: 2005/07/12
  • Number: 07668559
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Network management

A tool for managing a computer network includes a gateway service module that identifies a gateway for a network and a network information service module. The network information service module identifies devices in the network, determines at least one property for each of the identified devices, and creates a network information data structure for storing device properties. A communication agent service module transmits at least one determined device property to other agent service modules associated with the network, receives at least one device property from another agent service module associated with the network, and provides the received at least one property device to the network information service module. A method of monitoring a computer network is also provided. The method includes identifying devices in a network, determining at least one property for each of the identified devices, receiving at least one determined device property from another device the network, and creating a network information data structure for storing the determined device properties.

  • Pub Date: 2005/07/12
  • Number: 07925729
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for producing metallic iron nuggets

Method and system for producing metallic nuggets includes providing reducible mixture (e.g., reducible micro-agglomerates; reducing material and reducible iron bearing material; reducible mixture including additives such as a fluxing agent; compacts, etc.) on at least a portion of a hearth material layer. In one embodiment, a plurality of channel openings extend at least partially through a layer of the reducible mixture to define a plurality of nugget forming reducible material regions. Such channel openings may be at least partially filled with nugget separation fill material (e.g., carbonaceous material). Thermally treating the layer of reducible mixture results in formation of one or more metallic iron nuggets. In other embodiments, various compositions of the reducible mixture and the formation of the reducible mixture provide one or more beneficial characteristics.

  • Pub Date: 2005/07/12
  • Number: 2048970
  • Owner: Nu-Iron Technology, LLC
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for standoff detection of liveness

A method for remotely detecting whether a subject is alive, comprising the steps of determining a calibration spectral signature for light reflectance from living skin, normalizing the calibration spectral signature values to the calibration reflectance value at a reference wavelength, storing the normalized calibration spectral signature, determining a subject spectral signature of the light reflectance of a region of skin of the subject whose liveness is to be determined, normalizing the subject spectral signature values to the subject reflectance value at the reference wavelength, comparing the normalized subject spectral signature with the normalized calibration spectral signature for at least one wavelength, generating a subject liveness signal based on the comparison of the normalized subject spectral signature with the normalized calibration spectral signature, and emitting the subject liveness signal.

  • Pub Date: 2005/07/12
  • Number: 1974231
  • Details: Visit USPTO

Visit USPTO Page


API for network discovery

Discovery of a network to which a device is in communication and classifying the network is disclosed. The network may be classified as a network already known or a new network signature may be created where the network signature is made up of a network id, a link id and a hop id.

  • Pub Date: 2005/07/12
  • Number: 07590762
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Global visualization process for personal computer platforms (GVP+)

A system and process that incorporates hardware and software as elements to be combined with procedures and processes to obtain, format, store, combine, control, display, record, and visualize dynamic scenarios by interacting with accurate, realistic models and actual events within, on, and above a three-dimensional surface to be observed or modeled. The present invention software and process is capable of displaying extremely high resolution terrain models and imagery in real time over the entire surface of the planet, as well as a large number of moving entities and their associated graphical models. These features, combined with a network application programming interface (API), make the present invention suitable for flight simulation out-the-window displays, command and control scenarios, and mission review or rehearsal.

  • Pub Date: 2005/06/12
  • Number: 2025773
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Gas turbine combustor

A gas turbine engine has a combustor module including an annular combustor having a liner assembly that defines an annular combustion chamber having a length, L. The liner assembly includes a radially inner liner, a radially outer liner that circumscribes the inner liner, and a bulkhead, having a height, H, which extends between the respective forward ends of the inner liner and the outer liner. The combustor has an exit height, H, at the respective aft ends of the inner liner and the outer liner interior. The annular combustor has a ratio H/H having a value less than or equal to 1.7. The annular combustor may also have a ration L/H having a value less than or equal to 6.0.

  • Pub Date: 2005/06/12
  • Number: 07954325
  • Owner: United Technologies Corporation
  • Location: Hartford, US
  • Details: Visit USPTO

Visit USPTO Page


Server monitoring framework

A novel software framework monitors server statistics for a plurality of software modules and makes its collected statistics available to those modules. Unlike prior implementations, the framework provides shared server-monitoring code through which the plurality of software modules can monitor various types of servers, such as authentication servers, ICAP servers, origin servers, hierarchical proxy servers and so forth. Because the same server-monitoring code is accessed by each of the software modules, the overall amount of code that is written, compiled and executed may be reduced. Moreover, the shared server-monitoring code is not protocol-dependant and therefore may be coded outside of the kernel-level protocol engines. Preferably, the shared server-monitoring code is implemented as a user-level thread or process.

  • Pub Date: 2005/05/12
  • Number: 2054098
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Request linked digital watermarking

A method for digitally signing information in real-time, based on a user request for the information. In one embodiment, the method is useful in a Web server, and can be implemented using a server-side API filter. One embodiment of the method includes receiving a data request from a user and determining whether the data requested should be marked. If the data should be marked, the method includes marking the data with a signature identifying at least one component of the user request; and storing information identifying the user with the request and the at least one component. Multiple types of marking techniques can be used on a single data file.

  • Pub Date: 2005/05/12
  • Number: 08032755
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method for embedding object codes in source codes

Methods for embedding codes executable in a first system having a first microprocessor into codes executable in a second system having a second microprocessor are described herein. In one aspect of the invention, an exemplary method includes providing first codes having a routine, the first codes being compilable to be executed in the first system, and compiling the first codes, resulting in second codes; the second codes comprising opcodes of the routine executable by the first system, which convert the second codes into third codes automatically, the third codes being compilable to be executed by the second system; this is followed by compiling the third codes, resulting in the fourth codes being executable in the second system, and linking the fourth codes, generating an executable image and executing the executable image in the second system. Other methods and apparatuses are also described.

  • Pub Date: 2005/05/12
  • Number: 07694289
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing instant messaging status

A system for managing instant messaging status. An occurrence of an event for a user in a calendar application is detected. A status of the user for an instant messaging system is controlled during the occurrence of the event in response to detecting the occurrence of the event.

  • Pub Date: 2005/05/12
  • Number: 07584258
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Flexible display translation

A user interface for displaying source data and a translated copy of a segment of the source data is provided. The user interface includes a first display portion for displaying at least a subset of the source data on the display. The user interface includes a second display portion for displaying a translated copy of a selected segment of source data on the display.

  • Pub Date: 2005/05/12
  • Number: 07822596
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Triggerless interactive television

Various technologies and techniques are disclosed that relate to providing interactive television by synchronizing content to live and/or recorded television shows. Content is synchronized without the use of in-band triggers. A broadcast stream is received, and search/action pairs are received from a transmission path, such as from the Internet or user. When the search criteria are found in the broadcast stream, the associated action is performed and the content is synchronized with the show. An application programming interface is used to facilitate synchronization, and includes a set search method, a search function template method, and a clear search method. The set search method initiates searching of the broadcast stream and registers one or more callback methods for performing the associated action when the match is found. The search function template serves as the template for registering the callback methods. The clear search method clears the system resources from the search.

  • Pub Date: 2005/02/12
  • Number: 08307403
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Missing index analysis and index useage statistics

A method of accumulating and aggregating statistics concerning the use of database table indexes includes using a plurality of counters to register index use. The plurality of counters allow multiple instances of index usage to be recorded simultaneously. A missing index may be detected using an optimal index in a query plan. The optimal index is compared against the available indexes to determine if an index is missing. Statistics may be gathered against the used and missing indexes.

  • Pub Date: 2005/02/12
  • Number: 07769744
  • Owner: Microsoft Cororation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Filesystem snapshot enhancement to improve system performance

Reducing copy on write activity during snapshot backup processing in computer system. A snap shot of the data is created. As the backup of each file is successfully completed, the copy-on-write functionality for the file is disabled. As the backup of each other file is successfully completed, the copy-on-write for each other file is disabled.

  • Pub Date: 2005/02/12
  • Number: 2095310
  • Owner: Oracle International Corp.
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program product for dynamically enhancing an application executing on a computing device

A system, method and computer program product for dynamically enhancing a software application, such as a video game, executing on a computing device, without having to change and recompile the original application code. The system includes a staging environment that monitors the execution of the application and indexes each item of graphical and/or audio information generated by the application into a first database. A system administrator or other entity then populates a second database by manual or automated means with one or more business rules, wherein each business rule is associated with one or more of the objects indexed in the first database. The system further includes a run-time environment that identifies items of graphics and/or audio information as they are generated by the application during run-time, uses the second database to determine if an identified item is associated with a business rule, and, responsive to a determination that an identified item is associated with a business rule, applies the business rule.

  • Pub Date: 2005/01/12
  • Number: 07596540
  • Owner: Exent Technologies, Ltd.
  • Location: Petach-Tikva, IL
  • Details: Visit USPTO

Visit USPTO Page


Substituted piperazines as CB1 antagonists

or pharmaceutically acceptable salts, solvates, or esters thereof, are useful in treating diseases or conditions mediated by CBreceptors, such as metabolic syndrome and obesity, neuroinflammatory disorders, cognitive disorders and psychosis, addiction (e.g., smoking cessation), gastrointestinal disorders, and cardiovascular conditions.

  • Pub Date: 2005/01/12
  • Number: 07700597
  • Owner: Schering Corporation
  • Location: Kenilworth, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system and program for enabling resonance in communications

A method, computer program product, and system for collecting and processing feedback information in organizational communications. The system includes an information processing apparatus, a communications mechanism, a database, and a mechanism for collecting data. The communications mechanism operates with the information processing apparatus for providing communications to a user of the information processing apparatus. The database operates in conjunction with the information processing apparatus and the communications mechanism. The database stores data. The mechanism for collecting the data operates in response to the communications related to the user by the communications mechanism.

  • Pub Date: 2005/01/12
  • Number: 08112433
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Inserting value into customer account at point of sale using a customer account identifier

A method of adding a value to a customer account is provided. A request to add a value to a customer account of a customer is received from a point of sale terminal. Value identification data associated with the value and account identification data associated with the customer account may form part of the request. The customer account identification data may be entered at the point of sale. The request may be associated with a purchase of the value. The value may be caused to be added to the customer account. During subsequent value purchase transactions, additional value may be added to the account.

  • Pub Date: 2005/01/12
  • Number: 07630926
  • Owner: e2Interactive, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Functional polymers via surface modifying agents, and methods for polymeric surface modification

Polymers, and particularly conventional commodity bulk polymers, are modified to have a surface activity of interest using a surface modifying polymer that includes a moiety that favors migration to the surface of the bulk polymer together with a moiety provides the activity of interest (e.g., biocidal, wettability modifying (hydrophobic or hydrophilic), resistance to radiant energy, providing a functional group for functionalizing the surface, etc.). The surface modifying polymer is combined with the bulk polymer, and, due to the presence of the moiety that favors migration, concentrates primarily on the surface of the bulk polymer such that the moiety that provides the activity of interest is located primarily on the surface of the bulk polymeric article which is produced. Advantageously, only a minimal amount (such as, e.g., about 2 weight %) of polymeric surface modifier is needed. Being able to achieve desired properties (such as biocidal activity, wettability modification, etc.) without needing much polymeric surface modifier is highly advantageous.

  • Pub Date: 2005/01/12
  • Number: 07771793
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Displaying results of server-side form validations without page refresh

According to one embodiment of the invention, a technique is provided for validating user-entered data at a server without requiring a page refresh at a client. A server sends, toward a client, a page that comprises a form through which the client's user can input data. The page comprises instructions that cause the client to send, toward the server, data that the user inputted into the form. If the server determines that the data do not satisfy the specified criteria, the server sends an invalidity signal toward the client. The page also comprises instructions that cause the client to display a message in response to receiving the signal. In response to the signal, the client modifies the display of the page to include the message. All of the above is accomplished without the client requesting additional pages from the server, and without the server sending additional pages toward the client.

  • Pub Date: 2005/01/12
  • Number: 07788341
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Diagnosis of conditions associated with decreased arginine bioavailability

The invention features methods and compositions for diagnosis, including prognosis, of conditions associated with decreased arginine bioavailability (which can result from dysregulated arginine metabolism, e.g., due to increased arginase activity) by assessing in a sample from a subject the ratio of arginine to one or more, usually two or more, modulators of arginine bioavailability. In one embodiment, the ratio of arginine to (ornithine+citrulline) is assessed to aid in diagnosis.

  • Pub Date: 2005/01/12
  • Number: 07648840
  • Owner: The Cleveland Clinic Foundation
  • Location: Cleveland, US
  • Details: Visit USPTO

Visit USPTO Page


Using a mobile phone to remotely control a computer via an overlay network

Systems and methods are described for using a mobile phone to remotely control a computing device. In one implementation, a communication channel between the mobile phone and the computing device uses an overlay network, such as an instant messaging (IM) service, to exchange communication data packets. An exemplary system includes a flexible layered architecture—which allows tailoring the system for remote control of various applications using various network configurations. Based on the overlay protocol used, a transport protocol layer can provide helpful application programming interfaces (APIs). On top of the transport protocol layer, a remote control protocol defines a framework for packet exchange of extensible commands, customizable for remote control of diverse applications. Use of paired-key encryption, IM accounts, and buddy lists ensure that communications between mobile phone and remote computer are secure.

  • Pub Date: 2005/30/11
  • Number: 07792924
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Tuberculosis nucleic acids, polypeptides and immunogenic compositions

The present invention provides transcriptionally active Mtb polynucleotides, recombinant Mtb peptides and polypeptides, and immunogenic Mtb antigens. Immunogenic compositions are also provided that may be useful as recombinant, subunit and DNA vaccines. In addition, the invention provides diagnostic kits for Mtb.

  • Pub Date: 2005/30/11
  • Number: 07608277
  • Owner: Gene Therapy Systems, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing a software installation or removal status display

A method includes initiating an installation of software on a device or a removal of software from the device. The installation or removal of the software involves a plurality of installers capable of installing software components on or removing the software components from the device. The method also includes presenting a status panel associated with the installation or removal of the software to a user. The status panel identifies a plurality of operations associated with the installation or removal of the software and a status of each of the operations. The plurality of operations is associated with at least two different installers. The status panel includes at least one indicator that repeatedly changes to indicate that the installation or removal of the software is progressing.

  • Pub Date: 2005/30/11
  • Number: 08010960
  • Owner: Honeywell International Inc.
  • Location: Morristown, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing access to data in a database

A method, system and article of manufacture for data processing and more particularly for managing access to data in a database that should be available for a limited number of accesses. One embodiment provides a method comprising receiving, from a requesting entity, a query against a database having consumable data that is configured to be accessible for only a predefined number of accesses. The query is configured to access the consumable data and is executed against the database to obtain a query result that includes the consumable data. The method further comprises determining whether the predefined number of accesses is reached as a result of the execution of the query against the database. If so, the consumable data is made inaccessible. The obtained query result is returned to the requesting entity.

  • Pub Date: 2005/30/11
  • Number: 08280907
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Stream class driver for computer operating system

A stream class driver for use in a computer operating system functions together with a minidriver. The minidriver is associated with a particular design for an adapter, which is a hardware device that generates or receives streaming data. The stream class driver deals with common operating system tasks such as direct memory access, scatter/gather memory use and Plug n Play. The stream class driver is independent of the hardware design and can therefore function with any type of streaming device or external buses such as USB or IEEE 1394. the minidriver functionality is limited to only those functions required by the unique aspects of the hardware and for the minimum requirements of operation, thereby minimizing the complexity and burden of designing minidrivers for hardware devices.

  • Pub Date: 2005/30/11
  • Number: 1984935
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Reproduction apparatus, reproduction method, reproduction program, record medium, and data structure

A reproduction apparatus has a player section, a content reproduction section, an interface section. The player section has a read section reading data from the record medium on which the content data containing at least one of a video data stream and an audio data stream and a reproduction control program controlling the reproduction of the content data are recorded, an input section accepting an input from a user, and an output section outputting the reproduced content data. The content reproduction section reproduces the content data according to the reproduction control program. The interface section interfaces among the content reproduction section, the reproduction control program, and the player section. When a command representing an end of the reproduced content data is described in the reproduction control program, the reproduction control program supplies the command to the interface section and the interface section executes a process corresponding to the command.

  • Pub Date: 2005/30/11
  • Number: 08139926
  • Owner: Sony Computer Entertainment Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Processing messages in a message queueing system

A system, method, and a computer program product for processing messages in a message queuing system includes an application repository, a message store, and a queue-less application programming interface in each message queuing system. The application repositories may store application identification data provided by applications. The application programming interfaces may put messages to and get messages from the message queuing systems, and provide with each connect and put request application identification data.

  • Pub Date: 2005/30/11
  • Number: 07716678
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for differential file based update for embedded systems

A system is provided including a host processing system and a remote management module coupled to it. The host processing system is configured to receive an update package. The remote management module is configured to determine one or more modified files from the update package and update its current embedded system by replacing, with the one or more modified files, only those files associated with the current embedded system that correspond to the one or more modified files.

  • Pub Date: 2005/30/11
  • Number: 08554748
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Hypothesized range and depth sonar processing method

A method for determining the likely range and depth of an acoustically radiating source in which characteristics are used from hypothetical ranges and depths. A received sonar signal is compared with modeled ranges and depths. The correlation between the received signal characteristics and the modeled characteristics gives the likely range and depth. In a preferred embodiment this is presented as a contour plot.

  • Pub Date: 2005/30/11
  • Number: 07307914
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Glass appearance window frame colorization

A method for changing a color value and/or level of opacity value of a glass appearance window frame for an application window is described. The method includes steps of determining a defined color value and a defined level of opacity value to apply to a glass appearance window frame and displaying the glass appearance window frame in accordance with the defined color value and the defined level of opacity value. A command may be received to apply the defined color value and the defined level of opacity value to the glass appearance window frame, thereby applying the defined color value and level of opacity value to the glass appearance window frame. Color values and/or level of opacity values may be changed automatically, be application specific, and/or be changed in response to receipt of an input from a user to change one or more portions of a default configuration.

  • Pub Date: 2005/30/11
  • Number: 07418668
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic reflective highlighting of a glass appearance window frame

Aspects for changing a reflective highlight on a glass appearance window frame of an application window are described. An illustrative method includes steps of displaying a first reflective highlight on a glass appearance window frame of an application window, calculating a second reflective highlight in response to detection of an event, and changing the displayed first reflective highlight on the glass appearance window frame of the first application window to the second reflective highlight. The event may correspond to a command to move and/or resize the application window, determination of a time of day event, determination of a change in active/inactive status of the application window, or to a command to change a reflective highlight configuration. Reflective highlights may be changed automatically and/or in response to receipt of an input from a user to change one or more portions of a reflective highlight configuration.

  • Pub Date: 2005/30/11
  • Number: 1971635
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic mechanism for providing metadata

Dynamic metadata allows for metadata that can be configured for an application programming interface (API) after the API has shipped. Multiple entities can provide metadata for the same API or portions of an API. The metadata provided for an API can be set up for each application domain, allowing customization within a single process. Metadata can be provided in several ways, including traditional compiled code and declarative markup as well as databases and other more dynamic approaches. Metadata is separated from its runtime components, so that the metadata that is used by the runtime components can be changed. For example, metadata may be declared on the objects separately. The metadata is then tied back to the runtime components.

  • Pub Date: 2005/30/11
  • Number: 2071718
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Direct detector for terahertz radiation

A direct detector for terahertz radiation comprises a grating-gated field-effect transistor with one or more quantum wells that provide a two-dimensional electron gas in the channel region. The grating gate can be a split-grating gate having at least one finger that can be individually biased. Biasing an individual finger of the split-grating gate to near pinch-off greatly increases the detector's resonant response magnitude over prior QW FET detectors while maintaining frequency selectivity. The split-grating-gated QW FET shows a tunable resonant plasmon response to FIR radiation that makes possible an electrically sweepable spectrometer-on-a-chip with no moving mechanical optical parts. Further, the narrow spectral response and signal-to-noise are adequate for use of the split-grating-gated QW FET in a passive, multispectral terahertz imaging system. The detector can be operated in a photoconductive or a photovoltaic mode. Other embodiments include uniform front and back gates to independently vary the carrier densities in the channel region, a thinned substrate to increase bolometric responsivity, and a resistive shunt to connect the fingers of the grating gate in parallel and provide a uniform gate-channel voltage along the length of the channel to increase the responsivity and improve the spectral resolution.

  • Pub Date: 2005/30/11
  • Number: 1974421
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Application independent messaging system

A messaging system that isolates application programs from the underlying transport and routing mechanisms that are actually used to convey messages. This isolation is provided in part through the use of directory files. The directory files contain all of the specific details (e.g. conversion and routing parameters) necessary to interface with the transport and routing mechanisms. As the transport and routing details change (e.g. due to updated versions or new mechanisms) only the directory files need to be changed. The present invention further includes Message Processing Servers (MPSs) which provide additional messaging functionality such as message storage, tracing, reconciliation, statistical auditing, reformatting, content based routing and multicasting. As additional functionality is developed, this functionality can be flexibly incorporated into a new MPS.

  • Pub Date: 2005/30/11
  • Number: 07458079
  • Owner: JPMorgan Chase Bank, N.A.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for utilizing variable rate program streams in a network

Apparatus and methods for transparently using otherwise wasted bandwidth associated with variable-rate program streams to deliver additional content. In one embodiment, the network comprises a broadcast switched architecture (BSA), and the program streams are loaded up to a target rate using “null” packets and then delivered over the network infrastructure to a plurality of hub sites. The streams are then unloaded to reproduce the original variable streams, and the bandwidth vacated by removal of the null packets used as the transport mechanism for additional (e.g., non time-sensitive) content to be delivered to the subscribers. The process can also be substantially automated and anticipatory (through, e.g., transmission of null bit insertion data downstream). The invention can also advantageously be implemented with minimal modifications to existing infrastructure, and supports business and operational supervisory processes. Network server, QAM modulator, and CPE apparatus implementing the aforementioned methodologies are also disclosed.

  • Pub Date: 2005/30/11
  • Number: 07889765
  • Owner: Time Warner Cable Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Alteration of execution of a program in response to an execution-optimization information

Embodiments include a device, and a method. In an embodiment, a device includes an information store operable to save an execution-optimization information, a first processor, and a hardware circuit. The hardware circuit includes a hardware circuit for altering an execution of a program by the first processor in response to the execution-optimization information. The execution-optimization information created by a hardware device utilizing data collected from a second processor and corresponding to a previous runtime execution by the second processor of at least a portion of the program that was transparent to any software executing on the second processor.

  • Pub Date: 2005/30/11
  • Number: 08402257
  • Owner: The Invention Science Fund I, PLLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive semantic reasoning engine

Provided is an adaptive semantic reasoning engine that receives a natural language query, which may contain one or more contexts. The query can be broken down into tokens or a set of tokens. A task search can be performed on the token or token set(s) to classify a particular query and/or context and retrieve one or more tasks. The token or token set(s) can be mapped into slots to retrieve one or more task result. A slot filling goodness may be determined that can include scoring each task search result and/or ranking the results in a different order than the order in which the tasks were retrieved. The token or token set(s), retrieved tasks, slot filling goodness, natural language query, context, search result score and/or result ranking can be feedback to the reasoning engine for further processing and/or machine learning.

  • Pub Date: 2005/30/11
  • Number: 07822699
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Accelerated channel change

Channel changing can be accelerated by multicasting a bouquet of multicast burst streams from a server. In an example implementation, each multicast burst stream is delayed sufficiently so that a past independent frame is available for delivery to and display by a client device without waiting for a future independent frame. A multicast burst segment of a multicast burst stream includes a portion in which the bandwidth exceeds the nominal data rate of the underlying resource being streamed. The temporal delay between adjacent multicast burst streams in a multicast bouquet is set responsive to a maximum client delay time for tuning to a new resource stream.

  • Pub Date: 2005/30/11
  • Number: 08135040
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Tags for management systems

Management related data is provided to a user. Tags are attached to the provided management related data upon user instruction. A tag is way to identify a piece of management. The tags that correspond with the management related data are stored in a database of the management system.

  • Pub Date: 2005/29/11
  • Number: 07912933
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for leveraging a caller ID to provide a reverse signaling pathway in a network environment

A method for providing signaling in a network environment is provided that includes receiving, at a mobile station, a new call from a mobility application, the new call including a caller ID segment associated with an existing call for the mobile station. The method further includes evaluating data included in the caller ID segment in order to perform an activity related to the data provided in the caller ID segment.

  • Pub Date: 2005/29/11
  • Number: 08180334
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for failover of iSCSI target portal groups in a cluster environment

A system and method for the failover of iSCSI target portal groups (TPGs) is provided. Each network portal within a storage system is associated with a network portal data structure identifying a destination storage system in the event of failover/takeover operation. A management module ensures that all network portals associated with a target portal group have the same destination as a failover storage system. During a failover operation, all network portals within a TPG failover to the same destination storage system.

  • Pub Date: 2005/29/11
  • Number: 07797570
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for executing a seamless handoff in a network environment

A method for providing a handoff in a network environment is provided that includes a mobile station operable to conduct a call. The mobile station is further operable to initiate a call leg autonomously such that a generic transfer function is invoked. The mobile station leverages the generic transfer function in order to execute a handoff for the mobile station.

  • Pub Date: 2005/29/11
  • Number: 08213936
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Self-synchronous locking of optical coherence by single-detector electronic-frequency tagging

A coherent laser beam combining system wherein the output of a single master oscillator is split into a plurality of N signals, and the N signals are electronically modulated at unique frequencies. There is no reference signal and all of the signals are passed through phase adjusters. All N signals are optically amplified, aligned and passed through a beam splitter to split off a small sample that is imaged onto a photodetector. The photodetector output is fed to a signal processor that separates the N signals and produces N phase error signals that drive the N phase adjusters resulting in a high-powered optically coherent output signal.

  • Pub Date: 2005/29/11
  • Number: 07058098
  • Owner: The United States of America as represented by the Secretary of the Air Force
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Pre-translated files used in a virtual machine

A method and apparatus for speeding the startup of applications by making available a pre-translated class file to the class loaders. The Java virtual machine (JVM) starts faster if application class loaders can use the pre-translated class files or internal representations instead of fetching classes from Java archive files or system directories. JVM understands java executable format and can start faster by using them without the user application class loaders having to know the complexities of executable files. The Java archive file format is modified to allow the pre-translated class files to be stored in the Java archive file such that the class loaders are able to process the modified Java archive file without requiring any change to the class loader.

  • Pub Date: 2005/29/11
  • Number: 08042103
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Optimal program execution replay and breakpoints

A method of replaying a recorded sequence of execution steps of a computer program or system to a selected target step while taking a minimal number of execution breaks includes calculating, for each of the steps, a predecessor step that can be reached in a minimal number of execution breaks. The total calculation time for the entire execution is linear in the number of steps, and allows subsequent calculation of an optimal path to any selected step to be obtained in time linear in the length of the optimal path.

  • Pub Date: 2005/29/11
  • Number: 07644396
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and platforms for highly available execution of component software

A method for executing component-based software includes creating a first relation between a first identifier identifying a first software component and an interface for a first container created for the first component, starting a second component defined as a substitution component for the first component when a replacement condition is met, creating a second relation between a second identifier identifying the second component and an interface for a second container created for the second component when starting the second component, changing the first identifier to the second identifier in the first relation and the second identifier to the first identifier in the second relation when starting the second component, using the first component to process requests to the first component received prior to completion of starting the second component, and using the second component to execute requests to the first component newly received after completion of starting the second component.

  • Pub Date: 2005/29/11
  • Number: 08782666
  • Owner: Hitachi, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


IP multicast management and service provision system and method

A system (), method () and apparatus () are provided for provisioning a multicast stream, such as an IP multicast stream, in a network. The system includes a first tier (), such as a national backbone, with a first Multicast Address Discovery (MCAD) directory (), and at least one second tier having a headend, such as a regional headend (), with a second MCAD directory (). The system () includes a tiered MCAD directory network that allows the assignment of multicast addresses to multicast streams received from an upper tier MCAD directory. The tiered MCAD directory structure allows for requesting and storing stream descriptors and delivering stream descriptors on-demand to MCAD-enabled devices throughout the system. The system () also allows for stream provisioning maintenance and validation at lower tier headends via MCAD-enabled device queries or re-queries of upper tier MCAD directories.

  • Pub Date: 2005/29/11
  • Number: 08441963
  • Owner: General Instrument Corporation
  • Location: Horsham, US
  • Details: Visit USPTO

Visit USPTO Page


Data feeds for management systems

A data feed is defined with a data type and criteria. Each data type corresponds to a type of management related data provided by a management system. The management system is searched for all management related data that corresponds with the data type and the criteria. An aggregator collects the management related data that corresponds with the data type and the criteria. The collected management related data is rendered for a display.

  • Pub Date: 2005/29/11
  • Number: 07617190
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Compiler-based scheduling optimization hints for user-level threads

Method, apparatus and system embodiments to schedule user-level OS-independent “shreds” without intervention of an operating system. For at least one embodiment, the shred is scheduled for execution by a scheduler routine rather than the operating system. The scheduler routine may receive compiler-generated hints from a compiler. The compiler hints may be generated by the compiler without user-provided pragmas, and may be passed to the scheduler routine via an API-like interface. The interface may include a scheduling hint data structure that is maintained by the compiler. Other embodiments are also described and claimed.

  • Pub Date: 2005/29/11
  • Number: 08205200
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Financial transaction processing system and method

A financial transaction processing system () enables processing transactions from various types of card activated terminal devices () which communicate using a variety of electronic message formats. The transaction processing system may operate to authorize transactions internally using information stored in a relational database () or may communicate with external authorization systems (). The transaction processing system includes among its software components message gateway routers (MGRs) () which operate using information stored in the relational database to convert messages from a variety of external message formats used by the external devices and authorization systems, to a common internal message format used within the system. The system further uses database information to internally route messages to message processing programs (MPPs) () which process messages and generate messages to the external devices and authorization systems. The MGR also converts the outgoing messages from the internal message format to the external message formats which can be interpreted by the external devices and systems to which the messages are directed.

  • Pub Date: 2005/28/11
  • Number: 07779160
  • Owner: Diebold, Incorporated
  • Location: North Canton, US
  • Details: Visit USPTO

Visit USPTO Page


Training wideband acoustic models in the cepstral domain using mixed-bandwidth training data for speech recognition

A method and apparatus are provided that use narrowband data and wideband data to train a wideband acoustic model.

  • Pub Date: 2005/23/11
  • Number: 07707029
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Semantic business model management

A computer-implemented solution for managing a semantic business model is provided. In particular, one or more business area models for a business entity are obtained and transformed into intermediate model(s). Each intermediate model is represented using a substantially similar meta-modeling language. Subsequently, the semantic business model is generated by merging the set of intermediate models. In this manner, the semantic business model can be generated in a manner that reduces the overall burden on a user. The semantic business model can be provided for display to the user and/or use in performing qualitative analysis on various aspects of the business entity.

  • Pub Date: 2005/23/11
  • Number: 07761478
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Printing system capable of chasing a printed material

The present invention realizes a network printing system capable of accumulating and chasing printed data. Further, by providing a job chasing function on the printer driver side, detailed setting can be done to extract history information of the job chasing function. The detailed setting to extract history information to chase a job can be done only by a specific administrator or user so that the job can be reliably chased, whereas the administrator or user can obtain desired history information. Accordingly, a precise jog chasing system can be established.

  • Pub Date: 2005/23/11
  • Number: 07755783
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Object-oriented processing of markup

An application-specific client for object-oriented processing of markup includes a model object and a plurality of element objects. The model object is configured to respond to client requests including construct-element, accept-root-element, and accept-root-text. The element objects are configured to respond to client requests including accept-attribute, accept-element, and accept-text. Responses to requests contain application-specific processing as necessary. A driver generates client requests in response to processing of XML markup. An RSS client processes markup describing syndicated web content to HTML markup.

  • Pub Date: 2005/23/11
  • Number: 07844956
  • Details: Visit USPTO

Visit USPTO Page


Methods of manufacturing group III nitride semiconductor devices with silicon nitride layers

Methods of fabricating transistor in which a first Group III nitride layer is formed on a substrate in a reactor, and a second Group III nitride layer is formed on the first Group III nitride layer. An insulating layer such as, for example, a silicon nitride layer is formed on the second Group III nitride layer in-situ in the reactor. The substrate including the first Group III nitride layer, the second group III nitride layer and the silicon nitride layer is removed from the reactor, and the silicon nitride layer is patterned to form a first contact hole that exposes a first contact region of the second Group III nitride layer. A metal contact is formed on the first contact region of the second Group III nitride layer.

  • Pub Date: 2005/23/11
  • Number: 07901994
  • Owner: Cree, Inc.
  • Location: Durham, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for provisioning heterogeneous operating systems onto heterogeneous hardware systems

A method for provisioning a plurality of heterogeneous operating systems on a plurality of target hosts that includes for each of the plurality of target hosts, obtaining a type of operating system (OS) to be provisioned on the target host, populating an OS profile model based on the type of operating system obtained, activating a deployment service based on the type of operating system, and provisioning the target host using a deployment service and the OS profile model.

  • Pub Date: 2005/23/11
  • Number: 2031621
  • Owner: Sun Microsystems, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic tagging of network data based on service level objectives

A system for dynamic tagging of network data based on service level objectives comprises one or more processors and memory coupled to the processors. The memory comprises program instructions executable by the processors to identify a service level objective associated with a particular task that comprises a transmission of data packets over a network on behalf of an application, where the network includes one or more devices (such as routers, switches, etc.) configured to provide different levels of service to data packets based at least in part on service level indicators included within the packets. The instructions are executable to dynamically generate service level indicators corresponding to the identified service level objectives for inclusion in the data packets of the task, and to transmit the packets including the service level indicators into the network.

  • Pub Date: 2005/23/11
  • Number: 07940756
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Creating, storing and viewing process models

The location of a drawing of an activity, a property of an element in the drawing and the structural relationship of elements in the drawing are stored in a database. The database is accessed to form a user interface that provides a hierarchical representation of activities and the elements within activities.

  • Pub Date: 2005/23/11
  • Number: 07917555
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System with user directed enrichment and import/export control

A system for enriching document content using enrichment themes includes a directed search service and an import-export service. The directed search service allows users to author documents while querying information providers using the directed searches that are inserted as part of the authored documents. The import-export service enables meta-document exchanges between systems that provide document enrichment by binding imported meta-documents to identical or similar information providers.

  • Pub Date: 2005/22/11
  • Number: 07647349
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for an application crawler

A computer-implemented method is provided for searching for files on the Internet. In one embodiment, the method may provide an application crawler that assembles and dynamically instantiates all components of a web page. The instantiated web application may then be analyzed to locate desired components on the web page. This may involve finding and analyzing all clickable items in the application, driving the web application by injecting events, and extracting information from the application and writing it to a file or database.

  • Pub Date: 2005/22/11
  • Number: 07584194
  • Owner: Truveo, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated code generation for adapter-specific property template

A computer implemented method, data processing system, and computer usable code are provided for integrated code generation. The aspects of the present invention load properties associated with a saved template. Properties associated with a saved template are processed by replacing the properties with integrated code from an integrated code content template. In response to all of the properties being processed, the integrated code is saved to an integrated code file.

  • Pub Date: 2005/22/11
  • Number: 07882489
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Automatically populated display regions for discovered access points and stations in a user interface representing a wireless communication network deployed in a physical environment

A system for providing automatically populated display regions showing discovered access points and stations in a user interface representing a wireless communication network deployed in a physical environment. A generated user interface includes a first display region in which access point representations are displayed as corresponding access points are automatically discovered within the wireless network, and a second display region in which station representations are displayed as corresponding stations are automatically discovered within the wireless network. The first and second display regions are provided external to another display region, referred to as the “physical space” display region, in which is shown a representation of the physical space in which the wireless network is deployed. As the access point and station representations appear in the first display region and second display region, the user can manipulate them, for example by drag and drop operations using a computer mouse, in order to place them appropriately in the physical space display region. In response, the disclosed system superimposes the access point and station representations over the physical space representation. The access point and station representations can subsequently be similarly repositioned by the user within the physical space representation.

  • Pub Date: 2005/22/11
  • Number: 1879741
  • Owner: Autocell Laboratories, Inc.
  • Location: Acton, US
  • Details: Visit USPTO

Visit USPTO Page


Word recognition using ontologies

Systems, and associated apparatus, methods, or computer program products, may use ontologies to provide improved word recognition. The ontologies may be applied in word recognition processes to resolve ambiguities in language elements (e.g., words) where the values of some of the characters in the language elements are uncertain. Implementations of the method may use an ontology to resolve ambiguities in an input string of characters, for example. In some implementations, the input string may be received from a language conversion source such as, for example, an optical character recognition (OCR) device that generates a string of characters in electronic form from visible character images, or a voice recognition (VR) device that generates a string of characters in electronic form from speech input. Some implementations may process the generated character strings by using an ontology in combination with syntactic and/or grammatical analysis engines to further improve word recognition accuracy.

  • Pub Date: 2005/21/11
  • Number: 07587308
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for application program operation on a wireless device

Embodiments described herein address mobile devices with non-secure operating systems that do not provide a sufficient security framework. More particularly, the embodiments described herein provide a set of applications to the device for providing security features to the non-secure operating system.

  • Pub Date: 2005/21/11
  • Number: 08045958
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Selecting a data transfer method

The invention relates to a method for selecting a data transfer method in a telecommunication system wherein several data transfer methods exist for selection. The method comprises determining a message to be transmitted on the basis of inputs received from a user. At least one piece of property information concerning the message being entered or already entered is checked. In order to transmit the message, the data transfer method associated in predetermined selection conditions with the property information is selected.

  • Pub Date: 2005/21/11
  • Number: 08149724
  • Owner: Nokia Corporation
  • Location: , FI
  • Details: Visit USPTO

Visit USPTO Page


Artificial chromosomes, uses thereof and methods for preparing artificial chromosomes

Methods for amplification of nucleic acids in cells are provided. Also provided are cells that contain the nucleic acids.

  • Pub Date: 2005/21/11
  • Number: 08389802
  • Owner: Glaxo Group Limited
  • Location: , GB
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing search results based on location

A method for providing a listing of common searches based on a location. The method includes receiving a location of a mobile computing device, generating a listing of common searches associated with the location, and transmitting the listing of common searches to the mobile computing device.

  • Pub Date: 2005/18/11
  • Number: 2026095
  • Owner: A9.com, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Service clean-up

Versions of a service not reachable by a set of service requestors that use the service are removed. Multiple, different versions of a service are stored, along with metadata associated with the multiple, different versions of the service. The metadata is examined to determine one or more of the multiple, different versions of the service that are not reachable by the set of service requestors that use the service. Those versions are deleted.

  • Pub Date: 2005/18/11
  • Number: 09274830
  • Owner: AOL Inc.
  • Location: Dulles, US
  • Details: Visit USPTO

Visit USPTO Page


Server-client architecture in medical imaging

A method of processing medical imaging volume data in a computer network is described. The method comprises loading a medical imaging data set to be processed to a server computer, processing the data set on the server computer, e.g. by executing a software application, and generating corresponding server-generated results. The server-generated results, e.g. rendered images, may then be transmitted to a client computer for display to a user. This allows users to quickly view the results of the processing because they have not had to wait for the data set to be transferred to their local machine before locally processing the data. However, while this is happening, the data set itself is also transmitted, e.g. as a background operation, to the client computer. Thus eventually the client computer has access to a local copy of the data set and may start processing the data set itself, thus freeing up server resources.

  • Pub Date: 2005/18/11
  • Number: 07890573
  • Owner: Toshiba Medical Visualization Systems Europe, Limited
  • Location: Edinburgh, GB
  • Details: Visit USPTO

Visit USPTO Page


Securing sensitive data in memory

Sensitive data is stored in a secure buffer, and never in an unencrypted, accessible location at any time. The data is accessed only by low-level processor instructions that load only a portion of the data into processor registers. The portion of data can then be used before the next portion of data is transferred from the secure buffer into the processor registers. In some embodiments, only one portion is available at any time. In other embodiments, a number of portions may be available at one time. However, the entirety of the sensitive data is never present in the clear. Thus, the entirety of the sensitive data will never be available if an adversary gains access to the contents of memory.

  • Pub Date: 2005/18/11
  • Number: 07725739
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Process and apparatus for combinatorial synthesis

Apparatus and methods are described for split synthesis combinatorial chemistry that provides candidate libraries where an even distribution of theoretical products is obtainable through even mixing during the pooling step, followed by controlled redistribution of the mixed pooled products from the prior addition step into separate synthesis columns, one for each different specie of subunit to be added.

  • Pub Date: 2005/18/11
  • Number: 2030623
  • Owner: Bd. of Regents, Univ. of Texas
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Object delivery authentication

Provided is a method and system for authenticating object delivery including the steps of receiving by an object receiver an object delivery information package from an object deliverer over a call network during a communication between the object receiver and the object deliverer, wherein the object delivery information package comprises object information and object deliverer identity information, receiving by the object receiver an object from the object deliverer, and authenticating the receipt of the object by the object receiver using the object information and object deliverer identity information.

  • Pub Date: 2005/18/11
  • Number: 08103874
  • Owner: TP Lab Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Network management apparatus and method based on simple network management protocol

An apparatus and method is provided for managing a communication device using Simple Network Management Protocol (SNMP). When a developer creates an SNMP interface header file through an application program at a compile time, an extractor generates a management information base (MIB) file and object identifier information (OIDInfo) on the basis of the interface header file. When a manager makes an SNMP request at a run time, an agent sends the OIDInfo included in the SNMP request message to an OIDInfo processor. The OIDInfo processor refers to an OIDInfo memory and delivers general message service (GMS) information to the agent. A GMS request/response process between the agent and the application program is then performed on the basis of the GMS information.

  • Pub Date: 2005/18/11
  • Number: 08812636
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Native objects accessible by platform neutral API

An object is developed using an operating system neutral application programming interface (API). The object is complied for a designated operating system that includes native objects and supports an API for accessing native objects of the operating system. The compiled object includes logic code, a native object interop for accessing the logic code using the API for accessing native objects of the operating system, and a platform-neutral interop for accessing the logic code using the operating system neutral API.

  • Pub Date: 2005/18/11
  • Number: 08060856
  • Owner: AOL Inc.
  • Location: Dulles, US
  • Details: Visit USPTO

Visit USPTO Page


Forms integration of an external data model not implemented through a document object model (DOM) accessible application programming interface (API)

Embodiments of the present invention address deficiencies of the art in respect to deploying XForms in an enterprise environment and provide a method, system and computer program product for forms integration of an external data model not implemented through a DOM accessible API. In one embodiment of the invention, a method for forms integration of an external data model not implemented through a DOM accessible API can include generating a data graph for an external data model for a forms based application and transforming the data graph into a DOM representation of the data graph. Value changes for fields of a form in the forms based application can be applied to nodes of the DOM representation and mutations in the nodes of the DOM representation can be synchronized to corresponding nodes in the data graph.

  • Pub Date: 2005/18/11
  • Number: 08176081
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


DDS-assisted CORBA discovery

A computer network environment that supports both Common Object Request Broker Architecture (CORBA) and Data Distribution Service (DDS) can employ the techniques described herein. The techniques relate to CORBA discovery, which enables clients to learn the location of a function or service maintained by a server in the computing environment. The CORBA discovery methodology described herein utilizes a DDS infrastructure to communicate data objects from the server to the clients such that each of the subscribing clients can create a proxy for communication with the server. Once the CORBA discovery procedure is complete, subscribing clients can call the desired server function using their respective proxies.

  • Pub Date: 2005/18/11
  • Number: 07665096
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Database-independent mechanism for retrieving relational data as XML

Techniques are disclosed for retrieving both data stored in relational form and data stored in XML form responsive to a single XQuery query. The techniques allow applications to retrieve relational data residing in various relational database management systems by using XQuery and XQuery for Java. In one such embodiment, an embeddable serverless computer component implements the techniques, and includes a combination of one more relational adaptors and a mediator to access relational data and transform it into appropriate XML. The techniques are embeddable, and can be standards-based, database-independent, and operating-system independent. Optimized performance and scalability from desktop to enterprise applications are enabled as the number of users and/or database size increases.

  • Pub Date: 2005/18/11
  • Number: 08447774
  • Owner: Progress Software Corporation
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Connecting device of storage device and computer system including the same connecting device

In an environment in which plural external storage devices having different function control interfaces are intermixed, when a function of a storage device is controlled from a computer, a common interface for controlling the function of the storage device is provided. A device that provides the common interface manages an interrelationship between a storage area recognized by a host computer and a storage area provided by the storage device and associates a storage area which becomes a target of a function control instruction with the storage device that provides the storage area. A type of the storage device that provides the storage area which becomes the target of the function control instruction is identified and function control is ordered through a function control interface unique to the device.

  • Pub Date: 2005/18/11
  • Number: 07392336
  • Owner: Hitachi, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Cache hint correction for security scanning

A computer includes a filter module providing a standardized interface for intercepting file access requests. The computer also includes a cache manager that manages the caching mode used with the requests. An application on the computer issues a file access request and explicitly or implicitly specifies a cache hint informing the cache manager of a desired caching mode. A security scanner module scans files on the computer for malicious software. The security scanner module intercepts a file access request and alters the caching mode, if necessary, to one optimized for security scanning. The security scanner module performs the file scan using the optimal caching mode, and, if necessary, resets the caching mode to its original state.

  • Pub Date: 2005/18/11
  • Number: 2077019
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and device for event communication between documents

A method for sending data from a first to a second document when both documents are loaded by a user agent implemented on a client device. The method may comprise the execution of a script in the first document, said script providing the data to be sent to the second document. The user agent may be configured to retrieve information uniquely identifying the first document as well as an origin of the first document. This information may have been collected by the user agent when the document was first loaded, and may not be influenced by the script. The user agent may then send a message to the second document containing the data provided by the script in the first document and the identification of the first document.

  • Pub Date: 2005/17/11
  • Number: 07895604
  • Owner: Opera Software ASA
  • Location: Oslo, false
  • Details: Visit USPTO

Visit USPTO Page


Content addressable information encapsulation, representation, and transfer

Representing a number of assets on an originating computer begins with selecting the assets to be represented. Cryptographic hash asset identifiers are generated; each of the asset identifiers is computed using the contents of a particular asset. The asset identifier is a content-based or content-addressable asset name for the asset and is location independent. An asset list is generated that includes the asset identifiers computed from the assets. A cryptographic hash asset list identifier is generated that is computed from the asset list. The asset list identifier is stored for later retrieval. The amen selected are also stored for safekeeping either locally or on a computer network. In the event of loss of the files from the originating computer, the asset list identifier is retrieved. Using the asset list identifier, the original asset list is found and retrieved from its safe location.

  • Pub Date: 2005/17/11
  • Number: 07770228
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Clearinghouse server for internet telephony and multimedia communications

A clearinghouse server for routing multi-media communications, including telephony calls, between a source device and a destination device via a distributed computer network, such as the global Internet. The clearinghouse server can authorize the completion of a communication from a source device to a destination device and collect usage-related information for the completed communication. In response to an authorization request issued by an enrolled source device, the clearinghouse server can identify one or more available destination devices available to accept a communication from an authorized source device. The clearinghouse server can provide a list of the identified destination devices, typically organized in a rank order, by sending an authorization response to the source device. In turn, the source device can use this list to select a destination device and contact that selected device via the computer network to complete the communication.

  • Pub Date: 2005/17/11
  • Number: 07912067
  • Owner: TransNexus, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Programmable object models for bibliographies and citations

Programmable object models for bibliographies and citations enable manipulation of bibliographic information. For example, a programmable object model for one or more bibliographic sources in a document may include a manipulation module programmed to manipulate the one or more bibliographic sources in the document. The bibliographic information may be manipulated via at least one object-oriented message call. The programmable object model may also enable manipulation of bibliographic information in the context of a master list of bibliographic sources. By way of example only, bibliographic sources may be copied from a master list to a document, and vice versa, in accordance with a programmable object model.

  • Pub Date: 2005/16/11
  • Number: 08086954
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Printable electric circuits, electronic components and method of forming the same

Improved methods and articles providing conformal coatings for a variety of devices including electronic, semiconductor, and liquid crystal display devices. Peptide formulations which bind to nanoparticles and substrates, including substrates with trenches and vias, to provide conformal coverage as a seed layer. The seed layer can be further enhanced with use of metallic films deposited on the seed layer. Seed layers can be characterized by AFM measurements and improved seed layers provide for better enhancement layers including lower resistivity in the enhancement layer. Peptides can be identified by phage display.

  • Pub Date: 2005/16/11
  • Number: 07902639
  • Owner: Siluria Technologies, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Managing sponsored content based on usage history

Improved search capabilities are disclosed for mobile communications devices such as cell phones, as well as improved techniques for delivering sponsored content in a mobile communication environment.

  • Pub Date: 2005/16/11
  • Number: 07660581
  • Owner: Jumptap, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Cellular user interface

Configurations for a cellular user interface are provided. In one embodiment, a client configuration includes a viewer and a content development kit. A content server distributes cellularized content among several client viewers. Connectors in a scheduled configuration regularly acquire updated content from data sources. An integration server interfaces between the connectors and the content server for distributing content. A monitoring agent assists with content updating upon detecting source changes. A registration server enables cell content update in client viewers through the content server. Cells in the cellularized environment include a visual proxy component and a metadata component. The visual proxy component can be configured for displaying different content at various levels of detail. The metadata component enables intelligent organization and display of content through queries, channels, and data updates. In addition, procedural geometry in the cellularized environment automates the content presentation and provides a flexible arrangement of the cells.

  • Pub Date: 2005/16/11
  • Number: 08001476
  • Owner: Open Text Inc.
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Vector graphics anti-aliasing

A processor unit that can be used in a handheld device and configured for anti-aliasing of a vector graphics image, and including a counter value calculator configured to calculate, for one edge at a time and pixel-by-pixel, counter values for each pixel in a rasterization direction, a counter value recorder configured to store the calculated counter values in an edge buffer, and a pixel coverage value calculator configured to calculate pixel coverage values based on the stored counter values. The calculated pixel coverage values can be utilized for anti-aliasing the vector graphics image, while rasterizing the vector graphics image.

  • Pub Date: 2005/15/11
  • Number: 08269788
  • Owner: Advanced Micro Devices Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Remote selection and installation of auxiliary content

A system, method, and apparatus are directed to managing auxiliary content through an enhanced content management system (ECMS), for such as a blog, over a network. Auxiliary content may be selected from a networked device over the network for integration with another site, such as the blog. Such auxiliary content may include graphics, advertisements including sponsored advertisements, selectable audio clips, or the like. When the auxiliary content is selected, and a identifier of the other site is provided, data that may include a script, code, or the like, and that enables access to the auxiliary content is provided to the ECMS using the identifier. The ECMS may then use the data to position the auxiliary content within the other site. Once the position is determined, automatic incorporation of the auxiliary content within a webpage may also be performed using the ECMS.

  • Pub Date: 2005/15/11
  • Number: 2047478
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Power management system for SCA based software defined radio and related method

A software defined radio includes a radio circuit powered by a battery and formed as a pair of radio subsystems having radio components that draw power from the battery. An executable radio software system conforms to the Software Communications Architecture (SCA) specification and defines an operating platform environment that allows a waveform application to operate with the radio circuit. A power management service is operative with the pair of radio subsystems to coordinate the power among the radio components.

  • Pub Date: 2005/15/11
  • Number: 07809410
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for modifying a backup data stream including logical partitions of data blocks to be provided to a fixed position delta reduction backup application

When a data stream is received, the data stream may be parsed into a plurality of logical components, where each of the logical components includes one or more data blocks. Missing data blocks may also be detected in the data stream, and therefore may be detected in each of the plurality of logical components. For instance, each of the logical components may be separated into a separate data stream for which missing data blocks may be detected. A temporary data block is then inserted where each missing data block is detected (e.g., in each of the plurality of logical components). In this manner, inefficiencies introduced into a fixed position delta reduction backup process as a result of new or deleted data in a system implementing a plurality of data blocks which may be stored in the form of logical components are eliminated.

  • Pub Date: 2005/15/11
  • Number: 2089974
  • Owner: i365 Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing trend information from network devices

A method of providing performance trend information from a device in a packet-switched network to a network management station comprises maintaining in the device one or more state variables that store values associated with data processing functions of the device; storing in the device a trend indicator value and a trend tendency value, both associated with a particular state variable among the state variables; periodically sampling the particular state variable to obtain one or more sampled values; determining and updating the trend indicator value with a direction of change in the sampled values of the particular state variable over a particular time; determining and updating the trend tendency value with a rate of change in the one or more sampled values of the particular state variable over the particular time; and sending the trend indicator value and the trend tendency value to the network management station.

  • Pub Date: 2005/15/11
  • Number: 2024544
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Isolation of application-specific data within a user account

A mechanism is provided for isolating application-specific data in an environment where multiple applications share a same user account. This mechanism enables data specific to an application to be accessed only by the application. When an application requests application-specific data, the data is loaded and a handle to the data is returned to the application. Access to the data is allowed only though the handle. Therefore, only the application possessing the handle can access the data. A counter may be associated with the loaded data. The counter's value is incremented whenever a handle is created for the data and decremented whenever a handle for the data is terminated. When the value of the counter reaches zero, the data is automatically unloaded.

  • Pub Date: 2005/15/11
  • Number: 08074288
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Defining expressions in a meta-object model of an application

A method for defining expressions in a meta-object model of an application by locating a string representation of an expression including an identification of a language of the expression; accessing a data type definition corresponding to the language of the expression, the data type definition including a converter for converting the string representation of the expression into an executable runtime representation of the expression; and converting the string representation of the expression into an executable runtime representation of the expression.

  • Pub Date: 2005/15/11
  • Number: 07761856
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Buffer management in vector graphics hardware

A graphics processor or a graphics block for use in a processor includes a type buffer used for determining if a currently processed pixel requires further processing. Each pixel has a number of sub-pixels and each sub-pixel line includes at least one counter that is stored in an edge buffer. A limited edge buffer that can store edge buffer values in a limited range can be employed. Each buffer can include information regarding the whole screen or a portion of thereof. The edge buffer also can be an external or internal buffer, and when implemented internally, the graphics processor or graphics block need not employ a bi-directional bus.

  • Pub Date: 2005/15/11
  • Number: 08294731
  • Owner: Advanced Micro Devices, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System for enterprise knowledge management and automation

The present invention is directed to a system for managing business knowledge expressed as statements, preferably sentences using a vocabulary, where such statements may be automated by the generation of programming language source code or computer program instructions. As such, the present invention also manages software design specifications that define, describe, or constrain the programming code it generates or programs with which it or the code it generates is to integrate. The present invention facilitates the creation of composite sentences. In one embodiment, the present invention also interprets a composite sentence as a logical formula in first order predicate calculus or similar logic formalism supporting conjunction, disjunction, and negation as well as existentially and universally quantified variables. The invention further interprets natural language, including singular common count noun phrases and connectives, as variables in formal logic. Further, the invention then implements the logical interpretations as rules.

  • Pub Date: 2005/14/11
  • Number: 08135576
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for performing a search and a browse on a query

A search and a browse on a single user query is performed. A refined query is selected from the results of the first user query. Thereafter, a list of concepts from a first directory associated with the refined query is obtained. The concepts are defined in a hierarchical relationship with concepts having broader scope being higher in the hierarchy and concepts having a narrower scope being lower in the hierarchy. Additionally, a list of web sites associated with the search concept is obtained from a second directory.

  • Pub Date: 2005/14/11
  • Number: 07756864
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Structural content filtration of hypotheses in a cognitive control framework

Structural content filtration to reduce the number of hypotheses for the location of an active object in a recorded image generated by a graphical user interface (GUI) of an application program may be accomplished by transforming the recorded image and a corresponding playback image, determining a sub-image from the transformed recorded image which corresponds to an object to be searched for in the transformed playback image, determining a set of points on the transformed playback image which have appropriate values for matching the sub-image, and filtering hypotheses on the playback image which are more than a selected distance from any one of the subset of points.

  • Pub Date: 2005/14/11
  • Number: 07805008
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Stereo video for gaming

A real-time stereo video signal of a captured scene with a physical foreground object and a physical background is received. In real-time, a foreground/background separation algorithm is used on the real-time stereo video signal to identify pixels from the stereo video signal that represent the physical foreground object. A video sequence is produced by rendering a 3d virtual reality based on the identified pixels of the physical foreground object.

  • Pub Date: 2005/14/11
  • Number: 08094928
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and compositions involving miRNA and miRNA inhibitor molecules

The present invention concerns methods and compositions for introducing miRNA activity or function into cells using synthetic nucleic acid molecules. Moreover, the present invention concerns methods and compositions for identifying miRNAs with specific cellular functions that are relevant to therapeutic, diagnostic, and prognostic applications wherein synthetic miRNAs and/or miRNA inhibitors are used in library screening assays.

  • Pub Date: 2005/14/11
  • Number: 08173611
  • Owner: Asuragen Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Method for generating multi-language menus

A method for generating multi-language menus comprises grouping language-dependent menu resource files on a storage medium, and selecting only those menu resource files from a group that are labeled with an indication that matches the preferred menu language of the respective player.

  • Pub Date: 2005/14/11
  • Number: 08701004
  • Owner: Thomson Licensing
  • Location: Issy les Moulineaux, FR
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for supporting multiple transport layer implementations under a socket interface

One embodiment of the present invention provides a system for communicating data using a socket interface with multiple transport layer implementations. During operation the system creates a socket which can be used with a set of transport layer implementations. Next, the system binds the socket to a local port without specifying a particular transport layer implementation. The system then receives a request to connect to a target port that is associated with a target address. Next, the system selects a protocol implementation from the set of transport layer implementations using the target port and the target address. The system then sends a connection request to the target port using the selected protocol implementation. Note that the present invention does not require changing a networking application because the transport layer implementation is selected automatically by the system, instead of requiring the application to possess the knowledge to select the appropriate transport layer implementation.

  • Pub Date: 2005/14/11
  • Number: 07779132
  • Owner: Oracle America, Inc.
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for creating templates

A template creator creates a template class that stores at least one template parameter. The template creator also specifies at least one additional object to be created when an instance of the template class is created. A template user initiates the creation of a new instance of the template class. If an error occurs during the creation of the new instance of the template class, the template user receives a report identifying the error.

  • Pub Date: 2005/14/11
  • Number: 07779419
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for carrier customization in communication systems

A method of customizing a wireless device to a predetermined configuration is described. A wireless device configured with at least one carrier-specific parameter for a first carrier is modified to access at least one carrier-specific parameter for a second carrier during operation of the wireless device and responsive to a predetermined network switch input received by the wireless device. A carrier customization module system for a wireless device includes a carrier customization module loader executed by the wireless device which is configured with at least one carrier-specific parameter for a first carrier. The loader selects at least one carrier-specific parameter for a second carrier from among one or more carrier-specific parameters during operation of the wireless device and responsive to a predetermined network switch input received by the wireless device. The loader modifies the wireless device to access the second carrier using the selected carrier-specific parameter for the second carrier.

  • Pub Date: 2005/14/11
  • Number: 2047195
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Intrusion event correlation with network discovery information

A policy component includes policy configuration information. The policy configuration information contains one or more rules. Each rule and group of rules can be associated with a set of response actions. As the nodes on the monitored networks change or intrusive actions are introduced on the networks, network change events or intrusion events are generated. The policy component correlates network change events and/or intrusions events with network map information. The network map contains information on the network topology, services and network devices, amongst other things. When certain criteria is satisfied based on the correlation, a policy violation event may be issued by the system resulting in alerts or remediations.

  • Pub Date: 2005/14/11
  • Number: 08046833
  • Owner: Sourcefire, Inc.
  • Location: Columbia, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent trust management method and system

Intelligent Trust Management provides a centralized security facility that gives system components a flexible mechanism for implementing security policies. System components such as applications create a request describing an action that needs to be checked against an appropriate security policy. The request is given to a trust system that determines which policy object applies to the request, and may pass request arguments to the policy. The policy objects include executable code that uses any arguments along with dynamically obtained variable information to make a decision. The decision is returned to the system component, which then operates accordingly. Policy objects may maintain state and interface with the user independent of the system component in order to obtain information to make their decisions. Policy objects may call other policy objects and/or mathematically combine the results of other policy objects to make a decision.

  • Pub Date: 2005/14/11
  • Number: 07877264
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Focus scope

Aspects of the subject matter described herein relate to directing focus to elements of a graphical user interface in response to focus events. In aspects, a program may include multiple focus scopes each of which may include elements capable of receiving keyboard input. When an element receives keyboard focus, information regarding the element is updated to indicate that the element has or had keyboard focus. Thereafter, focus scope may be changed to a focus scope other than the one including the element. When changing the focus scope back to the focus scope that includes the element, the information may be used to give the element keyboard focus.

  • Pub Date: 2005/14/11
  • Number: 2044602
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


First computer process and second computer process proxy-executing code on behalf of first process

Upon a first process encountering a triggering device, a second process chooses whether to proxy-execute code corresponding to the triggering device of the first process on behalf of such first process based at least in part on whether a license evaluator of the second process has determined that the first process is to be operated in accordance with the terms and conditions of a corresponding digital license. The license evaluator at least in part performs such determination by running a script corresponding to the triggering device in the code of the first process. Thus, the first process is dependent upon the second process and the license for operation thereof.

  • Pub Date: 2005/14/11
  • Number: 08103592
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Code evaluation of fixed-point math in the presence of customizable fixed-point typing rules

Systems and methods are provided for using partial evaluation techniques to efficiently generate code for a fixed-point operation. The present invention uses partial evaluation techniques to evaluate a fixed-point rule of a fixed-point operation. The fixed-point rules, which may be customized by a user, determine the data type of the result or output of the operation. Although the values of all the inputs may not be known at code generation time, the present invention determines via static or known information associated with the input the portion of the fixed-point rule known at code generation time. As such, the present invention can generate more efficient code by generating code representing the static analysis of the inputs and fixed-point typing rules of the fixed-point operation.

  • Pub Date: 2005/14/11
  • Number: 09075630
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system, and method for protecting a motion-sensitive device

An apparatus, system, and method are disclosed for protecting a motion-sensitive device. The apparatus includes an identification module, a determination module, and a scheduler. The identification module identifies a use-intensive task involving the motion-sensitive device. The determination module determines a motion forecast that predicts a substantially motionless time interval. The scheduler schedules the use-intensive task such that the use-intensive task executes within the substantially motionless time interval. In this manner, a historical movement pattern is used to schedule future tasks such that the coincidence of task use of the motion-sensitive device and movement of the motion-sensitive device is minimized.

  • Pub Date: 2005/14/11
  • Number: 2031660
  • Owner: Lenovo Singapore Pte Ltd
  • Location: Singapore, SG
  • Details: Visit USPTO

Visit USPTO Page


Triangular method for hypotheses filtration in a cognitive control framework

Reducing the number of hypotheses for locations of an active object in a saved image generated by a graphical user interface (GUI) of an application program may be accomplished by determining possible triangles for the saved image, wherein vertices of the triangles are points where the active object and any two additional objects of the saved image are located, determining possible pairs of hypotheses corresponding to the two additional objects from a current playback image corresponding to the saved image, determining triangles corresponding to the possible pairs of hypotheses and filtering the detected triangles, determining vertices with weights for similar triangles of the current playback image, and calculating a weight for every hypothesis of the active object and filtering hypotheses of the active object on the current playback image based on a weight bound.

  • Pub Date: 2005/11/11
  • Number: 07787651
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Iterative search with data accumulation in a cognitive control framework

Searching hypotheses for locations of objects in a playback image corresponding to a recorded image generated by a graphical user interface (GUI) of an application program may be accomplished by capturing the playback image, detecting at least one active object in the recorded image, searching subsets of hypotheses from the playback image for an object according to predetermined criteria, recalculating old actions for the object in the playback image by applying actions according to an execution scenario and loading a next set of data, when the object is found, and checking dynamic conditions.

  • Pub Date: 2005/11/11
  • Number: 07831542
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Graphical user interface (GUI) noise reduction in a cognitive control framework

Reducing graphical user interface (GUI) noise maybe achieved by recording a first execution scenario for control of operation of an application program having a GUI during a recording phase of operation of a cognitive control framework system, setting soft conditions for a search for the application program for the first execution scenario, playing back the application program according to the first execution scenario during a playback phase of operation of the cognitive control framework system, updating the first execution scenario to form a second execution scenario to reduce GUI noise conditions observed during playback, including updating recorded images originally generated by the GUI during the recording phase and updating coordinates for user input data, setting stronger conditions for the search for use in subsequent playbacks; and playing back the application program according to the second execution scenario with the stronger conditions for search.

  • Pub Date: 2005/11/11
  • Number: 08429612
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Strict validation of inference rule based on abstraction environment

A method, system and article of manufacture for processing rule sets and, more particularly, for processing abstract rule sets. One embodiment provides a computer-implemented method of managing execution of an analysis routine configured to process one or more inputs. The analysis routine is defined by at least one abstract rule set having one or more abstract rules each having a conditional statement and a consequential statement. The method comprises determining, from the retrieved analysis routine, a predefined validating condition that needs to be satisfied by at least one of the inputs, and validating a particular data value defining the at least one of the inputs on the basis of the predefined validating condition. If the particular data value is not validated, a predefined action configured to avoid execution of the analysis routine on invalid inputs is performed.

  • Pub Date: 2005/10/11
  • Number: 1984730
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Reproducing apparatus, reproducing method, reproducing program, recording medium, and data structure

A state transition of a player operation is explicitly defined to facilitate the production of interactive contents. As a player model for reproducing a disk, a model including a player for reproducing a stream, a platform providing an interface between the player and a hardware, and a script player for realizing a scenario intended by a content producer is conceived. The states of the player are defined by four states defined by combinations of two states as to whether the play list reproduction is performed or not and two states as to whether the command is accepted or not. The state transition of the player among the four states is generated by a method from the script layer , but not by the player itself or the command . The states of the player are small in number, and the conditions for state transition are definite. Therefore, the interactive contents can be easily produced and mounted on devices.

  • Pub Date: 2005/10/11
  • Number: 08369683
  • Owner: Sony Computer Entertainment Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Method for improving false acceptance rate discriminating for biometric authentication systems

A method, system and computer program product for improving error discrimination in biometric authentication systems. The error discrimination is set to a predetermined security policy. A plurality of biometric samples are provided and authenticated by a computer system in conjunction with a security token. An alternate embodiment allows inputting of the plurality of biometric samples in a predetermined sequence. The predetermined input sequence is maintained as an authentication secret which may be used to further reduce the authentication transaction error rate. A user may input one or more biometric samples, where a portion of the biometric samples are inputted in a predetermined sequence, selecting from among a plurality of available processing units, a set of processing units which will generate intermediate results from the processing of the biometric samples, processing at least a portion of the biometric samples by the selected set of processing units to provide intermediate results, verifying the predetermined sequence, and arbitrating the intermediate results to generate a final result which at least meets a predetermined security policy. Various embodiments provide for a security token to perform at least a portion of the processing or the arbitration function.

  • Pub Date: 2005/10/11
  • Number: 08014570
  • Owner: ActivCard, Inc.
  • Location: Fremont, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for creating templates

A template creator creates a template class that stores at least one template parameter. The template creator also specifies at least one additional object to be created when an instance of the template class is created. A template user initiates the creation of a new instance of the template class. If an error occurs during the creation of the new instance of the template class, the template user receives a report identifying the error.

  • Pub Date: 2005/10/11
  • Number: 07653913
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Induced sludge bed anaerobic reactor

An induced sludge bed anaerobic reactor includes a vessel in which a septum or other partition is positioned to maintain solids in wastewater being treated toward a lower zone in the reactor. A gas trap, which may also comprise an overpressure protection device, may be arranged at an outlet of the vessel. A distribution plate may be located at an inlet. A central aperture is formed in the septum into which a plug control mechanism, such as an auger, may be positioned to force solids to the lower zone of the reactor or, alternatively, pull solids up above the septum so that they can be removed from the vessel, if desired. A mixer may be utilized in connection with the bioreactor to mix the contents and prevent a crust from forming at the top of the bioreactor. Still further, a wall may be positioned to extend above the septum around its perimeter to assist in separating solids from the wastewater. The various types of bacteria used in the anaerobic process may also be separated, according to the present invention, in either a single vessel or multiple vessels so that the conditions of each respective vessel can be altered as desired.

  • Pub Date: 2005/10/11
  • Number: 1987895
  • Owner: Utah State University
  • Location: North Logan, US
  • Details: Visit USPTO

Visit USPTO Page


Engineering Fc Antibody regions to confer effector function

The present invention relates to molecules having a variant Fc region, wherein said variant Fc region comprises at least one amino acid modification relative to a wild-type Fc region. These modified molecules confer an effector function to a molecule, where the parent molecule does not detectably exhibit this effector function. In particular, the molecules of the invention have an increased effector cell function mediated by a FcγR, such as, but not limited to, ADCC. In one embodiment, the variant Fc region binds FcγRIIIA and/or FcγRIIA with a greater affinity, relative to a comparable molecule comprising the wild-type Fc region. The molecules of the invention have particular utility in treatment, prevention or management of a disease or disorder, such as cancer, in a sub-population of patients, wherein the target antigen is expressed at low levels in the target cell population, in particular, in patients refractory to treatment with an existing therapeutic antibody due to the low level of target antigen expression on the cancer or associated cells.

  • Pub Date: 2005/10/11
  • Number: 07632497
  • Owner: MacroGenics, Inc.
  • Location: Rockville, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamically sizing a collaboration of concurrent computing workers based on user inputs

A dynamic collaboration of processes in a concurrent computing environment is disclosed. A user can modify the size of collaboration or the number of processes that execute a computational job after the processes have been launched on the concurrent computing environment. A launched or running process can establish a communication channel with other processes in the collaboration so that the launched or running process can join the collaboration to execute the job. The user can also release a process from the collaboration so the released process can join a new collaboration to execute a different job. Once a job is completed, the processes can leave the collaboration, and the processes are then free to join a new collaboration subsequently.

  • Pub Date: 2005/10/11
  • Number: 2091889
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic definition for concurrent computing environments

The present invention provides a method and system for dynamically configuring computing environment for concurrent computing. Given a specific configuration and/or the number of concurrent computing labs at start up of an executable process, the executable process may be set up for parallel computing environment using local resources and/or remote resources. A configuration is used to store all configuration information so that a one-string configuration may be used. The one-string configuration may be used at start up of an executable process or may be provided as an argument to a function.

  • Pub Date: 2005/10/11
  • Number: 2046296
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Speech index pruning

A speech segment is indexed by identifying at least two alternative word sequences for the speech segment. For each word in the alternative sequences, information is placed in an entry for the word in the index. Speech units are eliminated from entries in the index based on a comparison of a probability that the word appears in the speech segment and a threshold value.

  • Pub Date: 2005/09/11
  • Number: 07831428
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Process for treatment of biomass feedstocks

A method and apparatus for continuously treating a moist biomass feedstock is disclosed. The method includes treating a biomass feedstock with a swelling agent in a pressurized first vessel, transferring the feedstock to a second vessel at a lower operating pressure than the first vessel such that the biomass fibers rupture. At least portions the swelling agent, and/or the moisture are recycled in the process.

  • Pub Date: 2005/09/11
  • Number: 07937851
  • Owner: Michigan Biotechnology Institute
  • Location: Lansing, US
  • Details: Visit USPTO

Visit USPTO Page


Colorimetric assay for the determination of hydrolysis activity from HD and other halogenated organics

An assay for screening potential hydrolysis enhancing agents capable of facilitating the hydrolysis of a substantially water insoluble halogenated compound such as mustard gas (HD) in an aqueous reaction mixture is disclosed. The assay includes at least one chamber adapted for receiving and retaining the substantially water insoluble mustard gas compound and a potential hydrolysis agent in an aqueous reaction mixture, and a pH indicating agent adapted to produce a visible color change corresponding to the amount of the substantially water insoluble mustard gas compound hydrolyzed in the aqueous reaction mixture wherein the rate of hydrolysis can be established by measuring the change in the detectable signal over time.

  • Pub Date: 2005/09/11
  • Number: 08357335
  • Owner: The United States of America as Represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Abstract interface for unified communications with dynamic models

The present invention provides a method and system for interfacing with a model regardless of model type. An abstract interface is provided for interfacing a model. The abstract interface is compatible with a plurality of model types. A call can then be made to a dynamic model via a method specified by the abstract interface. Data is then received from the dynamic model in response to the call. In certain embodiments the abstract interface is an application programming interface (API).

  • Pub Date: 2005/09/11
  • Number: 08127311
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for delivering content based on receivers characteristics

Media distribution systems may include methods and apparatus to perform memory management on a wireless devices configured to receive non-real time portions of media services. Such methods and apparatus may be based upon an allowable capacity of presentations storable in device memory, as well as on a required memory associated with each presentation in a media service. Such methods and apparatus allow a device to subscribe to a media service based upon sufficient available memory in the device to support the service.

  • Pub Date: 2005/08/11
  • Number: 2026310
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Indexing and searching speech with text meta-data

An index for searching spoken documents having speech data and text meta-data is created by obtaining probabilities of occurrence of words and positional information of the words of the speech data and combining it with at least positional information of the words in the text meta-data. A single index can be created because the speech data and the text meta-data are treated the same and considered only different categories.

  • Pub Date: 2005/08/11
  • Number: 07809568
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid programming

Hybrid programming combines certain aspects of the synchronous calling nature of a thread-oriented programming model with certain aspects of the asynchronous calling nature of an event-oriented programming model by creating parallelized calls. In a described implementation, multiple synchronous calls are transformed into multiple asynchronous calls and encapsulated within a barrier time period. A hybrid programming model or protocol may be employed, for example, in conjunction with communication exchanges in a multiple-phase and multiple-party distributed programming environment.

  • Pub Date: 2005/08/11
  • Number: 07865911
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic debugging dump for game console

An error data dumping process on a game console is described, in which a request for an error data dump may be initiated using commands mapped to a handheld game controller. The request may include parameters for customizing the resulting dump, where the parameters may identify one or more physical memory address ranges to be included in the dump. Allocated virtual memory contents may also be added to the dump data structure, as can call stack data (such as thread lists and module lists) and system information. The assembled dump data can be written to a file and uploaded, via secure communication, to a network location where it may be indexed.

  • Pub Date: 2005/08/11
  • Number: 08088011
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Certifying a software application based on identifying interface usage

Embodiments of the present invention provide a mechanism for certifying the compatibility of a software product by identifying the interfaces (API or ABI) used by that product. The source code or object code of a component is analyzed by a tool that traces which interfaces and data structures of an ABI/API are being utilized. For example, an ISV or IHV may be required to run the tool on their respective components in order to have that component certified with a particular version of an operating system and submit the results to a certification service. The certification service may collect this API/ABI information into an integrated database. The certification service may then use this database to analyze the impact of changes to an operating system at the binary interface level, proactively notify vendors prior to these changes, test compatibility and emulation libraries, and certify components are compatible with an operating system without the need of significant testing.

  • Pub Date: 2005/08/11
  • Number: 08332817
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic orchestration of dynamic multiple party, multiple media communications

A communication orchestration service automatically orchestrates dynamic multiple party, multiple media communications. A customer expresses his or her communications needs in the form of a high-level goal or goals. A goal-based search finds a combination of building block predicates that can be used to satisfy the customer's needs. In conjunction with the search process, the mechanism uses the SIP OPTIONS request or presence information to actively query device status and capabilities during the search. This enables the search to actively explore the communications environment at runtime. Once a solution is found, the necessary parties can be contacted, resources can be provisioned, and the multiple media, multiple user collaboration/conference can be initiated.

  • Pub Date: 2005/08/11
  • Number: 08041800
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system, and method for offloading pattern matching scanning

Diagnostic software often requires pattern matching scanning to be performed to detect problems such as computer viruses or unwanted intruders. A computing system offloads pattern matching scanning from a central processing unit to a graphics processing unit.

  • Pub Date: 2005/08/11
  • Number: 07818806
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for providing and presenting customized channel information

Apparatus and methods for providing and presenting customized channel information include receiving service attribute information corresponding to a base service, where the base service is operable to provide at least a portion of a presentation to a device. The apparatus and methods further include customizing the service attribute information, and providing channel information to the device. The channel information comprising the customized service attribute information, thereby providing a custom view of a channel.

  • Pub Date: 2005/08/11
  • Number: 08893179
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Partial XML validation

Modifying a portion of an XML document stored in a relational database includes converting operations on the document into an operator tree. The operator tree includes a first operator corresponding to a first portion of the schema for the modified data and a second operator corresponding to a parent portion of the schema for the modified data. A first and a second portion of the schema are extracted from the overall document schema. A first validation of the modified data using the first operator with the first portion of the schema is performed. This forms a partially validated XML document portion. Next, a second validation of the partially validated XML document portion with the second portion of the schema is performed using the second operator. The XML document constraints are verified and the modified data is merged into the XML document, thus avoiding a full validation of the XML document when certain XML Schema types are absent in the modified data.

  • Pub Date: 2005/07/11
  • Number: 2095313
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for enforcing safety properties of computer programs by generating and solving constraints

A method and apparatus is disclosed herein for generating and solving constraints. In one embodiment, the method comprises modifying program code by inserting one or more dynamic annotations having unsolved variables, generating one or more constraints based on the one or more dynamic annotations using a verifier, solving the one or more generated constraints; and modifying the program code by inserting a dynamic annotation in place of an annotation containing an unsolved variable.

  • Pub Date: 2005/07/11
  • Number: 2076973
  • Owner: NTT Docomo, Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Independent message stores and message transport agents

Multiple independent MTAs transmit messages such that if one of the MTAs fails, the other MTAs may continue to transmit messages. Multiple independent message stores are provided such that if one of the message stores fails, messages on the other message stores may continue to be transmitted. Multiple notification agents monitor the message stores for new messages and notify one of the MTAs when a new message is available for transmission.

  • Pub Date: 2005/07/11
  • Number: 08077699
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Fingertip tracker

A method, apparatus, system, and article of manufacture provide the ability to utilize fingertip tracking technology during the course of a medical examination. A sensor is mounted on a fingertip of a finger of a first person. Such a sensor is communicatively coupled to a computer to record measurements. The sensor is calibrated using a known target. The finger having the sensor is then engaged to perform a medical examination directly on a second person. Measurements are obtained from the sensor on the fingertip during the medical examination. Data is obtained (e.g., via calculations or interpolation) based on the measurements.

  • Pub Date: 2005/07/11
  • Number: 2057291
  • Owner: California Institute of Technology
  • Location: Pasadena, US
  • Details: Visit USPTO

Visit USPTO Page


Enforcement of security policies for kernel module loading

A method and computer program product for providing enforcement of security policies for kernel module loading is presented. File paths for shared library executable files opened by user processes are cached. When a request to load a kernel loadable module (KLM) is received, a previously cached file path for said KLM is retrieved, said file path mapping a location of an executable file from which said KLM was produced. A security policy is applied to said file path, wherein when said file path triggers a security policy rule then an action associated with a triggered rule is taken, and wherein when said file path does not trigger a security policy rule then said KLM request is allowed to proceed.

  • Pub Date: 2005/07/11
  • Number: 2050233
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Web search engine with graphic snapshots

A search engine manages the indexing of web page contents and accepts user selection criteria to find and report hits that meet the search criteria. The inventive search engine has an associated crawler function wherein display images of the web pages are rendered and stored as snapshots, preferably when the pages are indexed. The search engine reports search results by composing an html page with links to the corresponding page hits and containing snapshot reduced size graphic images showing the web pages as they appeared when fetched and stored as snapshots.

  • Pub Date: 2005/04/11
  • Number: RE042413
  • Owner: Bayard Chimney Rock LLC
  • Location: Los Altos, US
  • Details: Visit USPTO

Visit USPTO Page


Static instrumentation macros for fast declaration free dynamic probes

Embodiments of the present invention provide a dynamic instrumentation system that uses statically defined probes. The probes may be defined using macro definitions. One or more libraries of macro definitions that are linked to static probes are provided in the computer system. Each probe is uniquely identified by a name having a well-defined prefix and a structured format. Probes may then be inserted at various locations and into the target software using standard macro calls. When the target software is compiled, the macro calls of each probe are expanded to calls to an existing function known as a probe handler function. Each probe handler function is identified in the computer system's symbol table with a unique symbol that corresponds to the name specified by the macro definition. When a probe is activated, the operating system kernel transfers control to an instrumentation kernel object. The instrumentation kernel object locates and runs the probe handler function to perform the actions requested for that probe.

  • Pub Date: 2005/04/11
  • Number: 08739135
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for connecting a secure peer-to-peer collaboration system to an external system

A connection between a secure shared space and an external system is created with a connector tool. The connector tool code is included in an independent agent called a “bot” that is created by a software developer. Bots run in the background in an automated and unattended manner in a specialized enterprise integration server. Each bot has a unique identity and runs under an account assigned to the enterprise integration server. A bot can be invited to a shared space much as another collaborator. Bots can also invite others to shared spaces. All bots running in the enterprise integration server are administered by a centralized administrative control. This allows account and identity policies to be established and global behaviors, including authentication settings, startup options and scope to be determined centrally. The centralized control allows simple installation, configuration and deployment and administrative control of bot operation and access. It also allows for logging and monitoring of system behavior.

  • Pub Date: 2005/04/11
  • Number: 2024525
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Information processing device, storage device and computer-readable medium for accepting description information of multi-media content including keywords and reference information indicative of duplicative occurrence of each keyword and retrieving location information in the content using the respective keywords and associated reference information

There are provided a storage device and a computer readable medium capable of efficiently storing keywords contained in description information and efficiently retrieving the keyword. A list producing portion extracts the keywords from the description information and produces a keyword list correlating the keywords with the scene information containing the keywords. A description information converter converts the keywords contained in the keyword list received from the list producing portion among the keywords contained in the externally received description information into reference information for specifying the keywords in the keyword list received from the list producing portion. A storage stores the converted description information provided from the description information converter and the keyword list provided by the list producing portion.

  • Pub Date: 2005/04/11
  • Number: 08166073
  • Owner: Sharp Kabushiki Kaisha
  • Location: Osaka, JP
  • Details: Visit USPTO

Visit USPTO Page


Drug-eluting stents coated with non-nucleotide P2Yreceptor antagonist compound

The present invention provides a drug-eluting stent, wherein the stent is coated with one or more non-nucleotide P2Yreceptor antagonist compounds or a pharmaceutically acceptable salt, solvate, or hydrate thereof. When the stent is placed in a narrowed or damaged arterial vessel, a therapeutically effective amount of the P2Yreceptor antagonist compound is eluted continuously from the stent to the local environment of the stent. The P2Yreceptor antagonist compound-eluting stents are useful in preventing thrombosis and restenosis, and are effective in inhibiting the contraction of vascular smooth muscle cells, inhibiting cell proliferation, and reducing inflammation.

  • Pub Date: 2005/04/11
  • Number: 07749981
  • Owner: Inspire Pharmaceuticals, Inc.
  • Location: Durham, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and methods for treating and preventing heart tissue degeneration and uses thereof

The present invention provides compositions useful for cardiac therapy comprising a cyclin-associated agent. The present invention also provides kits for use in delivering a cyclin-associated agent to cardiac cells in a subject, comprising the composition of the present invention and a catheter. The present invention additionally provides a methods for enhancing cardiac function; promoting regeneration of cardiac tissue; inducing endogenous myocardial regeneration; and preventing or treating heart failure in a subject in need thereof by augmenting cyclin in cells.

  • Pub Date: 2005/04/11
  • Number: 2051036
  • Owner: The Trustees of Columbia University in the City of New York
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Communication protocol for synchronizing animation systems

A communications protocol is described that governs asynchronous exchange of data between a high level animation system and a low level animation system. The high level animation system has a variable, medium-frequency frame rate and is optimized for interactivity. The low level animation system has a constant, high frequency frame rate and is optimized for high refresh frame rate. The communications protocol includes messages that can be sent by the high-level animation system to the low-level animation system to designate an animation and how the animation is to change over a specified period of time. As a result, the low-level system can display the animation at the high refresh rate even if animation data is not received from the high-level system for every frame.

  • Pub Date: 2005/04/11
  • Number: 07436409
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Availability data service

Real time availability data (free/busy data) is provided for potential meeting attendees and/or assets. An availability service is queried for availability data for one or more attendees and/or meeting assets. The availability service determines the identity of an electronic mailbox server on which is stored current real time calendaring data for the desired attendees and/or assets. The requested data is retrieved by the availability service from one or more mailbox servers having data for each attendee and/or asset. Potential attendees may set permissions on their respective availability data to restrict the amount and types of data that may be retrieved by a given data requester. Data queries and data responses may be structured according to the Extensible Markup Language (XML) and application programming interfaces (API) may be exposed for allowing requesting applications to efficiently call the availability service for availability data.

  • Pub Date: 2005/04/11
  • Number: 07849102
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Seat assembly with movable seat and backrest and method

A seat assembly () for a vehicle including a seat (), a seat mounting assembly () mounting the seat for movement along an upwardly concaved arcuate path, a backrest assembly () having a lower backrest portion () coupled for motion with the seat and an upper backrest portion () mounted in a vertically extending direction. The backrest assembly further includes a recliner frame and mechanism (). The seat assembly, also including the steps of mounting the seat () for spherically guided movement along said path, mounting the backrest proximate the seat. The assembly () and method disclosed further employs mounting the seat () having a spherical surface () and guide track () the guide track mated to spherical support surface (), and may include slider roller elements () such that the seat mounting assembly accommodates lateral, diagonal and fore and aft seat motion ().

  • Pub Date: 2005/03/11
  • Number: 09399415
  • Owner: AMERICAN ERGONOMICS CORPORATION
  • Location: Novato, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time database performance and availability monitoring method and system

Database performance and availability monitoring of changes impacting database performance, availability and continuity to the underlying business may be performed. A method for doing so may include analytical and visual real-time analysis engines to identify and provide alert notifications on changes in database performance statistics (such as CPU consumption, physical I/O, etc.) related to a sample period of time on a single database or across multiple databases. Result data may be displayed through a series of charts and/or summary tables that may indicate whether correlations exist between unexpected database performance and relative changes in database performance statistical parameters.

  • Pub Date: 2005/03/11
  • Number: 07756840
  • Owner: DBA InfoPower Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Modular intelligent transportation system

A modular intelligent transportation system, comprising an environmentally protected enclosure, a system communications bus, a processor module, communicating with said bus, having a image data input and an audio input, the processor module analyzing the image data and/or audio input for data patterns represented therein, having at least one available option slot, a power supply, and a communication link for external communications, in which at least one available option slot can be occupied by a wireless local area network access point, having a communications path between said communications link and said wireless access point, or other modular components.

  • Pub Date: 2005/03/11
  • Number: 07983835
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing a conference call

A system, method, and computer program product for initiating a conference call are disclosed. The method includes running a conference call managing application. The method also includes receiving at least one participant-defined condition. The participant-defined condition is associated with at least one conference call defining a status of a participant's communication device to connect the participant to the conference call. At least one alert is sent out to at least all required participants of the conference call, in response to the participant-defined condition being satisfied to start the conference call.

  • Pub Date: 2005/02/11
  • Number: 08160223
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system of controlling computer system external effects for a computer game, the external effects such as incandescent lights, fluorescent lights, vibration devices, LED/laser diodes, and/or fans

A method and system of controlling computer system external effects. At least some of the illustrative embodiments may be a computer system comprising a processor (wherein a computer system user interacting with software executed on the processor triggers a software event), and an external effects controller coupled to the processor (wherein the external effects controller controls at least one device being a purely aesthetic device or a non-aesthetic device operated in a manner for aesthetic reasons). The computer system user selectively associates the at least one device to the software event such that, if associated, upon occurrence of the software event an operational state of the at least one device is changed by the external effects controller.

  • Pub Date: 2005/02/11
  • Number: 08131885
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Audio visual architecture

Aspects of an audio/visual architecture are disclosed. In one aspect, a system is disclosed where the system has a media manager object, an audio/visual program, and a player/recorder object so that when the program is selected, the media manager dynamically loads the player/recorder object for either playing or recording the program. For example, with respect to the media manager object, it can manage a collection of related program entities and any corresponding player/recorder components. Also, the media manager can allocate share source ports and shared sink ports in order to dynamically create virtual circuit paths for selected program entries.

  • Pub Date: 2005/02/11
  • Number: 08413196
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Workflow decision management with workflow modification in dependence upon user reactions

Methods, systems, and computer program products are provided for workflow decision management. Embodiments include maintaining a device state history; identifying a device usage pattern in dependence upon the device state history; identifying a workflow scenario in dependence upon the device usage pattern; identifying a workflow in dependence upon the workflow scenario; executing the workflow; identifying a user reaction to the execution of the workflow; identifying an unsuccessful device-controlling action in dependence upon the user reaction; and modifying the workflow in dependence upon the identified unsuccessful device-controlling action. Typical embodiment also include recording, as a representation of a negative user reaction, a determined change between the device attribute value set by executing the workflow and the current value of the device attribute in a user reaction log.

  • Pub Date: 2005/01/11
  • Number: 08010700
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Template-based multimedia authoring and sharing

Systems and methods for template-based multimedia authoring and sharing are described. In one aspect, media content is selectively applied to a content description template to author media in a content description. The content description template provides a temporal structure for the applied media content. A content representation template is selected and combined with the temporally structured media in the content description to specify rendering criteria and generate a content description and representation for one or more of rendering, sharing, and exporting the temporally structured authored media.

  • Pub Date: 2005/01/11
  • Number: 08196032
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing interactions from multiple speech-enabled applications

Systems and methods are described for speech systems that utilize an interaction manager to manage interactions—also known as dialogues—from one or more applications. The interactions are managed properly even if multiple applications use different grammars. The interaction manager maintains an interaction list. An application wishing to utilize the speech system submits one or more interactions to the interaction manager. Interactions are normally processed in the order in which they are received. An exception to this rule is an interaction that is configured by an application to be processed immediately, which causes the interaction manager to place the interaction at the front of the interaction list of interactions. If an application has designated an interaction to interrupt a currently processing interaction, then the newly submitted application will interrupt any interaction currently being processed and, therefore, it will be processed immediately.

  • Pub Date: 2005/01/11
  • Number: 07299185
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing hard lock state information in a distributed storage system environment

A system and method manages lock state information in a distributed file system. A meta-data volume includes a lock state database which is a comprehensive source for lock state information about a striped volume set in the system. A plurality of data volumes includes local lock caches which contain information about locks. Lock state messaging between the meta-data volume and the data volumes is used to assign locks and to update local lock caches. The meta-data volume is configured to assigned permissive areas in the data containers accessed by clients in order to efficiently manage the lock state information.

  • Pub Date: 2005/01/11
  • Number: 07587558
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for histogram based chatter suppression

A system and method suppresses chattering events in a storage system by determining a suppression level based upon a rate of growth of log files. An event management system of the storage system calculates a histogram and a set of statistics including a mean and standard deviation associated with non-chattering events. A cutoff point is determined for the non-chattering events and is utilized for each received event to determine if the received event is a chattering event. Events determined to be a chattering event are suppressed according to a predefined suppression rate.

  • Pub Date: 2005/01/11
  • Number: 08032896
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for event notification using an event routing table

A system and method efficiently conveys event notification using an event routing table. An event is detected and forwarded to an event management system (EMS) that determines if any thresholds have been exceeded. If a threshold has been exceeded, one or more destination names from a routing table are expanded using a destination table and appropriate event notifications are sent.

  • Pub Date: 2005/01/11
  • Number: 08255425
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method of injection compression molding

In an injection compression molding method, dies are clamped with low pressure and a melted thermoplastic resin composition is filled in a cavity space from a gate while moving the cavity space relative to the gate, and then the dies are clamped with a high pressure substantially simultaneously with completion of the filling to compress and form the thermoplastic resin composition filled in the cavity space. Since the thermoplastic resin composition containing a high content of thermally-conductive filler such as an electrically-conductive filler can be injected and compressed to be molded, the injection compression molding method can be applied in manufacturing molding such as a fuel cell separator and a flat antenna.

  • Pub Date: 2005/01/11
  • Number: 07691314
  • Owner: Idemitsu Kosan Co., Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Intermediate message invalidation

Methods, systems, and products are provided for intermediate message invalidation that include receiving, to an intermediate message validation service, a message to be forwarded to a device to administer at least one value of an attribute of the device; determining, by the intermediate message validation service, that the message is invalid; and terminating, by the intermediate message validation service, the invalid message. Embodiments may also include notifying a system administrator that the message is invalid.

  • Pub Date: 2005/01/11
  • Number: 08155119
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Voice-capable system and method for user-directed network interaction monitoring for authentication and confidentiality designation

A system and method for use with a voice-capable system, includes but is not limited to a method including receiving a request from a user computationally networked to the voice-capable system, the request to designate a network interaction as a monitored network interaction using the security interface, and receiving one or more user-defined designations during the monitored network interaction, the one or more user-defined designations to designate one or more data as requiring the voice-capable system to perform one or more operations with respect to the one or more data.

  • Pub Date: 2005/31/10
  • Number: 07937745
  • Owner: The Invention Science Fund, I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for compiling applications on a test server

Methods and systems for synchronizing applications deployed on a test server are provided. The methods and systems may comprise a software application comprising a plurality of files deployed on a test server. After the software application is deployed on a test server, one of the plurality of files comprising the software application may be modified in a development environment. The methods and systems may comprise a synchronization manager operative to, after modification of the one of the plurality of files, synchronize only the modified file with the software application deployed on the test server.

  • Pub Date: 2005/31/10
  • Number: 07778968
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System, method and data structure for simulated interaction with graphical objects

Object simulation and interaction of and between computer-generated or graphical objects in a virtual space includes neutral scene graphs, data structures and procedures for using such graphs and data structures.

  • Pub Date: 2005/31/10
  • Number: 2063598
  • Owner: Immersion Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of service product offer management

The disclosure is generally directed to a system and method of managing and deploying Internet protocol television (IPTV) services. The method includes a service product offer management and deployment system. The method further includes a service product ordering subsystem to receive and process a service product order in response to service product offer. The service product order identifies a particular communication service subscriber, a service area, a service control group, a service product attribute, a facility deployment component, and a set of permitted end user device types. The method also includes a service delivery platform subsystem coupled to the service product ordering subsystem. Further, the method includes an Internet protocol television deployment subsystem coupled to the service delivery platform. The Internet protocol television deployment subsystem includes a plurality of video content packages.

  • Pub Date: 2005/31/10
  • Number: 2043713
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for creating a presentation using natural language

The invention provides for a system, method, and computer readable medium storing instructions related to controlling a presentation in a multimodal system. The method embodiment of the invention is a method for the retrieval of information on the basis of its content for incorporation into an electronic presentation. The method comprises receiving from a user a content-based request for at least one segment from a first plurality of segments within a media presentation preprocessed to enable natural language content searchability; in response to the request, presenting a subset of the first plurality of segments to the user; receiving a selection indication from the user associated with at least one segment of the subset of the first plurality of segments and adding the selected at least one segment to a deck for use in a presentation.

  • Pub Date: 2005/31/10
  • Number: 09026915
  • Owner: AT&T Intellectual Property II, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Rebootless display driver upgrades

Systems and methods for rebootless updating of a IHV display driver are disclosed. According to such a method, first, the operating system stops the driver from running. Second, the system switches over to an interim or temporary display driver, which be a default driver provided with the operating system. Third, the new hardware-specific driver is started. Thus, a hardware-specific display driver may be updated without rebooting.

  • Pub Date: 2005/31/10
  • Number: 08056072
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Optical aberration correction for machine vision inspection systems

A high-accuracy optical aberration correction system and method. Z-heights determined by an auto-focus tool, which would otherwise vary depending on the orientation angle of surface features or edges in the focus region of interest, and on the location of the focus region of interest in the field of view, are corrected based on a novel error calibration method. Error calibration data includes a set of Z-corrections for a range of different feature orientation angles (e.g., 180 degrees), for multiple locations in the field of view. Error calibration data may be interpolated to correspond to the location of the current focus region of interest. During auto-focus measurements, a Z-correction may be adapted for a current measurement by weighting orientation-dependent error calibration data based on a histogram of the gradient (edge) directions present in the current focus region of interest.

  • Pub Date: 2005/31/10
  • Number: 07724942
  • Owner: Mitutoyo Corporation
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Nanoscale wicking methods and devices

A fluid transport method and fluid transport device are disclosed. Nanoscale fibers disposed in a patterned configuration allow transport of a fluid in absence of an external power source. The device may include two or more fluid transport components having different fluid transport efficiencies. The components may be separated by additional fluid transport components, to control fluid flow.

  • Pub Date: 2005/31/10
  • Number: 08021967
  • Owner: California Institute of Technology
  • Location: Pasadena, US
  • Details: Visit USPTO

Visit USPTO Page


Multichip rendering with state control

Circuits, methods, and apparatus that provide multiple graphics processor systems where specific graphics processors can be instructed to not perform certain rendering operations while continuing to receive state updates, where the state updates are included in the rendering commands for these rendering operations. One embodiment provides commands instructing a graphics processor to start or stop rendering geometries. These commands can be directed to one or more specific processors by use of a set-subsystem device mask.

  • Pub Date: 2005/31/10
  • Number: 07629978
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Model of sensitivity of a simulated layout to a change in original layout, and use of model in proximity correction

A memory is encoded with a model of sensitivity of a distorted layout generated by simulation of a wafer fabrication process, with respect to a change in an original layout that is input to the simulation. The sensitivity model comprises an expression of convolution of the original layout with spatial functions (“kernels”) that are identical to kernels of a process model used in the simulation. A difference between the distorted layout and the original layout is computed, and the difference is divided by a sensitivity value which is obtained directly by evaluating the kemel-based sensitivity model, and the result is used to identify a proximity correction (such as serif size or contour movement) to be made to the original layout. Use of a sensitivity model based on a process model's kernels eliminates a second application of the process model to evaluate sensitivity, thereby to reduce memory and computation requirements.

  • Pub Date: 2005/31/10
  • Number: 07458059
  • Owner: SYNOPSYS, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for visualizing three-dimensional and higher-dimensional image data sets

In one aspect, the invention provides improvements in a digital data processor of the type that renders a three-dimensional (3D) volume image data into a two-dimensional (2D) image suitable for display. The improvements include a graphics processing unit (GPU) that comprises a plurality of programmable vertex shaders that are coupled to a plurality of programmable pixel shaders, where one or more of the vertex and pixel shaders are adapted to determine intensities of a plurality of pixels in the 2D image as an iterative function of intensities of sample points in the 3D image through which a plurality viewing rays associated with those pixels are passed. The pixel shaders compute, for each ray, multiple iteration steps of the iterative function prior to computing respective steps for a subsequent ray.

  • Pub Date: 2005/31/10
  • Number: 08189002
  • Owner: PME IP Australia Pty, Ltd.
  • Location: Richmond, Victoria, AU
  • Details: Visit USPTO

Visit USPTO Page


File system write filtering for selectively permitting or preventing data from being written to write-protected storage

File system write filters are provided which can selectively permit or prevent data from being written-protected storage media. The write filter utilized volatile cache memory to store data that is requested to be written to storage media by applications programming interface function calls. In one aspect, if the particular data is requested to be written to a file that is a file identified on the file exclusion list, the data can be written to the file in non-volatile storage. Otherwise, the particular data is written to volatile cache memory. In another aspect, the write filters can be utilized on computing devices to create a stateless computing device wherein data is written to volatile cache memory in response to write function calls. Upon rebooting, any data that was saved to the volatile cache memory is discarded and the computing device is restored to its original state.

  • Pub Date: 2005/31/10
  • Number: 2048260
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Extensible power control for an autonomically controlled distributed computing system

The invention is directed to techniques of extensible power control for an autonomically controlled distributed computing system. In particular, control nodes of the distributed computing system utilize software power control modules to communicate with hardware power controllers within the distributed computing system. The power control modules are discrete software units that may be easily deployed and un-deployed while software on the control node is executing. Further, each power control module corresponds to one or more firmware versions of one or more types of hardware power controller. The power control modules are each implementations of a software interface common to every power control module. Because the power control modules share a common interface, the software on the control node that autonomically controls the distributed computing environment does not need to consider differences among types of hardware power controllers and versions of firmware installed on the hardware power controllers.

  • Pub Date: 2005/31/10
  • Number: 08745124
  • Owner: CA, Inc.
  • Location: Islandia, US
  • Details: Visit USPTO

Visit USPTO Page


Enterprise Java Bean (EJB) based enterprise printing architecture

Features of Enterprise Java Bean (EJB), Enterprise Printing Bean (EPB), JAVA, J2EE, and document authoring are combined to enable a robust enterprise printing architecture. A Java object encapsulates a print job specification and provides a framework enabling access control to print jobs as well as providing audit capabilities. Print control languages can be specified using methods provided by the Java object. Actual process implementation can be supplied via a server enabling another layer of security and control. A user wanting to securely print a job supplies appropriate credentials to the print job bean to gain access to the content and print server credentials allow printing of the print job. The EJB API is extendable to enable all of the J2EE capabilities found on standard EJBs to be applied to print Jobs. Further, a new Java API provides a more powerful page description language than that found in other printing languages.

  • Pub Date: 2005/31/10
  • Number: 08209688
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Domain name resolution using a distributed DNS network

A distributed DNS network includes a central origin server that actually controls the zone, and edge DNS cache servers configured to cache the DNS content of the origin server. The edge DNS cache servers are published as the authoritative servers for customer domains instead of the origin server. When a request for a DNS record results in a cache miss, the edge DNS cache servers get the information from the origin server and cache it for use in response to future requests. Multiple edge DNS cache servers can be deployed at multiple locations. Since an unlimited number of edge DNS cache servers can be deployed, the system is highly scalable. The disclosed techniques protect against DoS attacks, as DNS requests are not made to the origin server directly.

  • Pub Date: 2005/31/10
  • Number: 2075522
  • Owner: Akamai Technologies, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed shared persistent objects

A system and method are described for managing a shared object in a distributed collaboration environment. The distributed collaboration environment is composed of at least one edge server in communication with a central server. When a client desires to modify the shared object, it issues an object modification request to the edge server it is connected to. The edge server compares the version identifier of the client shared object against the version identifier of the edge shared object. If the versions do not match, the edge server rejects the modification. Otherwise, it will forward the modification request to the central server for further consideration.

  • Pub Date: 2005/31/10
  • Number: 07945615
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed sensing techniques for mobile devices

Methods and apparatus of the various embodiments allow the coordination of resources of devices to jointly execute tasks or perform actions on one of the devices. In the method, a first gesture input is received at a first mobile computing device. A second gesture input is received at a second mobile computing device. In response, a determination is made as to whether the second gesture is accepted at the initiating device. If it is determined that the second gesture inputs is accepted, then resources of the devices are combined to jointly execute a particular task associated with the shared resources.

  • Pub Date: 2005/31/10
  • Number: 07636794
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Compressed program recording

Program execution can be monitored and recorded for later playback. Certain state changes that can be predicted via a virtual processor during playback need not be recorded, so a compressed recording can be stored. To facilitate random access with respect to time during playback, key frames can be stored within the compressed recording. An index mechanism can associate key frames with particular memory addresses. Additionally, a snapshot of values for memory addresses can be used to further facilitate determining the value of a memory address without having to simulate execution. Multiprocessor executions can be supported, and playback can be done on a machine type different from that on which recording took place.

  • Pub Date: 2005/31/10
  • Number: 07620938
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Cationic ceramides, and analogs thereof, and their use for preventing or treating cancer

The present invention relates to cationic ceramides, their dihydro-analogs and aromatic analogs and their derivatives, comprising a pyridinium group. Also provided are methods for making cationic ceramides comprising a pyridinium group, and their use for treating or preventing diseases associated with cell overproliferation and sphingolipid signal transduction, such as cancer, inflammation, and stenosis. The compounds are also useful as mitochondritropic agents that are localized to mitochondria carrying with them chemical cargoes, such as drugs, or signaling molecules, such as fluorophores for probing organelle structure and functions.

  • Pub Date: 2005/31/10
  • Number: 08093393
  • Owner: MUSC Foundation for Research Development
  • Location: Charleston, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for efficiently guaranteeing data consistency to clients of a storage system cluster

A system and method efficiently guarantees data consistency to clients for one or more data containers stored on a plurality of volumes configured as a striped volume set (SVS) and served by a plurality of nodes connected as a cluster. Data consistency guarantees of data containers stored on the SVS is generally provided by delegating to data volumes (DVs) sufficient authority to autonomously service input/output (I/O) requests directed to the containers using attributes, such as timestamps, of the containers. Specifically, a DV is only allowed to service I/O requests, e.g., read and write operations, to a data container, such as a file, if it has a valid ticket book for the file. A DV requests and is granted the ticket book from a container attribute volume (CAV) on a per-file basis.

  • Pub Date: 2005/28/10
  • Number: 07409497
  • Owner: Network Appliance, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Server for updating location beacon database

A location beacon database and server, method of building location beacon database, and location based service using same. Wi-Fi access points are located in a target geographical area to build a reference database of locations of Wi-Fi access points. At least one vehicle is deployed including at least one scanning device having a GPS device and a Wi-Fi radio device and including a Wi-Fi antenna system. The target area is traversed in a programmatic route to avoid arterial bias. The programmatic route includes substantially all drivable streets in the target geographical area and solves an Eulerian cycle problem of a graph represented by said drivable streets. While traversing the target area, Wi-Fi identity information and GPS location information is detected. The location information is used to reverse triangulate the position of the detected Wi-Fi access point; and the position of the detected access point is recorded in a reference database.

  • Pub Date: 2005/28/10
  • Number: 07414988
  • Owner: Skyhook Wireless, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Ordered nanoenergetic composites and synthesis method

A structured, self-assembled nanoenergetic material is disclosed that includes a nanostructure comprising at least one of the group consisting of a fuel and an oxidizer and a plurality of substantially spherical nanoparticles comprising at least the other of the group consisting of a fuel and an oxidizer. The spherical particles are arranged around the exterior surface area of said nanorod. This structured particle assures that the oxidizer and the fuel have a high interfacial surface area between them. Preferably, the nanostructure is at least one of a nanorod, nanowire and a nanowell, and the second shaped nanoparticle is a nanosphere.

  • Pub Date: 2005/28/10
  • Number: 07927437
  • Owner: The Curators of the University of Missouri
  • Location: Columbia, US
  • Details: Visit USPTO

Visit USPTO Page


Method of increasing efficacy of tumor cell killing using combinations of anti-neoplastic agents

The present invention provides compositions and methods for increasing the amount of active Syk protein kinase and or SHP-1 protein phosphatase in a cell. The compositions and methods are useful for increasing the efficacy of anti-neoplastic agents, such as those that target the CD33 protein, and which are used to treat leukemia. The invention thus provides for treatment of cancers, including leukemias. The invention also provides screening assays for anti-neoplastic agents in vitro. Methods of screening patients for responsiveness to anti-CD33 treatments are also provided.

  • Pub Date: 2005/28/10
  • Number: 07977320
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for building a location beacon database

A location beacon database and server, method of building location beacon database, and location based service using same. Wi-Fi access points are located in a target geographical area to build a reference database of locations of Wi-Fi access points. At least one vehicle is deployed including at least one scanning device having a GPS device and a Wi-Fi radio device and including a Wi-Fi antenna system. The target area is traversed in a programmatic route to avoid arterial bias. The programmatic route includes substantially all drivable streets in the target geographical area and solves an Eulerian cycle problem of a graph represented by said drivable streets. While traversing the target area, periodically receive the GPS coordinates of the GPS device. While traversing the target area, detecting Wi-Fi signals from Wi-Fi access points in range of the Wi-Fi device and recording identity information of the detected Wi-Fi access point in conjunction with GPS location information of the vehicle when the detection of the Wi-Fi access point was made. The location information is used to reverse triangulate the position of the detected Wi-Fi access point; and the position of the detected access point is recorded in a reference database. A user-device having a Wi-Fi radio may be located. A reference database of calculated locations of Wi-Fi access points in a target area is provided. In response to a user application request to determine a location of a user-device having a Wi-Fi radio, the Wi-Fi device is triggered to transmit a request to all Wi-Fi access points within range of the Wi-Fi device. Messages are received from the Wi-Fi access points within range of the Wi-Fi device, each message identifying the Wi-Fi access point sending the message. The signal strength of the messages received by the Wi-Fi access points is calculated. The reference database is accessed to obtain the calculated locations for the identified Wi-Fi access points. Based on the number of Wi-Fi access points identified via received messages, choosing a corresponding location-determination algorithm from a plurality of location-determination algorithms, said chosen algorithm being suited for the number of identified Wi-Fi access points. The calculated locations for the identified Wi-Fi access points and the signal strengths of said received messages and the chosen location-determination algorithm are used to determine the location of the user-device. The database may be modified with newly added position information to improve quality of previously determined positions, and error prone information is avoided.

  • Pub Date: 2005/28/10
  • Number: 1968114
  • Owner: Skyhook Wireless, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Metal-enhanced fluorescence from plastic substrates

The present invention relates to methods for functionally modifying a polymeric surface for subsequent deposition of metallic particles and/or films, wherein the polymeric surface is modified by increasing hydroxyl and/or amine functional groups thereby providing an activated polymeric surface for deposition of metallic particles to form a fluorescence sensing device. The device can be used for metal-enhanced fluorescence of fluorophores positioned above the metallic particles that can be readily applied to diagnostic or sensing applications of metal-enhanced fluorescence.

  • Pub Date: 2005/28/10
  • Number: 08075956
  • Owner: University of Maryland, Baltimore County
  • Location: Baltimore, US
  • Details: Visit USPTO

Visit USPTO Page


Location-based services that choose location algorithms based on number of detected access points within range of user device

A location beacon database and server, method of building location beacon database, and location based service using same. Wi-Fi access points are located in a target geographical area to build a reference database of locations of Wi-Fi access points. At least one vehicle is deployed including at least one scanning device having a GPS device and a Wi-Fi radio device and including a Wi-Fi antenna system. The target area is traversed in a programmatic route to avoid arterial bias. The programmatic route includes substantially all drivable streets in the target geographical area and solves an Eulerian cycle problem of a graph represented by said drivable streets. While traversing the target area, periodically receive the GPS coordinates of the GPS device. While traversing the target area, detecting Wi-Fi signals from Wi-Fi access points in range of the Wi-Fi device and recording identity information of the detected Wi-Fi access point in conjunction with GPS location information of the vehicle when the detection of the Wi-Fi access point was made. The location information is used to reverse triangulate the position of the detected Wi-Fi access point; and the position of the detected access point is recorded in a reference database.

  • Pub Date: 2005/28/10
  • Number: 1936037
  • Owner: Skyhook Wireless, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Location beacon database

A location beacon database and server, method of building location beacon database, and location based service using same. Wi-Fi access points are located in a target geographical area to build a reference database of locations of Wi-Fi access points. At least one vehicle is deployed including at least one scanning device having a GPS device and a Wi-Fi radio device and including a Wi-Fi antenna system. The target area is traversed in a programmatic route to avoid arterial bias. The programmatic route includes substantially all drivable streets in the target geographical area and solves an Eulerian cycle problem of a graph represented by said drivable streets. While traversing the target area, periodically receive the GPS coordinates of the GPS device. While traversing the target area, detecting Wi-Fi signals from Wi-Fi access points in range of the Wi-Fi device and recording identity information of the detected Wi-Fi access point in conjunction with GPS location information of the vehicle when the detection of the Wi-Fi access point was made. The location information is used to reverse triangulate the position of the detected Wi-Fi access point; and the position of the detected access point is recorded in a reference database. A user-device having a Wi-Fi radio may be located. A reference database of calculated locations of Wi-Fi access points in a target area is provided.

  • Pub Date: 2005/28/10
  • Number: 07433694
  • Owner: Skyhook Wireless, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Device emulation for testing data network configurations

A system and method for providing a virtual implementation of a large scale network of devices. The invention emulates an entire network of network devices using the configuration information obtained from the actual devices to meet the needs of testing configuration changes across the entire network.

  • Pub Date: 2005/28/10
  • Number: 2022161
  • Owner: AT&T Corp.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Common installer server

Systems and techniques to provide for software installation. In general, in one implementation, the technique includes detecting selection of one or more applications by a user; creating a manifest for the one or more applications, the manifest including a reference to the one or more applications and a reference to one or more installers, where each of the one or more applications is associated with a unique one of the one or more installers; and providing the manifest to a target system where each of the one or more applications can be installed, none of the applications or installers being provided in the manifest.

  • Pub Date: 2005/28/10
  • Number: 09274774
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Common installer client

Systems and techniques to provide for software installation. In general, in one implementation, the technique includes receiving a manifest, the manifest including a reference to one or more applications to be installed, obtaining an installer associated with an application, and using the associated installer to install the application on a target system, the application and the associated installer not being provided in the manifest.

  • Pub Date: 2005/28/10
  • Number: 08261258
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Combined speech and alternate input modality to a mobile device

A method of entering information into a mobile device includes receiving a multi-word speech input from a user, performing speech recognition on the speech input to obtain a multi-word speech recognition result, and sequentially displaying, in a display, words in the speech recognition result for user confirmation or correction, by adding one word at a time to the display. A next word is only displayed after user confirmation or correct has been received for a previously displayed word that is immediately preceding the next word in the speech recognition result. The method also includes calculating a hypothesis lattice indicative of a plurality of speech recognition hypotheses based on the speech input and, prior to finishing calculating the hypothesis lattice and while continuing to calculate the hypothesis lattice, calculating a preliminary hypothesis lattice indicative of only partial speech recognition hypotheses based on the speech input and outputting the preliminary hypotheses lattice.

  • Pub Date: 2005/28/10
  • Number: 07941316
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Playback control methods and arrangements for a DVD player

In accordance with certain aspects of the present invention, enhancements have been developed to further extend the performance of a generic DVD navigator. The methods and arrangements herein provide a mechanism that allows a player application to precisely ‘bookmark’ locations during playback, and later resume playback at the selected bookmarked locations.

  • Pub Date: 2005/27/10
  • Number: 07774797
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Management of persistence in a data processing system

A user is enabled to specify policy information for use by a persistence manager in determining how to persist information relating to a data item so as achieve a desired level of reliability. The user is permitted to specify at least two behavior requirements to be associated with information to be persisted. The first behavior requirement is specifiable for a first system state, and the second behavior state is specifiable for a second system state. The behavior requirements are interpretable by the persistence manager to determine a persistence behavior necessary to conform with the policy information.

  • Pub Date: 2005/27/10
  • Number: 08983922
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Dual mode human interface device

A dual mode human interface device (HID) includes a wireless interface for wireless communication with a host computer; a wired interface for wired communication with the host computer; and a processor coupled with the wireless interface and the wired interface for transferring data between the HID and the host computer, wherein the processor initiates establishing wireless communication with the host computer, when the HID is connected to the host computer via the wired interface.

  • Pub Date: 2005/27/10
  • Number: 08401588
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Runtime modification of data presented in a graphical element

The present invention provides ways for application programs to allow users to dynamically update data that is presented in a GUI element. In one aspect of the present invention, a method is provided that receives a command when a GUI element is displayed for the purpose of updating one or more data item(s) presented in the GUI element. In response to receiving the command, the method causes the updated data to be obtained from the user and stored in a database. Then the GUI element is “refreshed” so that the updated data is available in the GUI element for selection by the user.

  • Pub Date: 2005/26/10
  • Number: 08117562
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Integration of legacy applications

A method and apparatus are disclosed for integrating an legacy application hosted on an application server onto a network, such as the Internet. This allows one or more remote computers to access the legacy application over the network. The disclosed method and apparatus do not require changes to be made to the legacy application, due to the fact that the legacy application is accessed using messages in the form produced by the native operating system.

  • Pub Date: 2005/26/10
  • Number: 2091692
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Digital application operating according to aggregation of plurality of licenses

A plurality of digital licenses correspond to a piece of content, including a base license and at least one add-on license. Each add-on license includes a reference to the base license, and each of the base license and each add-on license sets forth rules specifying how the content may be employed. Each add-on license is identified by way of the reference therein to the base license, and the rules in the base license and in each identified add-on license are aggregated into an aggregated set of rules that is evaluated to determine if such aggregated set of rules allows employing the content in a particular manner.

  • Pub Date: 2005/26/10
  • Number: 2084699
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Chemical and biological sampling device and kit and method of use thereof

A self-contained, leak-proof sampling device and kit employing said device for collecting chemical and biological samples from various surfaces. The invention provides a sampling device and kit that may be employed to easily collect chemical and biological samples, safely transport the collected samples, safely dispense collected samples for analysis and provide optimum sample recovery. The sampling device is in the form of a leak proof container that comprises a lid and base. The lid contains a sterile absorbent collection means integrated into and positioned on the inside surface of the lid. The base contains a means to facilitate sample recovery from the absorbent collection means via compression and/or scraping of the absorbent collections means. Methods for employing the present invention are described herein.

  • Pub Date: 2005/26/10
  • Number: 07393694
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Solar blind ultraviolet communication system for unattended ground sensor network

The systems and methods described herein allow a user to communicate using a ground sensor network that is capable of both line-of-sight (LOS) and non-line-of-sight (NLOS) communication. In particular, the systems and methods herein described transmit and receive ultraviolet radiation having a wavelength within the solar blind region from a plurality of sensing nodes arranged both in a LOS network, which communicates via LOS communication, and in a NLOS network, which communicates via NLOS communication. The ultraviolet radiation is then transmitted from the plurality of sensing nodes to a remote receiver, via LOS communication.

  • Pub Date: 2005/25/10
  • Number: 07986883
  • Owner: BAE Systems Information and Electronic Systems Integration Inc.
  • Location: Nashua, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic management of storage access control

Methods and systems are provided for defining and creating an automatic file security policy and a semi-automatic method of managing file access control in organizations with multiple diverse access control models and multiple diverse file server protocols. The system monitors access to storage elements within the network. The recorded data traffic is analyzed to assess simultaneous data access groupings and user groupings, which reflect the actual organizational structure. The learned structure is then transformed into a dynamic file security policy, which is constantly adapted to organizational changes over time. The system provides a decision assistance interface for interactive management of the file access control and for tracking abnormal user behavior.

  • Pub Date: 2005/25/10
  • Number: 07606801
  • Owner: Varonis Inc.
  • Location: Saddle Brook, US
  • Details: Visit USPTO

Visit USPTO Page


Utilities for deriving values and information from within an interlocking trees data store

A method for accessing a KStore including at least one K path having at least one subcomponent node and at least one root node includes providing a utility routine and accessing the KStore using the utility routine. The accessing may include traversing the at least one K path. The at least one K path includes a further node and bidirectional links between the at least one subcomponent node and the further node. The method includes traversing between the at least one subcomponent node and the further node by way of the bidirectional links. The further node can be a beginning of thought node, an end of thought node, root node, or a subcomponent node. A location may be determined within the KStore. The K Store may be queried. Searches for information within the KStore may be performed. The KStore may be traversed to constrain and focus the KStore. The KStore may be updated.

  • Pub Date: 2005/24/10
  • Number: 2063679
  • Owner: Unisys Corporation
  • Location: Blue Bell, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods and apparatus for determining a radiated performance of a wireless device

Systems, methods, apparatus, processors and computer-readable media include a radiated testing module that executes a predetermined radiated performance test on a wireless device. The test dictates various performance-related parameters to measure and log at each of a plurality of predetermined positions. Further, the wireless device receives synchronization information operable to enable synchronization between the logged measurements and each of the positions. The synchronized log allows the wireless device, or another apparatus, to determine a radiated performance characteristic based on a predetermined analysis protocol. Further, the described embodiments allow for the determination of several radiated performance characteristics in a single test, using a single, unaltered wireless device.

  • Pub Date: 2005/24/10
  • Number: 07773964
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


System and method adapted to facilitate dimensional transform

Systems and methods that facilitate dimensional transformations of data points are disclosed. In particular, the subject invention provides for a system and methodology that simplifies dimensional transformations while mitigating variations of a distance property between pairs of points. A set of n data points in d dimensional space is represented as an n×d input matrix, where d also corresponds to the number of attributes per data point. A transformed matrix represents the n data points in a lower dimensionality k after being mapped. The transformed matrix is an n×k matrix, where k is the number of attributes per data point and is less than d. The transformed matrix is obtained by multiplying the input matrix by a suitable projection matrix. The projection matrix is generated by randomly populating the entries of the matrix with binary or ternary values according to a probability distribution. Unlike previous methods, the projection matrix is formed without obtaining an independent sample from a Gaussian distribution for each entry in the projection matrix, without applying a linear algebraic technique to generate the projection matrix and without employing arbitrary floating point numbers. Processes and/or algorithms can utilize the reduced transformed matrix instead of the larger input matrix to facilitate computational efficiency and data compression.

  • Pub Date: 2005/24/10
  • Number: 07836115
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Radio/telephony interoperability system

A radio/telephony interoperability architecture that facilitates intercommunications between a security services network, elected officials and/or emergency services network and a telephony management system for one-way and two-way security and/or emergency teleconferencing communications. The telephony system creates a session in which one or more session participants can communicate with front-line mobile radio operators (e.g., first responder personnel) and radio band components. Mobile radio systems can be accessed via circuit-switched and packet-switched networks with communications capable of existing between horizontal services entities (e.g., city fire and police) and vertical entities (e.g., city, state, and federal agencies and personnel). Furthermore, the presence of participants and potential participants is provided to authorized users to facilitate the establishment of such conferences. Notifications and alarms are used to alert participants and potential participants of important events.

  • Pub Date: 2005/24/10
  • Number: 07925246
  • Owner: Leader Technologies, Inc.
  • Location: Lewis Center, US
  • Details: Visit USPTO

Visit USPTO Page


Producing input to a transformation engine

Input to a transformation engine is produced, responsive to a client computer providing a data access service (DAS) computer with XML data for transformation, by creating a graph shell and XML store for the XML data, determining if the graph has a store; and, if so, requesting an empty TrAX result; requesting to fill the empty TrAX result using TrAX source, and requesting a store parser for events related to the XML store; while avoiding wrapping by the TrAX DAS of a graph shell with TrAX source, requesting by a TrAX source of a graph for one or more nodes, requesting by a graph from a store for one or more nodes, parsing of a buffer by a store, returning events from a store to a graph, building of a graph by the same graph, returning nodes from a graph to a TrAX source; and building events by a TrAX source.

  • Pub Date: 2005/24/10
  • Number: 08010888
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Non-delegable client requests to servers storing local information only

Non-delegable client requests to servers storing local information only are disclosed. In one embodiment, a request is sent from a client to a server of a list of servers. The server determines whether it is inappropriate to fulfill the request. If so, it sends an error message to the client that it is off-line. When the client receives the message that the server is off-line, it sends the request to another server on the list, which is continued until a server is found that is able to fulfill the request. Embodiments of the invention thus leverage existing client-known error messages to redirect client requests to other servers.

  • Pub Date: 2005/24/10
  • Number: 1889354
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Movable audio/video communication interface system

A system that includes a desk top assembly of a display and sensors mounted on a robotic arm. The arm moves the assembly so that it remains within position and orientation tolerances relative to the user's head as the user looks around. Near-field speaker arrays supply audio and a microphone array senses a user's voice. Filters are applied to head motion to reduce latency for arm's tracking of the head. The system is full duplex with other systems allowing immersive collaboration. Lighting and sound generation take place close to the user's head. A haptic interface device allows the user to grab the display/sensor array and move it about. Motion acts as a planar selection device for 3D data. Planar force feedback allows a user to “feel” the data. Users see not only each other through display windows, but can also see the positions and orientations of each others' planar selections of shared 3D models or data.

  • Pub Date: 2005/24/10
  • Number: 07626569
  • Owner: Graphics Properties Holdings, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and software for a batch processing framework for wizard-based processes

Disclosed herein are systems and techniques to provide for batch processing of wizards. In general, the techniques may include a computer-implemented method that comprises presenting a wizard to a user to perform a step-by-step process, with each step associated with a step type and the step type being one of confirmation, processing, optional input, or mandatory input. The process is executed as a batch process based on a user request. Then, the batch process is interrupted based on an associated step type of a current step, the interrupting comprising comparing the associated step type to a user parameter.

  • Pub Date: 2005/24/10
  • Number: 2088604
  • Owner: Sap Aktiengesellschaft
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Storage gateway target for fabric-backplane enterprise servers

Storage gateway remote and local access to storage devices is provided in part via a target implementing bandwidth-controlled access to the devices. The target may be iSCSI-compatible, and may also optionally implement protection, security, and performance features. The protection and security features include any combination of VLANs, zoning, Logical Unit Number (LUN) masking, and encryption. The performance features include any combination of HW-accelerated Remote Direct Memory Access (RDMA), prioritized I/O operations, and service priority (such as strict priority and straight or weighted round-robin priorities). An initiator may be implemented in a Processor Memory Module (PMM) coupled to a switch fabric that is in turn coupled to a target implemented in a Fibre Channel Module (FCM). Storage traffic may be communicated as Small Computer System Interface (SCSI)- and SCSI over Transmission Control Protocol/Internet Protocol (iSCSI)-compatible information (data and commands) on the switch fabric via cellifying input/output interface devices.

  • Pub Date: 2005/22/10
  • Number: 07843907
  • Owner: Habanero Holdings, Inc.
  • Location: Saratoga, US
  • Details: Visit USPTO

Visit USPTO Page


Storage gateway provisioning and configuring

Storage gateway provisioning, configuration, and management functions provide mechanisms to specify and manage parameters and operations associated with storage gateways. The parameters may include any combination of VLAN topology, zoning behavior, LUN masking, bandwidth, and priority. The parameters may also include path information describing initiator to target associations, enabling load-balancing aggregations and multipathing redundancy. Parameters may be specified at relatively low-levels, describing specific HW elements, or may be specified at relatively high-levels, describing desired bandwidth and redundancy requirements, with SW determining low-level HW assignments. Configuration and management functions enable dynamic modification of storage gateway parameters (such as bandwidth between selected initiator and target pairs). Management functions also enable dynamic switchover from a primary path to a secondary path with respect to a storage device.

  • Pub Date: 2005/22/10
  • Number: 07990994
  • Owner: Habanero Holdings, Inc.
  • Location: Saratoga, US
  • Details: Visit USPTO

Visit USPTO Page


Storage gateway initiator for fabric-backplane enterprise servers

Storage gateway remote and local access to storage devices is provided in part via an initiator implementing bandwidth-controlled access to the devices. The initiator may be iSCSI-compatible, and may also optionally implement protection, security, and performance features. The protection and security features include any combination of VLANs, zoning, Logical Unit Number (LUN) masking, and encryption. The performance features include any combination of HW-accelerated Remote Direct Memory Access (RDMA), prioritized I/O operations, and service priority (such as strict priority and straight or weighted round-robin priorities). An initiator may be implemented in a Processor Memory Module (PMM) coupled to a switch fabric that is in turn coupled to a target implemented in a Fibre Channel Module (FCM). Storage traffic may be communicated as Small Computer System Interface (SCSI)- and SCSI over Transmission Control Protocol/Internet Protocol (iSCSI)-compatible information (data and commands) on the switch fabric via cellifying input/output interface devices.

  • Pub Date: 2005/22/10
  • Number: 07843906
  • Owner: Habanero Holdings, Inc.
  • Location: Saratoga, US
  • Details: Visit USPTO

Visit USPTO Page


Selective confirmation for execution of a voice activated user interface

A voice-activated user interface for an application is described. The voice activated user interface invokes a speech recognition component to recognize audio input from a user. If the audio input is a command, then a validation component is invoked to determine whether to validate the command prior to execution.

  • Pub Date: 2005/21/10
  • Number: 08694322
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Redictation of misrecognized words using a list of alternatives

Upon selection of a displayed word, a list of alternatives for the selected word is displayed. Each alternative in the list has an associated symbol. A speech signal is then decoded to identify a list of possible words and the list of possible words is displayed with each possible word having an associated symbol.

  • Pub Date: 2005/21/10
  • Number: 08473295
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Quad-gapped toroidal inductor

A high power, high frequency toroidal inductor is broken into four quadrant cores and uses bare rectangular conductors to form coils. One coil is wound centrally around each quadrant. The coils positioned centrally on the quadrants minimize the effect of damaging fringe flux and leakage flux. The coil inner winding ends are bent perpendicular to the coils to form tangential leads with one coil inner tangential lead joined to an adjacent outer coil radial lead by jumpers that span adjacent coils.

  • Pub Date: 2005/21/10
  • Number: 07808359
  • Details: Visit USPTO

Visit USPTO Page


Optimizing automated shader program construction

Although GPUs have been harnessed to solve non-graphics problems, these solutions are not widespread because GPUs remain difficult to program. Instead, an interpreter simplifies the task of programming a GPU by providing language constructs such as a set of data types and operations that are more familiar to non-graphics programmers. The interpreter maps these familiar language constructs to the more difficult graphics programming resources such as DirectX®, OpenGL®, Cg®, and/or HLSL®.

  • Pub Date: 2005/21/10
  • Number: 07800620
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Digital certificate that indicates a parameter of an associated cryptographic token

In at least some embodiments, a method comprises obtaining a digital certificate that indicates a parameter of a cryptographic token associated with the digital certificate. The method further comprises associating a level of trust with the digital certificate based on the parameter of the cryptographic token.

  • Pub Date: 2005/21/10
  • Number: 08090939
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Automated construction of shader programs

Although GPUs have been harnessed to solve non-graphics problems, these solutions are not widespread because GPUs remain difficult to program. Instead, an interpreter simplifies the task of programming a GPU by providing language constructs such as a set of data types and operations that are more familiar to non-graphics programmers. The interpreter maps these familiar language constructs to the more difficult graphics programming resources such as DirectX®, OpenGL®, Cg®, and/or HLSL®.

  • Pub Date: 2005/21/10
  • Number: 2078439
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Authenticating third party products via a secure extensibility model

Secure extensibility access to application program interfaces (APIs) is described. Techniques are described in which trust indicia are used determine relative trustworthiness of an extensibility module attempting to access of APIs of an application module. Access to APIs of the application module is managed based upon trustworthiness of the extensibility module.

  • Pub Date: 2005/21/10
  • Number: 07730539
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual distributed security system

A distributed security system is provided. The distributed security system uses a security policy that is written in a policy language that is transport and security protocol independent as well as independent of cryptographic technologies. This security policy can be expressed using the language to create different security components allowing for greater scalability and flexibility. By abstracting underlying protocols and technologies, multiple environments and platforms can be supported.

  • Pub Date: 2005/20/10
  • Number: 08302149
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing a unified iSCSI target with a plurality of loosely coupled iSCSI front ends

A system and method provides a unified iSCSI target using a plurality of loosely coupled iSCSI front ends. A cluster comprising a number of network elements and disk elements exports one or more logical units to iSCSI initiators. Each of the network elements is operatively interconnected with a replicated database which is utilized to share initiator data structures and lun mapping information. An iSCSI initiator may communicate with any of the network elements to access any of the logical units exported by the cluster.

  • Pub Date: 2005/20/10
  • Number: 08484365
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Playback control methods and arrangements for a DVD player

In accordance with certain aspects of the present invention, enhancements have been developed to further extend the performance of a generic DVD navigator. The methods and arrangements herein provide a mechanism that allows a player application to precisely ‘bookmark’ locations during playback, and later resume playback at the selected bookmarked locations.

  • Pub Date: 2005/20/10
  • Number: 2088609
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-protocol, multi-interface communications device testing system

A multi-protocol, multi-interface communications device testing system is disclosed. The system simultaneously controls communication channels of a communications platform though multiple Interface Protocols, such as TDM, IP and Telephony Application Program Interfaces. The system also allows the creation of multi Interface Protocol Test Scenarios, and displays the results of executing the test results from all Protocols Interfaces and records and displays results.

  • Pub Date: 2005/20/10
  • Number: 1971228
  • Owner: IXIA
  • Location: Calabasas, US
  • Details: Visit USPTO

Visit USPTO Page


Secure telephony service appliance

Secure telephony service appliances are created from computing devices. The computing devices have restricted access to their hardware and software. The computing devices perform VOP functions to other devices such as phones, modems, and adapters. Security vulnerabilities are reduced by implementing the computing devices as secure appliances for IP telephony.

  • Pub Date: 2005/19/10
  • Number: 08132001
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Providing satellite images of videoconference participant locations

A videoconferencing method having corresponding apparatus and computer programs comprises receiving exchanging audiovisual data for a videoconference with a videoconference server; identifying a physical location of a videoconference client; and either sending an indicator of the location to the server, which obtains physical location video data for the location comprising satellite photographs of the location and sends the data to other videoconference clients, or obtaining the data and sending the data to the server, which sends the data to other videoconference clients in the videoconference.

  • Pub Date: 2005/19/10
  • Number: 2045775
  • Owner: Seiko Epson Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Porous photonic crystal with light scattering domains and methods of synthesis and use thereof

The invention includes sensors and sensing methods for determining cell morphology and/or chemical composition of an analyte. A porous substrate exhibiting a first optical signal is exposed to a target analyte and subsequently monitored for changes in the optical signal. More specifically, a photonic or porous substrate having a well-defined and highly tunable reflectivity or transmission spectrum, such as porous silicon (Si), porous alumina, porous Ge, porous GaAs, porous SiO2 and porous polymer, is used for example. A porous or photonic substrate is exposed to an analyte, such as a cell or other macromolecule, and changes in the scattered light are observed over time to determine cell morphology and/or chemical composition of the analyte using the substrate.

  • Pub Date: 2005/19/10
  • Number: 07903239
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile networking system and method using IPv4 and IPv6

A method for communicating Internet Protocol data over a network, comprises providing an IPv4 data stream and providing an IPv6 data stream. An encrypted Internet Protocol communications tunnel is established through the network between a roaming mobile device and a further computing device. The IPv4 and IPv6 data streams are combined for encapsulation within and transmission through said encrypted tunnel. Continual secure communications of the encapsulated IPv4 and IPv6 data streams is maintained between said roaming mobile device and the further computing device while the roaming mobile device roams between network access points. The encapsulated, transmitted IPv4 and IPv6 data streams are received from said tunnel, and the received IPv4 and IPv6 data streams are demultiplexed.

  • Pub Date: 2005/19/10
  • Number: 2050169
  • Owner: Netmotion Wireless, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system, and program product for monitoring message flow in a message queuing system

System, method, and computer program product for automatically monitoring message flow in a message queuing system in an asynchronous messaging network. A message queuing application programming interface appends, in a message descriptor field for recording and monitoring message flow, unique application identification keys of applications that process the message, operation codes applied to the message, and time stamps of operations applied during message processing. The keys are generated by the start-up of the applications and are filled in by each PUT and GET function of the API. After processing of the message, the entries included in the message descriptor field are monitored, and any deviation from a predefined message flow is automatically detected and reported.

  • Pub Date: 2005/19/10
  • Number: 07707585
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for associating an advertisement with a web page

A method and system for associating an advertisement with a web page are disclosed. Web pages associated with potential queries may be identified using a search engine. A mapping operation may be performed to obtain a map of the web pages as a function of the potential queries. A reverse mapping operation may be performed to obtain a grouping of potential queries as a function of one of the web pages. An active query may be selected from the grouping of potential queries to provide to an advertising service to associate an advertisement with the web page.

  • Pub Date: 2005/19/10
  • Number: 08676781
  • Owner: A9.Com, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for re-authentication of a computing device using cached state

Automatically re-authenticating a computing device seeking access to a network or a resource. A method comprises forwarding a request received from the computing device to an authentication device to enable the authentication device to authenticate the computing device using a full-authentication mechanism. State information related to authenticating the computing device is created from authenticating the computing device. The state information is received and stored. For example, an authenticator device that forwarded the initial authentication request from the computing device to the authentication device receives and stores the state information. The computing device is re-authenticated using the stored state information without again contacting the authentication device.

  • Pub Date: 2005/18/10
  • Number: 2072017
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Inheritance context for graphics primitives

An inheritance context is created for a graphics primitive object that is a property of a visual element. The inheritance context can be used to make some element information (e.g., information in resource dictionaries, name dictionaries, and inheritable properties that reside in the element tree containing the visual element) available to the graphics primitive object.

  • Pub Date: 2005/18/10
  • Number: 07743387
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Extensible human machine interface (HMI) plugin architecture for radio software system and related method

A software-defined radio includes an executable radio software system operable with a radio circuit and conforming to the software communications architecture (SCA) specification and defining an operating environment that allows a waveform application to operate with a radio circuit for transmitting and receiving voice and data. An extensible Human-Machine Interface (HMI) plugin module is operable for allowing a selected waveform application to integrate with the radio circuit and provide an HMI user interface.

  • Pub Date: 2005/18/10
  • Number: 08498629
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Compliance rules analytics engine

The present invention relates to compliance rules analytics systems and methods for facilitating compliance, such as the compliance of an investment portfolio or a set of investment portfolios, with a rule or a set of rules.

  • Pub Date: 2005/18/10
  • Number: 07603358
  • Owner: The MacGregor Group, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Cache line replacement with zero latency

A method for cache management includes assigning a respective cache line in a cache of a processing device to each of a plurality of processing flows in the processing device, and loading respective context data relating to each of the processing flows from a memory into the respective cache line that is assigned thereto. Respective activity levels of the processing flows are monitored. Responsively to detecting an absence of activity of a processing flow, and prior to receiving a request to overwrite the cache line, the context data are written back to the memory from the respective cache line that is assigned to the processing flow.

  • Pub Date: 2005/18/10
  • Number: 2039855
  • Details: Visit USPTO

Visit USPTO Page


Tracking asynchronous execution of program using hierarchical structure of objects

The invention builds a structure of software objects that captures the historically contingent development of an asynchronous program. The invention builds software objects that represent the resources and subtasks that make up the asynchronous program. The objects are connected into a hierarchy whose structure explicates interactions among the resources and subtasks. When a fault is detected, the structure tells the debugger everything the program was doing at the time of the fault and lays open the developmental history of the program that led to the fault. The debugger uses this information to trace the detected fault back through code and time to its origin. When a new feature is added, the structure tells maintenance personnel how the new feature affects existing functions. Within the structure, the invention provides mechanisms for handling reference counters and software locks. Groups of resources can be handled together, the structure taking care of coordination.

  • Pub Date: 2005/17/10
  • Number: 08032886
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Time of day synchronization and distribution within a multiprocessor embedded system and related methods

A software-defined radio includes a pair of radio subsystems such as a red (command) and black (data) radio subsystem having an operating environment conforming to the Software Communications Architecture (SCA) specification, for example, as used for Joint Tactical Radio System (JTRS). A clock is read by at least one of the radio subsystems for determining time of day. A processor of the radio subsystem is operative for distributing the time of day to the radio subsystems using a global hardware timing pulse. Each processor can include a free-running timer to which any time sources within the pair of radio subsystems are set.

  • Pub Date: 2005/17/10
  • Number: 07689207
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Pre-computed dynamic instrumentation

A system and method for instrumenting program instructions. A processing system includes a compiler and a profiler. The compiler is configured to notify the profiler of a compilation event corresponding to first program instructions. In response to detecting the event, the profiler is configured to intercept compilation of the first program instructions, determine whether an instrumented version of the first program instructions is currently available, instruct the compiler to compile the instrumented version of the first program instructions if available, and retrieve and instrument the first program instructions if not available. The profiler may maintain an instrumentation cache for storing instrumented versions of program instructions. The instrumentation cache may further include metadata which identifies portions of program code which have been instrumented and their location. The profiler may generally instrument program instructions once during the resident life of a corresponding application.

  • Pub Date: 2005/17/10
  • Number: 07805717
  • Owner: Symantec Operating Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for decoding an image to determine a digital identifier

A method is provided for decoding an image of a pattern on an object to determine a digital identifier. An image of a pattern on the object is received. The image includes a plurality of pixels, each of the pixels having an optical attribute with a corresponding value. The image is divided into a plurality of tiles, each of the tiles containing a contiguous plurality of the pixels of the image. A digital bit is assigned to each of the tiles based on the values of the optical attribute of the pixels in the tile. A digital identifier is determined based on the digital bits assigned to the tiles.

  • Pub Date: 2005/14/10
  • Number: 08023746
  • Owner: Disney Enterprises, Inc.
  • Location: Burbank, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for computing a desktop picture

Disclosed are a system and method for computing a desktop picture. Instead of loading a file that contains the desktop image from memory, the present invention provides for a system and method for opening and retaining a procedural recipe and a small set of instructions that can be executed to compute a desktop picture. The desktop picture can be computed very quickly using a GPU (graphics processing unit), and can be made to move on demand. When a part of the desktop image is needed to composite, that part is computed using a fragment program on the GPU using the procedural recipe and a specially written fragment program into a temporary VRAM buffer. After it is computed and composited, the buffer containing the result of the fragment program may be discarded.

  • Pub Date: 2005/14/10
  • Number: 08793576
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and compositions for treating a disease condition in a subject

Methods for treating a disease condition in a subject are provided. The subject methods are characterizing by enhancing at least one symptom of the disease condition in a manner effective to cause the subject to mount a compensatory response effective to treat the disease condition. Also provided are compositions, kits and systems for practicing the subject methods.

  • Pub Date: 2005/14/10
  • Number: 08691877
  • Owner: Palo Alto Investors
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for facilitating automated interaction of marketable retail orders and professional trading interest at passively determined prices

A method and system for an automated trading network that continuously collects invisible, anonymous, binding orders and indications of interest to buy and sell specific equity securities at variable, passively determined prices and, then, executes trades based on these collected orders and indications. In general, the binding orders are collected from retail broker-dealers and the binding indications are collected from institutions. The variable, passively determined, non-discrete prices can be linked to the National Best Bid or Offer (NBBO) for each security, or some other prevailing market indicator, at the time a trade is executed. In an embodiment of the method and system, marketable retail orders which match with one or more collected institutional indications, are routed from a Dynamic Order Router (DOR) at each broker-dealer to a Central Order-Match Box (COMB) to be executed against the one or more matched collected institutional indications. The COMB also manages most other aspects of transactions in the method and system and continuously executes trades against the collected institutional indications at improved prices relative to the NBBO.

  • Pub Date: 2005/14/10
  • Number: 2043726
  • Owner: D. E. Shaw & Company
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for defining page size when displaying a data list

A system for setting data list parameters for displaying a data list in pages. An application program receives a first and second user input, wherein the first user input defines a number of items displayed within a page, and wherein the second user input defines a page size tolerance. In response to receiving the first and second user input, the application program sets the number of items displayed within the page and the page size tolerance. Then the application program displays the data list in a graphical user interface according to the set number of items displayed within the page and the set page size tolerance.

  • Pub Date: 2005/14/10
  • Number: 2079238
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic ink processing and application programming interfaces

An application programming interface instantiates an ink analyzer object that receives document data for a document containing electronic ink content from a software application hosting the document and running on a first processing thread. The ink analyzer object then employs the first thread to make a copy of the document data, provides the copy of the document data to an electronic ink analysis process, and returns control of the first processing thread to the analysis process. After the analysis process has analyzed the electronic ink, the ink analyzer object reconciles the results of the analysis process with current document data for the document.

  • Pub Date: 2005/14/10
  • Number: 2039003
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Calibration based beamforming, non-linear adaptive filtering, and multi-sensor headset

A first set of signals from an array of one or more microphones, and a second signal from a reference microphone are used to calibrate a set of filter parameters such that the filter parameters minimize a difference between the second signal and a beamformer output signal that is based on the first set of signals. Once calibrated, the filter parameters are used to form a beamformer output signal that is filtered using a non-linear adaptive filter that is adapted based on portions of a signal that do not contain speech, as determined by a speech detection sensor.

  • Pub Date: 2005/14/10
  • Number: 07813923
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Auto-suggest lists and handwritten input

An interface is provided between a handwriting receiving panel and an auto complete process. A user writes onto the handwriting receiving panel which recognizes the handwritten text. The handwritten text is forwarded to the auto complete process which provides suggested content to the user based on the handwritten text. The user can select the suggested content for use with another application. Alternatively, the user may add additional information to the handwriting receiving panel to enable the auto complete process to provide more or different suggested content.

  • Pub Date: 2005/14/10
  • Number: 07996589
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for managing malfunctions on a wireless device

Apparatus and methods for managing predetermined malfunction events in a wireless device operating in a wireless communications network. Malfunction event data and operational data are recorded by the wireless device based on a selected malfunction event tracking configuration. Further, a recovery module associated with the wireless device operates to attempt to recover information leading up to and including the malfunction event. The collected information may be transmitted to a user manager in the form of a malfunction event log. The malfunction event log may be analyzed to characterize the malfunction, and is particularly useful for determining the sequence and identity of events leading to the malfunction, including a crash, freeze and reset.

  • Pub Date: 2005/14/10
  • Number: 07561877
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for managing battery performance of a wireless device

Apparatus, methods, and programs that determine and manage battery performance characteristics of a wireless device. Embodiments include a wireless device having a computer platform with a processing engine operable to generate a plurality of battery performance data associated with activities on the wireless device. The wireless device further includes a battery performance module operable, based on a received battery performance configuration, to collect selected ones of the plurality of battery performance data. The embodiments may also include an apparatus operable to generate the battery performance configuration, and operable to receive the collected battery performance data and to generate a performance report characterizing the battery performance of the wireless device. Further, embodiments of the apparatus may also generate and transmit to the wireless device a new device operational configuration, based on the collected battery performance data, effective to change the battery performance of the wireless device.

  • Pub Date: 2005/14/10
  • Number: 08103266
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for determining voice and/or data processing performance of a wireless device

Apparatus, methods, processors and computer readable media for determining the voice and/or data processing performance or capability of a wireless device. Embodiments include a wireless device having a computer platform with a processing engine operable to generate a plurality of performance data during voice and/or data processing activities on the wireless device. The wireless device further includes a voice/data performance module operable to collect selected ones of the plurality of performance data associated with a predetermined voice and/or data processing capability of the wireless device. The embodiments may also include an apparatus operable to receive the collected performance data and to generate a performance report characterizing a voice and/or data processing performance or capability of the wireless device.

  • Pub Date: 2005/14/10
  • Number: 08023937
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for determining network access performance of a wireless device

Apparatus, methods, processors and computer readable media for determining the wireless network access performance or capability of a wireless device. Embodiments include a wireless device having a computer platform with a processing engine operable to generate a plurality of network access performance data during processing activities on the wireless device. The wireless device further includes a network access performance module operable to collect selected ones of the plurality of network access data associated with a predetermined data processing capability of the wireless device, and based on a predetermined collection configuration. The embodiments may also include an apparatus operable to generate the predetermined collection configuration, and operable to receive the collected network access data and to generate a performance report characterizing the network access performance or capability of the wireless device.

  • Pub Date: 2005/14/10
  • Number: 07873321
  • Owner: Qualcomm Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Partial updating in a database proxy driver

Embodiments of the present invention address deficiencies of the art in respect to programmatic database access and provide a method, system and computer program product for programmatic partial updating of a row. In one embodiment, a data processing system for programmatic partial updating of a row in a database can include a database proxy driver configured to expose an interface for interacting with the database and to accept an execution of a prepared statement without requiring set values for all fields bound by the prepared statement. The interface can include, for example, a Java Database Connectivity (JDBC) compliant interface. The prepared statement can include a binding to multiple fields in a designated row and a set of setter methods defined for a subset of the multiple fields.

  • Pub Date: 2005/13/10
  • Number: 08285755
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Changing the personality of a device by intercepting requests for personality information

A method and system for a target to adopt the personality of a source without loading the personality information of the source onto the target is provided. The personality system extracts personality information from the source and stores the personality information on a removable storage medium. The storage medium is then connected to the target. The personality system intercepts requests of the target to retrieve personality information, which but for the interception would be serviced based on personality information of the target. When a request is intercepted, the personality system retrieves the personality information from the connected storage medium, rather than from the personality information of the target. The personality system then replies to the request with the retrieved personality information.

  • Pub Date: 2005/13/10
  • Number: 07293170
  • Owner: Tranxition Corporation
  • Location: Beaverton, US
  • Details: Visit USPTO

Visit USPTO Page


SKU determination mechanism and API

Applications or operating system components requiring a SKU, or other indicator of an operating system, make a call to an API. The calling application passes an indicator of the most current version of an operating system known at the time of the application creation as an argument. This argument may be an indictor of the operating system version, build number, and service pack version, for example. The called API may reference a table of operating system SKUs with the indicator of the most current operating system known to the calling application. If found, the API returns the corresponding SKU to the calling application. If not found, the API returns the SKU corresponding to the closest sequential match to the passed in indicator. The calling application may then execute believing it is using the operating system corresponding to the returned SKU.

  • Pub Date: 2005/12/10
  • Number: 07818756
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Purified phospholipid-non-steroidal anti-inflammatory drug associated compositions and methods for preparing and using same

A new pharmaceutical composition is disclosed comprising a purified phospholipid-selective and/for nonselective non-steroidal, anti-inflammatory drug associated complex and methods for making and using same. A screening method for identifying compounds that form phospholipid associated complexes is also disclosed.

  • Pub Date: 2005/12/10
  • Number: 08802656
  • Owner: The Board of Regents of the University of Texas System
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying code that wastes time switching tasks

A method of detecting portions of code of a computer program that protect resources of a computer system unnecessarily can include identifying threads and synchronization objects that are used by a computer program during execution, determining the number of threads that have accessed each resource while it has been consistently protected by a particular synchronization object, and indicating whether the resource is suited for protection according to the number of threads that have accessed the resource.

  • Pub Date: 2005/12/10
  • Number: 08095921
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive flow control protocol

A method and system for directing data transfers between applications and devices residing on different computers or devices using an adaptive flow control protocol has been described. When an application or device requests to transfer data with another application or device, adaptive flow control protocol adapts the way data is transferred by observing when an application that is receiving data posts a receive buffer and detects the receive buffer's size. Based upon the application's or device's behavior, the adaptive flow control protocol transfers the data in a mode that is best suited for the application.

  • Pub Date: 2005/12/10
  • Number: 07418516
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Use of licensed content without identification thereof

A content key (CK) to decrypt a piece of encrypted content is obtained encrypted according to a public key of a licensor (PU-L) to result in (PU-L(CK)). (PU-L(CK)) is obscured according to (PU-L) and a value R to result in Obs (PU-L(CK)), and Obs (PU-L(CK)) is sent to the licensor, which applies a private key (PR-L) corresponding to (PU-L) to Obs (PU-L(CK)) to result in Obs (CK) as an obscured version of (CK). Obs (CK) is received from the licensor; and (CK) is obtained from Obs (CK) based on applying R thereto. The licensor cannot identify from Obs (PU-L(CK)) or from Obs (CK) the encrypted content or the content key (CK) from which the encrypted content may be identified.

  • Pub Date: 2005/11/10
  • Number: 08706635
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time image capture and manipulation based on streaming data

Systems and techniques to provide image capture and manipulation. In general, in one implementation, the technique includes receiving an input stream including image data from a source, displaying the input stream in real-time including displaying a plurality of instantiations of the stream at a same time, each stream different, the step of displaying including applying a filter to each instantiation of the input stream, and receiving a prompt to select one of the instantiations of the stream.

  • Pub Date: 2005/11/10
  • Number: 08085318
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Media data representation and management

Managing media objects on a computing device executing a media player application for rendering one or more of the media objects. The media objects have metadata associated therewith. A media object is defined to represent the media object, which includes a plurality of properties where at least one of the properties of the media object is representative of media content of the media object and where at least another one of the properties of the media object is representative of metadata associated with the media object. The media object is dynamically exposed to the media player application for performing one or more operations on the properties. The properties of the media object are alternatively exposed without exposing the media object represented thereby. Alternatively, a set of rules for each of the properties is defined, and one or more operations are dynamically exposed as a function of the defined set of rules.

  • Pub Date: 2005/11/10
  • Number: 07636509
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Mechanism for allowing applications to filter out or opt into tablet input

A system for enabling a tablet input object is described. A tablet input object can take various inputs from touch, a mouse, and a pen and send their information to an application.

  • Pub Date: 2005/11/10
  • Number: 07986307
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Integrating an IVR application within a standards based application server

A method for providing Interactive Voice Response functionality within a multi-tiered telephony environment can identify an enterprise archive file that contains an Interactive Voice Response (IVR) application. The enterprise archive file can contain multiple interpreters for different markup languages. The enterprise archive file can also include a servlet that maps the interpreters to telephony sessions. The enterprise archive file can be deployed within a J2EE compliant application server having a SIP interface. The deployed IVR application can be utilized to provide IVR functions for SIP based telephony sessions.

  • Pub Date: 2005/11/10
  • Number: 08139730
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Image capture using display device as light source

A digital image capture system and method uses a display device to illuminate a target with light for improved image capture under poor lighting conditions. Various characteristics of the flash (e.g., brightness, color, duration, etc.) can be adjusted to improve image capture. Users are provided with feedback (e.g., live video feed, audio and/or visual countdowns, etc.) to assist them in preparing for image capture. The captured images are seamlessly integrated with existing applications (e.g., video conferencing, instant text messaging, etc.).

  • Pub Date: 2005/11/10
  • Number: 07663691
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Flow-through aerosol photoacoustic systems and methods

Embodiments of photoacoustic devices, systems, and methods are disclosed. One device embodiment, among others, comprises a flow-through configuration for a test sample gas and a modular set of two or more solid-state or gaseous based lasers.

  • Pub Date: 2005/11/10
  • Number: 1935842
  • Owner: United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Application behavior based malware detection

An executable file is loaded into a virtual machine arranged to emulate the instructions of said executable file. The virtual machine keeps track of application programming interfaces (APIs) used by the executable file during emulation. The executable file is scanned to determine names of (APIs) used. Behavior flags are set if certain conditions occur within the executable file. The APIs determined during emulation and during scanning are compared with a set of known behaviors. A match of the APIs and the known behaviors indicates a high risk of malware. A determination of malware being present is based upon any matches and any behavior flags that are set.

  • Pub Date: 2005/11/10
  • Number: 07779472
  • Owner: Trend Micro, Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


System and method for protecting sensitive data

A method, system and article of manufacture for protecting sensitive data in databases and, more particularly, for managing access to sensitive data in a database. One embodiment comprises receiving a query against the data in the database comprising at least (i) a result field specification, and (ii) a sorting instruction. The method further comprises retrieving a result set from the database, and filtering the retrieved result set on the basis of predefined filtering rules to remove selected data from a selected result field of at least one data record included with the retrieved result set. The filtered result set is sorted according to the sorting instruction to produce the sorted result set, whereby the sorting is done independently of the removed selected data so that the sorted result set places the at least one data record at a position which is non-indicative of a value of the removed selected data.

  • Pub Date: 2005/07/10
  • Number: 2086029
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Personalized content feed suggestions page

A user may be presented with suggestions of content feeds to which she may subscribe. The suggestions are based on documents, such as web pages, accessed by the user. The content feeds suggested to the user are content feeds associated with at least some of the documents accessed by the user. The user may accept or reject any or all of the suggestions. A suggestion of a content feed may be suppressed based on a rejection of a past suggestion for the same content feed.

  • Pub Date: 2005/07/10
  • Number: 08190997
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method of using mobile communications devices for monitoring purposes and a system for implementation thereof

Introduced is a method for using mobile communications devices for monitoring purposes. In one embodiment the method includes (1) a first mobile communications device to transmit a control signal to a second mobile communications device directing the second mobile communications device to capture an image with its camera and transmit the image to the first mobile communications device; and (2) displaying the image on a screen on the first mobile communications device.

  • Pub Date: 2005/07/10
  • Number: 07885681
  • Owner: Agere Systems Inc.
  • Location: Allentown, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for accessing a remote file in a directory structure associated with an application program executing locally

A method and system for accessing a file in a directory structure associated with an application includes a method of accessing a file in a directory structure associated with an application. A request by an application for access to a file is intercepted. The request is redirected to a first isolation environment. A determination is made that the requested file does not exist in the first isolation environment. The request is redirected to a second isolation environment responsive to a determination that the file is identified in an enumeration of a directory structure including a plurality of application files residing on a remote machine. The requested file is retrieved from a file server, responsive to a determination that the second isolation environment does not contain the file and that the file is identified in the enumeration.

  • Pub Date: 2005/07/10
  • Number: 07779034
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and a system for responding locally to requests for file metadata associated with files stored remotely

A method and system for responding locally to requests for file metadata associated with files stored remotely includes a method of responding locally to requests for file metadata without downloading the file from a remote location. A directory structure representing an application program stored by a remote machine and metadata associated with each file comprising the stored application program are received from the remote machine. The directory and the metadata are stored. At least one request to access metadata associated with a specific tile in the directory structure is received. The stored metadata is used to respond to the at least one request.

  • Pub Date: 2005/07/10
  • Number: 08131825
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Link load balancer that controls a path for a client to connect to a resource

A system, apparatus, and method are directed to managing network communications between a client and a server by enabling the client to make decisions involving the selection of alternate network paths. The client and/or the server may be multi-homed to a network. In one embodiment, a link load balancer provides the client with a message and/or path data that enables the client to improve its connections with the server by redirecting network packets using an alternate network path. The message may be based on a static policy at the server, changes in availability of the network connections between the client and server, changes in a quality of the network connections, paths, or the like. Redirecting the network packet by the client may include closing one network connection and establishing another network connection, and/or employing an available alternate network path to re-route network packets towards the server.

  • Pub Date: 2005/07/10
  • Number: 07945678
  • Owner: F5 Networks, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive television program guide with remote access

An interactive television program guide with remote access is provided. The interactive television program guide is implemented on interactive television program guide equipment. A remote program guide access device is connected to the interactive television program guide equipment by a remote access link to provide a user with remote access to program guide functions.

  • Pub Date: 2005/07/10
  • Number: 08006263
  • Owner: United Video Properties, Inc.
  • Location: Tulsa, US
  • Details: Visit USPTO

Visit USPTO Page


Indirect subscriptions to top N lists of content feeds

A user may subscribe to a content feed group that includes a set of content feeds. The content feed group includes a first set of content items from the set of included content feeds. The content items are presented in response to a subscription to the content feed group. After a change to a content feed group, such as an addition or a removal of a content feed from the set, a second set of content items, reflecting the changed set of content feeds, are presented.

  • Pub Date: 2005/07/10
  • Number: 07590691
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Generating suitable data for statistical analysis

A method, system and article of manufacture for processing abstract queries and, more particularly, for generating input to statistical analysis routines. One embodiment comprises receiving an abstract query including a measurement field and a chronological reference condition. The abstract query is transformed into an executable query which is executed by a query engine, whereby result data is determined including an available measurement value for the measurement field. The available measurement value was taken at a point in time different from a point in time that satisfies the chronological reference condition. The method further comprises determining a variance value corresponding to a time variance between the point in time that satisfies the chronological reference condition and the other point in time at which the available measurement value was taken. As a result set for the abstract query, the available measurement value and the variance value are returned.

  • Pub Date: 2005/07/10
  • Number: 07624098
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Detection of security vulnerabilities in computer programs

Methods and systems for analyzing a computer program use static and interprocedural analysis techniques and engines. A data processing operation, such as a function, is automatically identified within the computer program. It is determined whether the function represents a potential source for entry of untrusted data into the computer program. A course of the untrusted data is modeled through the identified function to produce a validation result, such as a call stack. Based on an attribute of the untrusted data (for example, whether the untrusted data is an unbounded integer or a string), it is determined whether the validation result identifies a security vulnerability of the computer program. A security vulnerability may exist, for example, when the modeled course of an unbounded integer through the function produces a buffer overrun in a call stack. The validation result is provided, via an API, software development tool, or user interface, for example.

  • Pub Date: 2005/07/10
  • Number: 07849509
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Content feed user interface with gallery display of same-type items

Additional content items that satisfy predefined criteria with respect to a user-selected content item are identified. The predefined criteria may be that the selected and additional content items have particular characteristics that are the same. Information corresponding to the selected and identified content items is presented to a user. Characteristics based on which additional content items may be identified may include data type, source, and absence of content. The information may be presented in a gallery view, which can be a thumbnails gallery for images or a playlist for digital audio or video.

  • Pub Date: 2005/07/10
  • Number: 08949154
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Atmospheric moisture harvesters

Improved apparatus and methods for use in atmospheric moisture harvesters are disclosed. In particular, sectored or zoned cooling/condensation surfaces to optimize cooling efficiency are disclosed. In one embodiment, cooling is provided by dual-refrigerant, buffered cooling cells. In another embodiment, cooling is provided by thermoelectric cooling devices. Where thermoelectric cooling devices are used, an airway duct that covers both the cool side and the warm side of the devices can be provided, such that an airflow system that is driven by the difference in density between cooled, de-moisturized air and warmed air is established. Localized temperatures and moisture levels are monitored so that cooling can be adjusted as necessary to provide optimal, most energy-efficient condensation of moisture.

  • Pub Date: 2005/07/10
  • Number: 07293420
  • Owner: Marine Desalination Systems, L.L.C.
  • Location: St. Petersberg, US
  • Details: Visit USPTO

Visit USPTO Page


Strain sensitive coax cable sensors for monitoring structures

The invention provides increased structural monitoring systems that have sensitive continuous coaxial cable sensors. A preferred embodiment sensor cable of the invention includes an inner conductor, a dielectric jacket, and an outer conductor that is configured to passively deform responsively to strain in an associated structure. The deformation can be aided by the physical structure of the dielectric jacket, the outer conductor, or a combination of both. The deformation translates strain into a measurable change in a reflection coefficient associated with the outer conductor.

  • Pub Date: 2005/06/10
  • Number: 07421910
  • Owner: The Curators of the university of Missouri
  • Location: Columbia, US
  • Details: Visit USPTO

Visit USPTO Page


Managing removal of media titles from a list

The invention can be viewed as a system for providing media information to a user via an interactive media services client device coupled to a programmable television services server device. A method of the preferred embodiment of the present invention includes receiving user input and excluding one or more media titles from a media title list based on the user input.

  • Pub Date: 2005/06/10
  • Number: 08069259
  • Details: Visit USPTO

Visit USPTO Page


System and method for merging manual parameters with predefined parameters

A system and method are disclosed for merging manual parameters with predefined parameters. The system includes a parse module configured to receive a command string having multiple nested manual parameters and a build module configured to generate a parameter tree having manual parameter nodes and predefined parameter nodes. The system may also include a search module configured to compare manual parameter nodes to predefined parameter nodes to identify matching parameter contexts, and a command module configured to generate a command string. The method includes receiving a command string having multiple nested manual parameters, identifying manual parameters within the command string, and generating a parameter tree having manual parameter nodes and predefined parameter nodes. The method also includes comparing manual parameter nodes to predefined parameter nodes to identify parameter nodes having a matching parameter context, and generating a command string.

  • Pub Date: 2005/05/10
  • Number: 08037092
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for geocoding diverse address formats

A method and system for providing geocodes in response to complete or partial address information is disclosed. The disclosure teaches embodiments that are naturally upgraded to integrate changing spatial information due to addition of countries, better data, political changes, and other similar changes in geographical data. A single geocoding engine is capable of handling the various address formats in use in different countries and jurisdictions. The disclosed embodiments are error tolerant and capable of overcoming many errors due to spelling, variety of languages and formats used to provide and address. The diversity in addresses due to, for instance country-specific formats such as postal-codes are naturally integrated into existing database of geocoding information. Preferably, the embodiments are based on JAVA to allow platform independence and use XML based communication to use networks without requiring excessive resources while providing fast services.

  • Pub Date: 2005/05/10
  • Number: 07685108
  • Owner: Pitney Bowes Software Inc.
  • Location: Troy, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for analyzing community evolution in graph data streams

Improved techniques are disclosed for detecting patterns of interaction among a set of entities and analyzing community evolution in a stream environment. By way of example, a technique for processing data from a data stream includes the following steps/operations. A data point of the data stream representing an interaction event is obtained. An interaction graph is updated on-line based on the data point representing the interaction event. The updated interaction graph is stored in a nonvolatile memory. An interaction evolution is determined off-line from the updated interaction graph stored in the nonvolatile memory.

  • Pub Date: 2005/05/10
  • Number: 07890510
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Generating customized graphical user interfaces for mobile processing devices

Systems and techniques for producing graphical user interfaces on handheld mobile devices include generating a markup language code defining a graphical user interface component for display on the handheld mobile device and rendering the generated markup language code to produce the graphical user interface component. In some cases, the graphical user interface component includes at least one adaptable attribute based on a selection made by a user. In other cases, a graphical user interface component is generated using static markup language code or a combination of static and dynamically generated markup language code. Graphical user interface components defined by markup language codes can be displayed in an overall graphical user interface along with components that are native to the device and/or that are defined by an application development platform.

  • Pub Date: 2005/05/10
  • Number: 08694925
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic downloading of keyboard keycode data to a networked client

The present invention is directed toward dynamic downloading of keyboard keycode data to a networked client. According to one or more embodiments of the present invention, a user logs into a networked client by presenting a smart card to a card reader attached to the client (or by some other authentication mechanism) and enters a PIN into the keyboard. The keycodes entered by the user logging into the client are obtained, translated into ASCII characters, and presented to the smart card. If the PIN is correct, the user is able to log in, otherwise the log in fails. In one embodiment, when the user enters the PIN, a translation table is downloaded from the server into the client. The client uses the translation table to convert the keycodes to ASCII text and presents the ASCII text to the smart card for authentication.

  • Pub Date: 2005/05/10
  • Number: 07448071
  • Owner: Sun Microsystems, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


User interface widget unit sharing for application user interface distribution

Embodiments of the invention address deficiencies of the art in respect to application sharing and provide a method, system and computer program product for user interface widget unit based application sharing. In a first embodiment, a data processing system for user interface widget unit based application sharing, can include a dynamic widget server communicatively linked to a dynamic widget browser. The dynamic widget browser can include program code enabled to render a user interface including one or more remote dynamic widgets peered to corresponding dynamic widgets for a dynamic view for an application launched by the dynamic widget server.

  • Pub Date: 2005/04/10
  • Number: 08914733
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for synchronizing copies of data in a computer system

An improved synchronization system and method for copies of data in a computer system. The computer system comprises a cluster, wherein each computer in the cluster may store a local copy of a data set along with a validity flag for the local copy. The computer system further comprises a coupling system which is connected to each of the computers in the cluster through a coupling system interface program, wherein the coupling system is configured to coordinate the data sharing and workload of the cluster. The computer system also comprises an external data storage shared by the computers in the cluster. One of the computers may read a first copy of the data set from a primary data set on the external data storage. The computer may then store the first copy locally and set a first validity flag to indicate that the first copy is valid. Another computer, server, or application program may make a second copy of the primary data set and set a second validity flag to valid. If the first copy is modified, then the second validity flag is set to invalid. The second copy may then be replaced with the modified copy, and the second validity flag may be set to valid again. A coupling system interface program may comprise an application programming interface for data synchronization, wherein the application programming interface is accessible by a plurality of application programs.

  • Pub Date: 2005/04/10
  • Number: 07130924
  • Owner: Computer Sciences Corporation
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Support for multiple interface versions

Multiple interface versions including a current interface version and at least one earlier interface version are supported. A call is received at an interface version. A data structure from the current interface version data structures is retrieved. An event comprising a reference to the call is fired. Listeners for events are provided. A listener initiates the processing of a side effect of the current interface version, if appropriate to the call, wherein a side effect is a process in addition to the main purpose of the interface.

  • Pub Date: 2005/04/10
  • Number: 07954085
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Self-monitoring and optimizing network apparatus and methods

Methods and apparatus for dynamically and automatically allocating network resources through anticipatory analysis and control. In an exemplary embodiment, the network comprises a broadcast switched digital architecture, and network bandwidth allocation to multiple digital program streams is performed by processing historical user tuning data, which is obtained directly from the subscriber's consumer premises equipment (e.g., DSTB). When an increase or decrease in bandwidth required to support certain programs is anticipated, network resource re-allocation is performed automatically by a software process running on the switching server. In this fashion, speculative but “intelligent” projections of bandwidth and program stream requirements can be made automatically by the server software, without operator intervention. The server also optionally dictates the optimal monitoring and data collection parameters to the DSTB.

  • Pub Date: 2005/04/10
  • Number: 08582584
  • Owner: Time Warner Cable Enterprises LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Opening price process for trading system

A system for determining an opening price for products traded over a distributed, networked computer system is described. The system includes a plurality of workstations for entering orders for financial products into the distributed, networked computer system, said orders specifying a quantity of the financial product. A plurality of workstations for entering orders and a server computer coupled to the workstations, said server computer executing a server process that determines an opening price for the product. The opening price process posting an allocation message to market maker participants to communicate an expected allocation of the imbalance for execution at an initial opening of the market in the event that the imbalance exists at the opening.

  • Pub Date: 2005/04/10
  • Number: 1976620
  • Owner: Primex Holdings, LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Grid computing accounting and statistics management system

Performance data is captured periodically from resources and groups of resources in a grid computing environment and stored in a content-addressable data repository from which it can be accessed in response to an arbitrarily complex query in regard to specifics of particular jobs or job portions, particular resources utilized, grid architecture, application environment, concurrent jobs or job portions and the like. The data repository may be distributed or divided in regard to grid environment architecture, security domains or the like and each portion or division may be implemented in a modular fashion including an accounting and statistics management module and additional modules or computing engines for performing particular desired analyses or functions. Results of such analyses or functions may be communicated to a grid workload agent (and associated modules) to improve grid management on a fine-grained basis.

  • Pub Date: 2005/04/10
  • Number: 08713179
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Simulating multi-monitor functionality in a single monitor environment

The systems and methods of the present provide techniques for virtualizing, simulating or providing multiple displays for an environment having one display device or less display devices than desired. The techniques of the present invention virtualize a client's display environment by modifying and controlling the behavior and appearance of an application window displayed on the client based on a desired display layout for the client. The present invention provides a window message processing mechanism to intercept a selected message to a window of an application. The window message processing mechanism compares the behavior and appearance of the window in view of the desired display layout and modifies the message to display the window on the client based on the desired display layout. As such, the present invention processes selected window messages to translate the behavior or appearance of the window to the desired display layout.

  • Pub Date: 2005/03/10
  • Number: 08191008
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and methods using apocynin compounds and nitric oxide donors

The invention describes novel compositions comprising at least one apocynin compound or a pharmaceutically acceptable salt thereof, and at least one nitric oxide donor, and, optionally, at least one therapeutic agent. The invention also provides novel kits comprising at least one apocynin compound or a pharmaceutically acceptable salt thereof, and at least one nitric oxide donor compound, and, optionally, at least one therapeutic agent. The invention also provides methods for (a) treating cardiovascular diseases; (b) treating renovascular diseases; (c) treating diabetes; (d) treating diseases resulting from oxidative stress; (e) treating endothelial dysfunctions; (f) treating diseases caused by endothelial dysfunctions; (g) treating gastrointestinal disorders; (h) treating inflammatory disorders; and (j) treating respiratory disorders; and (k) treating peripheral vascular diseases. The apocynin compound may preferably be apocynin. The nitric oxide donor compound may preferably be isosorbide dinitrate and/or isosorbide mononitrate.

  • Pub Date: 2005/03/10
  • Number: 08067464
  • Owner: Nitromed, Inc.
  • Location: Lexington, US
  • Details: Visit USPTO

Visit USPTO Page


Tiered and modular approach to operational support systems

A computer system and techniques are disclosed that provide support for the operations of a modern telecommunication services provider. The computer system includes several software modules arranged in layers that are configured to provide services, such as a data access, workflow, and business-management functions. In some preferred embodiments, data cleansing and enterprise-view functionality are provided. An application program interface is also provided that allows a software program to execute software modules contained in the layers to perform specific tasks.

  • Pub Date: 2005/30/09
  • Number: 07882209
  • Owner: AT&T Intellectual Property II, L.P.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for use of fractional pay-up ticks in relation to trading strategies in an electronic trading environment

A system and associated methods are provided for use of fractional pay-up ticks in relation to offset orders being sent for a trading strategy that involves trading a first tradeable object and at least a second tradeable object. According to one example method, when an indication is received that a quantity at a first price for the first tradeable object is filled, a plurality of offset orders for the second tradeable object is sent to an electronic order book of the second tradeable object. The plurality of offset orders is placed at a plurality of price levels determined based on at least one fractional pay-up tick value, the first price, and the desired spread price. A quantity for each order is determined based on a quantity divider rule that is applied to an offset quantity to offset the fill.

  • Pub Date: 2005/30/09
  • Number: 2095281
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for smart hedging in an electronic trading environment

A system and associated methods are provided for smart hedging in an electronic trading environment. According to one example method, a first order for a first tradeable object and a second order for a second tradeable object are placed based on a spread strategy. Upon receiving an indication that a quantity of the first order is filled, the method involves determining if the second order can be used to offset the quantity filled of the first order by determining if a price of the second order would result in achieving a desired spread price defined for the spread strategy. If the price results in the desired price, the second order is used to offset the quantity filled for the first order in an attempt to achieve the desired spread price. Other tools are provided as well.

  • Pub Date: 2005/30/09
  • Number: 2084680
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for profiling processes in a computing system

A system and method for managing the environment of software processes in a computer system. A computer system comprises a processor and at least one process environment comprising one or more environment variables. The processor executes one or more processes, intercepts the launch of a process, sets at least one environment variable to a first value, and continues the launch of the process. Setting the environment variable may enable a profiler process. The processor may set at least one environment variable for the process to a value which is chosen irrespective of a value of the environment variable of a parent process of the process. Further, the processor may set at least one environment variable for the process to a default value if a data repository does not contain an entry that has an identification which corresponds to the process.

  • Pub Date: 2005/30/09
  • Number: 07725882
  • Owner: Symantec Operating Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for order placement in an electronic trading environment

A system and associated methods are provided for intelligent placement and movement of orders in an electronic trading environment. According to one example method, in addition to submitting a leg order at a calculated price level, additional orders, queue holder orders, are submitted for the leg order at prices either below or above the calculated price level. Based on this configuration, if the conditions change such that it is necessary to re-price the leg order, there will be already an order resting in the exchange order book at the re-calculated price that can be used in the strategy. Upon re-pricing the leg order, one or more additional queue holder orders will be placed in the market. Other tools are provided as well.

  • Pub Date: 2005/30/09
  • Number: 07672896
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for allocation of threads to user objects in a computer system

A method for allocating threads to a user in a computer system is described. The method comprises queuing up work for a first user and permanently assigning a first thread to the first user, wherein the first thread performs the queued up work for the first user, and wherein each time work is subsequently queued up for the first user, the first thread performs the queued up work for the first user.

  • Pub Date: 2005/30/09
  • Number: 08671410
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for adaptive allocation of threads to user objects in a computer system

A method for optimizing enterprise server resources in a computer system is described. The method comprises monitoring at least one metric of the computer system capable of indicating a performance level thereof; determining whether the performance level needs to be improved; and responsive to a determination that the performance level needs to be improved, implementing a best method to improve the performance level by adaptively manipulating one or more threads in a pool of threads in the computer system.

  • Pub Date: 2005/30/09
  • Number: 08127010
  • Owner: Research In Motion Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Semiconductor crystal high resolution imager

A radiation imaging device (). The radiation image device () comprises a subject radiation station () producing photon emissions (), and at least one semiconductor crystal detector () arranged in an edge-on orientation with respect to the emitted photons () to directly receive the emitted photons () and produce a signal. The semiconductor crystal detector () comprises at least one anode and at least one cathode that produces the signal in response to the emitted photons ().

  • Pub Date: 2005/30/09
  • Number: 08063380
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Offline methods for authentication in a client/server authentication system

A method for providing authentication of a user of a recipient unit when the recipient unit is off-line includes storing one or a plurality of challenge-reply sets associated with an article based on an on-line communication with a sender unit. Each of the challenge-reply sets includes at least a challenge-reply pair for use in off-line authentication of the user for a particular resource available through the recipient unit. When the user is offline, the method includes selecting at least one of the plurality of stored challenge-reply sets for off-line authentication of the user for the particular resource available through the recipient unit.

  • Pub Date: 2005/30/09
  • Number: 09281945
  • Owner: Entrust, Inc.
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


Management of watchpoints in debuggers

Provided are a method, system, and article of manufacture, wherein a first application requests an operating system to monitor a memory address, and wherein the operating system generates a signal in response to an operation that affects the memory address. A second application receives the generated signal. The second application determines whether to forward the signal to the first application. The first application processes the signal, in response to the signal being forwarded by the second application.

  • Pub Date: 2005/30/09
  • Number: 2091862
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Magnified machine vision user interface

Improved user interface methods facilitate navigation and programming operations for a magnified machine vision inspection system. Large composite images are determined and stored. The composite images include workpiece features that are distributed beyond the limits of a single magnified field of view of the machine vision system. Despite their size, the composite images may be recalled and displayed in a user-friendly manner that approximates a smooth, real-time, zoom effect. The user interface may include controls that allow a user to easily define a set of workpiece features to be inspected using a composite image, and to easily position the machine vision system to view those workpiece features for the purpose of programming inspection operations for them.

  • Pub Date: 2005/30/09
  • Number: 07394926
  • Owner: Mitutoyo Corporation
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


File system query and method of use

An improved policy enforcement architecture includes several components that improve the performance of policy enforcement in a hierarchical storage environment. A File System Query instruction permits a richer set of queries to be expressed by a policy engine, thereby permitting more complex policies to be implemented with ease. The File System result is generated at the file server, and only files of interest are forwarded to the policy engine. The file system query advantageously may be applied against a pre-generated index having one more characterizing attributes to further reduce the processing required to retrieve policy data. An Index Build instruction, added to a programming interface, allows a policy engine generate the characterizing indices in advance of use. Index maintenance techniques maintain consistency between the index and the file system to ensure that the policy can be enforced using accurate file information.

  • Pub Date: 2005/30/09
  • Number: 07805416
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Dual-modal-shape bed lounge

Dual-modal-shaping capability is added as a new feature in bed lounges of the type having a fabric slip-cover enclosing foam padding on a main structure formed from plastic sheet material. User adjustment is provided for back tilt, head-rest tilt and height, arm-rest spacing, and back support location. Modal transition is provided by an internal mechanism that interlinks the two arm-rests via a weighted lock-pin that locks the arm-rests in place for normal use but that can be disengaged by merely inverting the bed lounge so the lock-pin drops out from the linkage gravitationally, thus allowing the arm-rests to be folded out to convert to an overall flat modal-shape that can be conveniently stored, e.g. under a bed or hanging in a closet. For re-deployment, when the bed lounge is manually placed in its normal modal-shape in an upright position, as the arm-rests are moved together to their normal spacing, the weighted lock-pin automatically drops back down into place so as to again lock and retain the bed lounge in its chair-like normal modal-shape.

  • Pub Date: 2005/30/09
  • Number: 07284290
  • Details: Visit USPTO

Visit USPTO Page


Automation system unified data access for disparate data sources

Historical and real-time data access is leveraged to provide unified data access for interacting with manufacturing process entities such as, for example, process overview displays, charting systems, reporting systems, logging systems, and/or recipe systems and the like. The unified data, for example, allows for playback of historical process overviews for a user selected period of time. In one instance, a “VCR like” user interface can be employed to allow ‘rewinding’ and ‘replaying’ of a historical process overview. This facilitates in proper monitoring and/or troubleshooting of manufacturing processes. The unified availability of past and current data also enables reporting systems to provide “living” reports that automatically update with real-time data. This can allow for efficient comparison of current data with historical data for a given manufacturing process.

  • Pub Date: 2005/30/09
  • Number: 07650198
  • Owner: Rockwell Automation Technologies, Inc.
  • Location: Mayfield Heights, US
  • Details: Visit USPTO

Visit USPTO Page


Audio application programming interface

An audio application programming interface (API) enables an audio processing graph to be modified during processing. If they are received while the audio graph is playing or paused, graph modifying commands may be inserted into either an asynchronous command queue or a deferred command queue. The audio API may also include a clock manager for synchronizing clocks from a number of different connected audio rendering devices, applications, processors, functions, operations, modules, or other resources. The clock manager may provide an interface that enables a number of control groups to be defined. Each such control group may include a master clock, a slave clock, and a control.

  • Pub Date: 2005/30/09
  • Number: 07746803
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for load balancing drives and servers

A file system that balances the loading of filers and the capacity of drives that are associated with the filers is described. The file system includes a first disk drive that includes a first unused capacity and a second disk drive that includes a second unused capacity, wherein the second unused capacity is smaller than the first unused capacity. The file system further includes a first filer that is configured to fill requests from clients through access to at least the first disk drive. The file system further includes a second filer that is configured to fill requests from clients through access to at least the second disk drive. The second filer is configured to select an infrequently accessed file from the second disk drive and to push the infrequently accessed files to the first disk drive, thereby improving a balance of unused capacity between the first and second disk drives without substantially affecting a loading for each of the first and second filers.

  • Pub Date: 2005/29/09
  • Number: 08782661
  • Owner: Overland Storage, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for registering entities for code signing services

A system and method for registering entities for code signing services. The entities may be software application developers or other individuals or entities that wish to have applications digitally signed. Signing of the applications may be required in order to enable the applications to access sensitive APIs and associated resources of a computing device when the applications are executed on the computing device. In one embodiment, a method of registering entities for code signing services will comprise the step of transmitting at least some account data to the registering individual or entity using an out-of-band communication system. This provides added security that the individual or entity registering for a code signing service is who that individual or entity purports to be.

  • Pub Date: 2005/29/09
  • Number: 07797545
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for provisioning an email account using mail exchange records

A system provisions an electronic mail (email) account of a user for allowing access to an electronic mailbox from a remote device to retrieve email. A communications module receives email address parameters of the user and transmits a domain name system (DNS) query to the Internet for returning mail exchange (MX) records corresponding to the email address parameters of the user. A configuration module processes any returned MX records as a starting point for determining configuration parameters for accessing the email account of the user to retrieve user email.

  • Pub Date: 2005/29/09
  • Number: 08078681
  • Owner: Teamon Systems, Inc.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for provisioning an email account using mail exchange and address records

A system for provisioning an electronic mail (email) account of a user for allowing access to an electronic mailbox from a remote device to retrieve email includes a communications module that receives email address parameters entered by the user and transmits a domain name system (DNS) query to the Internet for returning mail exchange (MX) and address (A) records corresponding to the entered email address parameters of the user. A configuration module processes any returned MX and A records to determine whether the email address parameters entered by the user are valid before attempting to provision the email account of the user.

  • Pub Date: 2005/29/09
  • Number: 08117267
  • Owner: Teamon Systems, Inc.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


SAS expansion topology for RAID data storage including multiplexers and SAS expanders for interfacing with single or dual ports drives

A data storage system having a first chassis, such first chassis having a pair of SAS expanders and a second chassis having a pair of SAS expanders. The first one of the pair of SAS expanders is connected to only an expansion port of a first one of a pair of signal processor printed circuit boards in the first one of the chassis. An expansion port of a second one of the pair of SAS expander is connected to only the expansion port of a second one of the pair of signal processor printed circuit boards in the second one of the chassis.

  • Pub Date: 2005/29/09
  • Number: 2029922
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


RAID data storage system with SAS expansion

A data storage system has a chassis and a pair of printed circuit boards disposed in the chassis. Each one of the pair of printed circuit boards has disposed thereon a processor, a translator controlled by the processor, a SAS expander having a bidirectional front end port and multiple bidirectional backend ports, and an expansion port, and a SAS controller coupled between the translator and the expander. The system also has an interposer printed circuit board disposed in the chassis, and multiple multiplexers disposed on the interposer printed circuit board. Each one of the multiplexers has a pair of bidirectional front end ports and a pair of bidirectional back end ports. A first one of the pair of bidirectional front end ports is connected to a corresponding backend port of the SAS expander disposed on a first one of the pair of storage processor printed circuit boards. A second one of the pair of bidirectional front end ports is connected to a corresponding backend port of the SAS expander disposed on a second one of the pair of storage processor printed circuit boards. The system also has multiple disk drives disposed in the chassis. Each one is coupled to at least one backend port of a corresponding one of the multiplexers.

  • Pub Date: 2005/29/09
  • Number: 2041990
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Power cord retainer

A power cord retainer for retaining a plug portion of an electrical cord in an electrical socket mounted to a chassis. The retainer includes a pair of resilient, self supporting posts, each one having a distal end configured for affixation to positions of the chassis on opposing sides of the socket and a pair of shoulders, each one affixed to a proximal end of a corresponding one of the pair of posts. The pair of shoulders are configured to form a grove along adjacent inner sides thereof. The groove is axially aligned with the socket. The groove is configured to receive the power cord when the posts are in a stretched position. The shoulders are configured to engage a rear portion of the plug portion and, together with the forces provided by the pair of posts when such posts are enabled to return to an un-stretched position, retain such plug in the socket.

  • Pub Date: 2005/29/09
  • Number: 07134902
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Notifying listeners of change events

Plural change events are associated with corresponding listeners, where the plural change events represent distinct groups of one or more changes made to a collection of items. In response to a further change of the collection of items, the plural change events are modified to include the further change. The listeners are notified of respective plural change events.

  • Pub Date: 2005/29/09
  • Number: 09152475
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Multiplexing system

A multiplexing system couples a pair of input ports to a either a dual ported disk drive or a single ported disk drive. The system includes a multiplexer having the pair of first ports and a pair of second ports. The multiplexer is configurable to couple each one of the pair of first ports to a corresponding one of the pair of second ports when the pair of second ports are coupled to the dual ported disk drive and to couple both pair of first ports to a single one of the second ports when a single ported disk drive is coupled to said single one of the second ports.

  • Pub Date: 2005/29/09
  • Number: 2043397
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Module insertion/extraction device

A device for inserting and/or removing a module into or from an interior region of an assembly, such device comprising a single piece, elongated, having a module mounting region configured to have mounted thereto the module; a handle; and an intermediate region disposed between the module mounting region and the handle, such handle being pivotally mounted to pivot about an axis perpendicular to a longitudinal axis of the structure. The handle portion has a surface positioned perpendicular to a surface of the first portion.

  • Pub Date: 2005/29/09
  • Number: 07405942
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatuses for navigation in urban environments

Embodiments disclose methods, systems, and apparatuses for providing maps and directions, including walking and mass transit directions in urban environments where users do not drive cars. Additionally, driving directions can be included. Various criteria, including preferences for amount of walking, for or against particular streets, certain mass transit vehicle types, number of transfers between mass transit vehicles, and other preferences, are considered in the routing calculations, as well as non-individual information such as current conditions and other information. User feedback on various qualitative aspects of the directions is received and stored, and used in subsequent routing decisions. Embodiments disclosed include web services whereby third parties, such as members of the travel industry, can access such services which provide textual and graphical information. Further, clients can access and edit mass transit information through the web services.

  • Pub Date: 2005/29/09
  • Number: 07957871
  • Owner: Hopstop.com, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Memory allocation in a multi-node computer

Evaluating memory allocation in a multi-node computer including calculating, in dependence upon a normalized measure of page frame demand, a weighted coefficient of memory affinity, the weighted coefficient representing desirability of allocating memory from the node, and allocating memory may include allocating memory in dependence upon the weighted coefficient of memory affinity.

  • Pub Date: 2005/29/09
  • Number: 08806166
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Managing communications connections with data storage systems

Communications connections with data storage systems are managed. A discovery process is executed to identify an iSCSI port on data storage system. Settings for the iSCSI port are accepted as user input at a server. Communication is performed from the server to the data storage system to configure the iSCSI port.

  • Pub Date: 2005/29/09
  • Number: 08086760
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Federated management of intelligent service modules

Intelligent services are provided in a storage network using intelligent service modules that can be cabled to a switch external to the switch chassis and yet be managed as part of the switch's logical domain. Data and management communications between the intelligent service module and the core switch are provided through a “soft-backplane” implemented using in-band communications through cabling attached between the switch and the intelligent service module rather than through hardwired backplane within the chassis. Management communications from management software is directed to the switch, which handles the management functions relating to the intelligent service module or forwards the management requests to the intelligent service module for processing.

  • Pub Date: 2005/29/09
  • Number: 09143841
  • Owner: Brocade Communications Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Enclosure numbering in RAID data storage systems

Enclosure numbering is performed in redundant array of independent disk (RAID) data storage systems. If first, second, and third boards in an enclosure indicate a first enclosure number, the enclosure is indicated as having the first enclosure number. If at least the first and second boards indicate the first enclosure number, the enclosure is indicated as having the first enclosure number. If the first board does not indicate any enclosure number, indicating that the enclosure's enclosure number is unknown.

  • Pub Date: 2005/29/09
  • Number: 07549002
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Data storage system having cooling fan speed protection

A speed control system is provided for controlling temperature within a chassis. The chassis includes therein a temperature sensing device for producing a temperature signal representative of temperature within the chassis, a fan, and a fan speed controller. The fan speed controller produces a nominal fan speed control signal comprising a train of pulses, successive pulses having a duty cycle related to the temperature signal produced by the temperature sensing device, such time durations decreasing with increasing temperature. The speed control system includes a decoupling circuit responsive to the nominal fan speed control signal for, in response to relatively a low duty cycle, coupling the nominal fan control signal to an output of the decoupling circuit, and, in response a relatively high duty cycle, producing a preset fan speed signal at the output of the decoupling circuit. The fan has a speed in accordance with the signal at the output of the decoupling circuit.

  • Pub Date: 2005/29/09
  • Number: 2040624
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Control of data call origination based on prior origination attempts

A wireless device receives a request to originate a data call, e.g., from the user or a higher layer application. If origination control is not to be applied, then the wireless device originates the data call immediately. Otherwise, the origination of the data call is controlled based on prior data call origination attempts that are applicable to the data call. For example, the wireless device may originate the data call immediately if (1) the most recent origination attempt was successful or (2) the most recent origination attempt was unsuccessful but a predetermined time period has elapsed since this unsuccessful origination attempt. If the most recent origination attempt was unsuccessful and the predetermined time period has not elapsed, then the wireless device may (1) wait until this predetermined time period elapses and then originate the data call or (2) reject the data call.

  • Pub Date: 2005/29/09
  • Number: 08660527
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Communications system providing asynchronous communications over the internet and related methods

A communications system may include a client device for generating email processing jobs and a proxy server communicating asynchronously over the Internet with the client device for processing the email processing jobs. The client device may post a given email processing job to the proxy server with a unique job identifier (ID), and the proxy server thereafter may post job results for the given email processing job to the client device also with the unique job ID. The client device may also advantageously post at least one other email processing job to the proxy server over the Internet at a time between posting the given email processing job and receiving the job results therefor.

  • Pub Date: 2005/29/09
  • Number: 08468204
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Wireless device to manage cross-network telecommunication services

A communication remote control system allows a user to remotely configure call management functions across various phone networks using a client device. The communication remote control system centrally handles call management for the user's telephones. The communication remote control system may provide a centralized address book, call log, and voicemail. The user can specify various parameters including modes, filters, schedules, and the like, which are stored in the communication remote control system. The communication remote control system routes incoming calls made to the phone networks to the user's delivery device, which may be part of the client device. Incoming calls are routed to a specified telephone number, sent to voicemail, or otherwise disposed of or users can change modes manually or can specify automatic mode selection based on time of date, day of week, location, and/or other factors.

  • Pub Date: 2005/28/09
  • Number: 07298833
  • Owner: Avaya Integrated Cabinet Solutions, Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for provisioning a mobile wireless communications device to display account or device-specific characteristics

A system of provisioning a mobile wireless communications device to display account or device specific characteristics includes a database for storing a plurality of display characteristics for different wireless carriers, electronic mail (email) service providers, and device types. A configuration module accesses the database and uploads the display characteristics of at least one of the wireless carrier, email service provider or device type to the mobile wireless communications device upon provisioning of the mobile wireless communications device to access email from a remote location.

  • Pub Date: 2005/28/09
  • Number: 08494491
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for indicating interest of online content

Systems and methods for displaying interest levels of online content. In one embodiment, a system may include a web browser. A badge code module may execute within an execution environment provided by the web browser and may display an indication of content interest associated with a content source, where the indication is dependent upon a time rate of change of content request traffic directed to the content source. In another embodiment, a system may include a web browser configured to generate a web browser window. A plugin module may be integrated with the web browser for execution, may generate a display interface integrated within the browser window, and may display an indication of content interest associated with a content source via the display interface, where the indication is dependent upon a time rate of change of content request traffic directed to the content source.

  • Pub Date: 2005/28/09
  • Number: 07966395
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for dynamic transrating based on content

Exemplary techniques for modifying multimedia data based on content are disclosed. One technique comprises determining whether a first portion of multimedia content of multimedia data has a first content characteristic and performing one or more content actions associated with the first content characteristic when the first portion of the multimedia content is determined to have the first content characteristic, wherein the one or more content actions modify a first portion of the multimedia data associated with the first portion of the multimedia content.

  • Pub Date: 2005/28/09
  • Number: 07707485
  • Owner: VIXS Systems, Inc.
  • Location: Toronto, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for bridging identities in a service oriented architecture

A system for bridging user identities between at least a first and a second security domain, including a bridge associated with the first security domain for intercepting messages for service in the second domain from users in the first domain. The bridge authenticates the user identities against a local authentication source by using an established key relationship and binds a security token with the message. A gateway is associated with the second domain for gating inbound access and outbound communication with a service in the second domain and for receiving the authenticated message and verifying the authenticity of the security token by using a certificate of the trusted authentication source and authorising access to the service upon confirmation of the authorisation, such that the authorisation is independent of the identity of the user.

  • Pub Date: 2005/28/09
  • Number: 08452881
  • Details: Visit USPTO

Visit USPTO Page


System and method for authenticating a user for accessing an email account using authentication token

A system authenticates a user for accessing an electronic mailbox of the user from a remote device and obtaining electronic mail (email). An email server is provided by an email service provider and contains the electronic mailbox of the user. A mobile office platform is operative for accessing the email server and determines if an authentication token is required to access the electronic mailbox of the user. An authentication token is received from the email server or other server if an authentication token is required. Access is attempted to the electronic mailbox of the user using the authentication token. The authentication token is stored for subsequent use by the user to access their electronic mailbox if access to the electronic mailbox using the token has been successful.

  • Pub Date: 2005/28/09
  • Number: 08756317
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for an extendable mobile communications device user interface

A system and method for an extendable software interface includes a software architecture for use in a mobile device having a processor and a memory device. The software architecture includes a set of first-order controller software instructions configured to interface the application program with a first-order data model, and a first-order data object stored in the memory device in the form of the first-order data model. The first-order data object includes a second-order data object. A second-order set of controller software instructions configured to interact with the second-order data object is also included in the software architecture.

  • Pub Date: 2005/28/09
  • Number: 07805729
  • Owner: Research In Motion Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Method and system for generating schema to java mapping descriptors

A method and system for generating schema to Java descriptors. In one embodiment, a second object having customized schema to Java mapping information is created. The second object is placed within a first object. Via the first object, schema to Java generation is initiated.

  • Pub Date: 2005/28/09
  • Number: 08700681
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for determining interest levels of online content based on rates of change of content access

A method and system for determining interest levels of online content based on rates of change of content access traffic. According to one embodiment, a method may include detecting content request traffic directed to a content source, determining a time rate of change of said content request traffic, and determining an indication of content interest associated with the content source, where the indication is dependent upon the time rate of change of the content request traffic. The method may further include storing the indication of content interest on a computer-accessible medium.

  • Pub Date: 2005/28/09
  • Number: 08719255
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Control of optical connections in an optical network

A method for lightpath restoration in a reconfigurable optical network comprises the steps of naming each network addressable element in said reconfigurable optical network, determining current topology in said reconfigurable optical network, determining current resources in said reconfigurable optical network, requesting establishment of a lightpath, requesting reservation of restoration capacity, allocating the lightpath, and reserving the restoration capacity. Also disclosed is a method for lightpath restoration that comprises the steps of reserving restoration capacity, detecting transmission failures in the reconfigurable optical network, handling exceptions as a 10 result of transmission failures, and allocating transmission capacity.

  • Pub Date: 2005/28/09
  • Number: 07742395
  • Owner: AT&T Intellectual Property II, L.P.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Task manager with stored task definition having pointer to a memory address containing required code data related to the task for execution

Cell processor task management in a cell processor having a main memory, one or more power processor units (PPU) and one or more synergistic processing units (SPU), each SPU having a processor and a local memory is described. An SPU task manager (STM) running on one or more of the SPUs reads one or more task definitions stored in the main memory into the local memory of a selected SPU. Based on information contained in the task definitions the SPU loads code and/or data related to the task definitions from the main memory into the local memory associated with the selected SPU. The selected SPU then performs one or more tasks using the code and/or data.

  • Pub Date: 2005/27/09
  • Number: 08037474
  • Owner: Sony Computer Entertainment Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Self assembled nanostructures and methods for preparing the same

The present invention provides amphiphilic diacetylene compounds, and compositions and self-assembled nanotubes containing the same. Also provided are methods of producing the compounds, compositions, and nanotubes of the invention, and methods of destroying or inhibiting the growth or proliferation of microorganisms using the nanotubes of the present invention.

  • Pub Date: 2005/27/09
  • Number: 07666911
  • Owner: NanoSembly, LLC
  • Location: Harrison City, US
  • Details: Visit USPTO

Visit USPTO Page


Method of allocating bandwidth in an optical network

A method is provided to allocate bandwidth from a first node to a second node in a optical network. The method begins by accepting a request from an end-user, who requests a virtual path between the first node and the second node. The first and second nodes are ones of a number of such nodes. Each one of the nodes is coupled to at least one other node by at least one of a number of optical links. The nodes and links form the optical network. The virtual path has a bandwidth requirement associated therewith. Next, the service provider determines an amount of bandwidth available between the first and the second nodes. The service provider then allocates at least a portion of the amount of bandwidth available between the first and second nodes equal to the bandwidth requirement, so long as the bandwidth requirement is not greater than the amount of bandwidth available between the first and second nodes.

  • Pub Date: 2005/27/09
  • Number: 07602807
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Laminated sheet

The present invention relates a laminated sheet having improved toner-fixing property and toner blocking resistance, that comprises a base material made of paper, one or more thermoplastic resin layer(s) provided on one side or both sides of said base material, a toner-fixing layer provided thereon, wherein two or more hydrophilic macromolecular substances each having a different glass transition temperature are used as binders and constitutes said toner-fixing layer, at least a hydrophilic macromolecular substance (A) having a glass transition temperature of 50° C. or above and a hydrophilic macromolecular substance (B) having a glass transition temperature of 50° C. or below are contained as said hydrophilic macromolecular substances therein.

  • Pub Date: 2005/27/09
  • Number: 07749591
  • Owner: Nippon Paper Industries Co., Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Handheld device for capturing text from both a document printed on paper and a document displayed on a dynamic display device

A device for capturing rendered text is described. The device incorporates one or more visual sensors that receive visual information as a part of capturing rendered text. The visual sensors are collectively capable of capturing both text that is permanently printed on a page, and text that is displayed transitorily on a dynamic device. The device further incorporates a visual information disposition subsystem for disposing of visual information received by the visual sensors. The device further incorporates a package that bears the visual sensors and the visual information disposition subsystem, and is suitable to be held in a human hand.

  • Pub Date: 2005/27/09
  • Number: 07812860
  • Owner: Exbiblio B.V.
  • Location: Amsterdam, NL
  • Details: Visit USPTO

Visit USPTO Page


Email server with proxy caching of unique identifiers

An electronic mail (email) server has a database that stores unique identifiers (UID's) of electronic messages. A proxy obtains mappings from the database for previously existing UID's of electronic messages that have been determined from a polling operation. A cache caches the mappings of UID's and the proxy is operative for purging the cache of the previously existing UID's after polling.

  • Pub Date: 2005/27/09
  • Number: 08296369
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Email server with enhanced least recently used (LRU) cache

An electronic mail (email) server includes a proxy that obtains mappings for unique identifiers (UID's) corresponding to new electronic messages that have been determined from a polling operation. A Least Recently Used (LRU) cache caches each new message and releases from cache least recently used messages. A memory in which all messages within the LRU cache are spooled.

  • Pub Date: 2005/27/09
  • Number: 08307036
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Power/ground wire routing correction and optimization

A PG wire routing optimization tool for more efficiently routing PG wires in a layout design of an integrated circuit. The PG wire routing optimization tool analyzes a routing of the wires of a power and ground network for unacceptable IR-drops or electromigration problems. If one or more problems are discovered, the PG wire routing optimization tool determines design constraints for the wires that will correct the identified problems. It then initiates a floor planning tool to implement these corrective design constraints in the floor plan design. The PG wire routing optimization tool may alternately or additionally determine design constraints that will minimize the area of the wiring but will avoid creating new IR-drop or electromigration problems. It will then initiate a floor planning tool to implement these optimizing design constraints in the floor plan design.

  • Pub Date: 2005/26/09
  • Number: 2033569
  • Owner: Mentor Graphics Corporation
  • Location: Wilsonville, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer program products for hierarchical registration between a blood vessel and tissue surface model for a subject and a blood vessel and tissue surface image for the subject

Methods, systems, and computer program products for hierarchical registration () between a blood vessel and tissue surface model () for a subject and a blood vessel and tissue surface image for the subject are disclosed. According to one method, hierarchical registration of a vascular model to a vascular image is provided. According to the method, a vascular model is mapped to a target image using a global rigid transformation to produce a global-rigid-transformed model. Piecewise rigid transformations are applied in a hierarchical manner to each vessel tree in the global-rigid-transformed model to perform a piecewise-rigid-transformed model. Piecewise deformable transformations are applied to branches in the vascular tree in the piecewise-transformed-model to produce a piecewise-deformable-transformed model.

  • Pub Date: 2005/26/09
  • Number: 08233681
  • Owner: The University of North Carolina at Chapel Hill
  • Location: Chapel Hill, US
  • Details: Visit USPTO

Visit USPTO Page


Hyperspectral scene projection/generation systems and methods

Embodiments of hyperspectral scene projection/generation systems and methods are disclosed. One method embodiment, among others, comprises dispersing a beam of light at one of a plurality of selectable wavelengths, the beam of light corresponding to a scene, and displaying a spectral image of the scene corresponding to the dispersed beam of light at one of the plurality of selectable wavelengths.

  • Pub Date: 2005/26/09
  • Number: 07733484
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Transformation directives in datatype definitions

The present invention provides computer-implemented methods and systems for providing a transformation directive in a data type definition statement. The transformation directive specifies one or more transformations to be applied to data before it is stored in a variable of the data type being defined. The runtime framework interprets the transformation directive and applies the transformation to data which is assigned to a variable of the data type that was defined; and stores the transformed value to the variable.

  • Pub Date: 2005/23/09
  • Number: 2028157
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for gathering debug information

System and methods are disclosed for gathering debug information of a storage system of a computer system without requiring additional external hardware directly connected to the controller of the storage system.

  • Pub Date: 2005/23/09
  • Number: 07818627
  • Owner: LSI Corporation
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for automated provisioning of managed computing resources

Systems and methods are provided for automated provisioning of managed resources in a distributed computing environment. Automated provisioning of managed resources is realized by systems and methods that support automated execution of provisioning workflows through programmatic invocation of provisioning tasks (sequentially and/or parallel invocation) supported by a provisioning system, as well as automated control and coordination of task execution and exception handling through automated message exchange. Systems and methods support automated provisioning through seamless integration of provisioning and change management systems, whereby provisioning systems can automatically interpret and execute reusable change plans that are generated (on-the-fly) by change management systems. The change plans comprise provisioning workflow processes that are described using a standard, platform-independent workflow language.

  • Pub Date: 2005/23/09
  • Number: 08863137
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System to profile and optimize user software in a managed run-time environment

Method, apparatus, and system for monitoring performance within a processing resource, which may be used to modify user-level software. Some embodiments of the invention pertain to an architecture to allow a user to improve software running on a processing resources on a per-thread basis in real-time and without incurring significant processing overhead.

  • Pub Date: 2005/23/09
  • Number: 08301868
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Pyrimidine compounds, process for their preparation and compositions containing them

  • Pub Date: 2005/23/09
  • Number: 07820654
  • Owner: Dr. Reddy's Laboratories Ltd.
  • Location: Ameerpet, Hyderabad, IN
  • Details: Visit USPTO

Visit USPTO Page


Pyridine compounds, process for their preparation and compositions containing them

The present invention provides new heterocyclic compounds, particularly substituted pyridines, methods and compositions for making and using these heterocyclic compounds, and methods for treating a variety of diseases and disease states, including atherosclerosis, arthritis, restenosis, diabetic nephropathy, or dyslipidemia, or disease states mediated by the low expression of Perlecan.

  • Pub Date: 2005/23/09
  • Number: 07622486
  • Owner: Reddy US Therapeutics, Inc.
  • Location: Norcross, US
  • Details: Visit USPTO

Visit USPTO Page


Method of dynamically linking objects operated on by a computational system

In a method for presenting to a user information operated on by a computational software application, a relationship between states of a user interface mechanism located on a workspace associated with the computational software application and an underlying object operated on by the computational software application may be determined. The relationship may be defined at least in part by configuration data capable of being interpreted by the computational software application. A change in a value of the underlying object may be detected, and a current state of the user interface mechanism may be changed based on the detected change in the value of the underlying object and according to the relationship. Additionally, a change in the current state of the user interface mechanism caused by a user may be detected, and the current value of the underlying object may be changed based on the detected change in the current state of the user interface mechanism and according to the relationship.

  • Pub Date: 2005/23/09
  • Number: 07747981
  • Owner: Wolfram Research, Inc.
  • Location: Champaign, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for executing different java methods

A method and apparatus for executing different Java methods are provided. The method of executing different Java methods, includes when a first method calls a second method, storing information for returning to the first method in a first stack frame, adding a second stack frame for the second method to a stack, and storing information for executing the second method in the second stack frame, wherein the first stack frame and the second stack frame are included in the same stack in a same format.

  • Pub Date: 2005/23/09
  • Number: 07992138
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Interpreted language translation system and method

A computer-implemented method of processing an interpreted language element for execution on a mobile communication device including receiving at a server system a request from a remote device for a first electronic document that includes an interpreted language element, executing the interpreted language element using an interpreter, creating a context for the interpreted language element, generating a second electronic document based on a result of the execution, and transmitting the second electronic document to the remote device for display. In one implementation, executing the interpreted language element may include performing an action specified by the interpreted language element. In another implementation, the executing may include embedding the interpreted language element in a markup link that contains an address corresponding to the server system.

  • Pub Date: 2005/23/09
  • Number: 08117531
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Communications of UICC in mobile devices using internet protocols

A mobile device and UICC communication using standard Internet protocols. Such communication allows users access to their UICC information using standard web browsers and allows use of the UICCs to communicate with remote servers and thereby provide secure services for Internet transactions. The mobile device has a communications module to selectively communicate with the UICC processor or with at least one node on a network, the mobile device communications module has an Internet protocol module operable to receive messages issued from a first Internet application as Internet protocol packets, and to transmit the packets to target IP addresses; and operable to receive Internet protocol packets, to process the packets, and to send the messages contained in the packets to the first Internet application.

  • Pub Date: 2005/23/09
  • Number: 1988763
  • Owner: Gemalto Inc
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptable user interface for business software

An adaptable user interface is formed based on a role assumed by a user and the identification of tasks in a process that need to be performed. For each role assumed by the user, a set of tasks assigned to the role is identified. Each task is evaluated to determine if it is an active task that needs to be performed in one or more processes. For each active task, an element is added to the user interface.

  • Pub Date: 2005/23/09
  • Number: 07900152
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Processing an image map for display on computing device

A computer implemented method of processing an image for display on a mobile communication device includes extracting a portion of an image based on an image map. The image map relates to the portion of the image. The method also includes generating a document that comprises the extracted portion of the image and transmitting the generated document to a remote device for display. The method may also include assigning a selectable link to the extracted portion of the image and receiving a request from the remote device for an initial document having the image and image map. Additionally, the method may include storing in a database the generated document and transmitting the stored generated document in response to future requests for the initial document.

  • Pub Date: 2005/22/09
  • Number: 07796837
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Microarray techniques for nucleic acid expression analyses

Provided are DNA microarray techniques that allow hybridization without RNA amplification, without using cDNA, and without labeling the nucleic acid prior to hybridization. Referred to as the ouble-stranded xonuclease rotection (DEP) assay, the technique permits the sample RNA to be used directly for hybridization, without manipulation in any way. Further provided is a microarray technique for high-throughput miRNA gene expression analyses, termed the NA-primed, rray-based, lenow nzyme (RAKE) assay. The RAKE assay is a sensitive and specific technique for assessing single-stranded DNA and RNA targets, and offers specific advantages over Northern blots.

  • Pub Date: 2005/22/09
  • Number: 09145582
  • Owner: The Trustees of the University of Pennsylvania
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for spectral image analysis by exploiting spatial simplicity

For many cases of practical importance, imaged samples are “simple” in the sense that they consist of relatively discrete chemical phases. That is, at any given location, only one or a few of the chemical species comprising the entire sample have non-zero concentrations. The methods of spectral image analysis of the present invention exploit this simplicity in the spatial domain to make the resulting factor models more realistic. Therefore, more physically accurate and interpretable spectral and abundance components can be extracted from spectral images that have spatially simple structure.

  • Pub Date: 2005/22/09
  • Number: 2075471
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and system for integrating SAN servers

Multiple servers such as a main server as well as one or more corresponding sub-servers manage configuration information associated with a storage area network. A sub-server operates differently depending on whether the sub-server has been “integrated” with a main server in the storage area network. For example, in response to detecting a presence of a main server in the storage area network and that the corresponding sub-server has been integrated with the main server, a respective sub-server initiates execution of at least a portion of function calls associated with a respective service at the main server in lieu of executing the function calls locally at the respective sub-server. In the absence of the main server and/or integration, the sub-server operates independently and executes function calls locally rather than forward function calls associated with a respective service to the main server.

  • Pub Date: 2005/22/09
  • Number: 07668924
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Control of optical connections in an optical network

A method for lightpath provisioning in a reconfigurable optical network that comprises the steps of naming each network addressable element in the reconfigurable optical network, determining current resources therein, determining current topology therein, requesting establishment of a lightpath, and allocating the lightpath. A system for lightpath provisioning in a reconfigurable optical network is also provided, which includes naming each network addressable element in the reconfigurable optical network, determining current topology in the reconfigurable optical network, determining current resources in the reconfigurable optical network, requesting establishment of a lightpath, allocating the lightpath and removing the lightpath upon completion.

  • Pub Date: 2005/22/09
  • Number: 07920484
  • Owner: AT&T Intellectual Property II, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Secure software execution such as for use with a cell phone or mobile device

A method and system for securely executing software or securely loading data generates a secret value at a destination device based on a value transmitted to the destination device, which is algorithmically combined with a secure value stored at the destination device. The destination device, such as a cell phone, remotely accesses an entity or otherwise receives the software or data, where the software or data is encrypted or digitally signed based on the secret value. The cell phone then selectively employs the software or data.

  • Pub Date: 2005/21/09
  • Number: 08219811
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Instant message broadcasting and presence enabling from electronic mail application

A system and method for broadcasting a message to multiple contacts in a list of contacts provided by an electronic mail application and furnishing presence information for contacts in the list of contacts provided by the electronic mail application includes an interface for adding functionality to an electronic mail application which supports instance messaging (IM). The interface interfaces with a distributed presence enabled communication platform for providing presence information regarding contact availability. The electronic mail application utilizes the interface for displaying the contact presence information and broadcasting a message to multiple contacts in the list of contacts.

  • Pub Date: 2005/21/09
  • Number: 07571190
  • Owner: Siemens Communications, Inc.
  • Location: Boca Raton, US
  • Details: Visit USPTO

Visit USPTO Page


Continuous disreefing apparatus for parachute

A continuous disreefing apparatus has a sleeve that has a diameter and is made from a flexible, resilient material that allows the sleeve to diametrically contract when the sleeve is under tension and to diametrically relax when such tension is substantially reduced or removed. The sleeve has a portion thereof configured for connection to a parachute suspension line. The continuous disreefing apparatus includes a reefing line that extends through the sleeve and is arranged for movement through the sleeve wherein the rate at which the reefing line moves through the sleeve is controlled by the amount of tension on the sleeve.

  • Pub Date: 2005/21/09
  • Number: 07416158
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Shared memory interface in a programmable logic device using partial reconfiguration

Partial reconfiguration of a programmable logic device is used in combination with a shared memory block for communicating between two blocks of an electronic circuit design. In one embodiment, a shared memory is implemented on RAM resources of a field programmable gate array (FPGA), and a first design block implemented in resources of the FPGA is coupled to the shared memory. A second design block is also coupled to the shared memory. In response to a write request by the second design block, a process determines the RAM resources of the FPGA that correspond to the shared memory address in the write request. A configuration bitstream is generated to include configuration data for partial reconfiguration of the FPGA with the data from the write request at the appropriate RAM resources. The FPGA is partially reconfigured with the configuration bitstream via a configuration port of the FPGA.

  • Pub Date: 2005/20/09
  • Number: 2018682
  • Owner: Xilinx, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Radiation-hardened fast acquisition/weak signal tracking system and method

A global positioning system (GPS) receiver and method of acquiring and tracking GPS signals comprises an antenna adapted to receive GPS signals; an analog radio frequency device operatively connected to the antenna and adapted to convert the GPS signals from an analog format to a digital format; a plurality of GPS signal tracking correlators operatively connected to the analog RF device; a GPS signal acquisition component operatively connected to the analog RF device and the plurality of GPS signal tracking correlators, wherein the GPS signal acquisition component is adapted to calculate a maximum vector on a databit correlation grid; and a microprocessor operatively connected to the plurality of GPS signal tracking correlators and the GPS signal acquisition component, wherein the microprocessor is adapted to compare the maximum vector with a predetermined correlation threshold to allow the GPS signal to be fully acquired and tracked.

  • Pub Date: 2005/20/09
  • Number: 07548199
  • Owner: The United States of America as represented by the Administrator of the National Aeronautics and Space Administration
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated handheld computing and telephony system and services

Disclosed is an integrated handheld computer and telephony system. Integration of the handheld computer and telephony system is at the physical and operational level. For example, the integrated handheld computer and telephony system physically integrates a handheld computer with a mobile (e.g., cellular) telephone. In addition, the handheld computer is distinct from telephony system in that they are logically separable. However, they are also operationally integrated, for example, the telephony system executes a telephone application on the processor of the handheld computer. Likewise, the handheld computer can execute applications, for example, a phone book, that can be used to launch the telephony application.

  • Pub Date: 2005/20/09
  • Number: 2022359
  • Owner: Palm, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Expeditious synthesis of DPD

This invention provides a practical synthesis route for 4,5-dihydroxypentane-2,3-dione (DPD), an unstable small molecule which is proposed to be the source of universal signaling agents for quorum sensing in bacteria. The synthesis route includes new intermediates and allows preparation of isotopically-labeled DPD and ent-DPD. The method provides sufficient quantities of DPD for study of spontaneous binding of borate to DPD, the signal for the marine bacteria

  • Pub Date: 2005/20/09
  • Number: 2053242
  • Owner: The Trustees of Princeton University
  • Location: Princeton, US
  • Details: Visit USPTO

Visit USPTO Page


Executing unmanaged content in a managed execution environment

A legacy application program contains unmanaged code. Application definitions for common unmanaged applications are established. An application definition includes a manifest that describes the unmanaged code and an execution wrapper that projects the unmanaged code as a managed assembly to the execution environment. An application definition can also specify other modifications to the unmanaged code, such as modifications to cause the unmanaged code to call managed application programming interfaces (APIs). The application definition is utilized to transform the unmanaged code into a managed assembly. The manifest and wrapper are added to the managed assembly and the unmanaged code is maintained as a resource. The managed execution environment uses the manifest to compute a permissions set for the unmanaged code, and the wrapper invokes the unmanaged code. The unmanaged code uses the managed APIs, and the managed execution environment can therefore manage execution of the code.

  • Pub Date: 2005/20/09
  • Number: 2086050
  • Owner: Symantec Corporation
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Enhanced system for controlling service interaction and for providing blending of services

A service broker system is presented for mediating events or messages to be sent to or received from a plurality of applications to control service interaction and to provide service blending in a communications system. The service broker system includes steplet functional components that determine a desired mediation for feature interaction or service blending associated with an event or message, along with a message manager component with a dispatcher for the steplet functional components, where the message manager creates and maintains a unique message object for a received request message. A user and end point data manager component is provided to obtain user data and endpoint data and to bind attribute data to a user ID associated with a current service session, and a session context component for binding attribute data to session ID associated with the current service session. In one embodiment, the system includes two or more message manager components individually associated with a different message type.

  • Pub Date: 2005/20/09
  • Number: 08233411
  • Owner: Alcatel Lucent
  • Location: Paris, FR
  • Details: Visit USPTO