Patent application number | Description | Published |
20080235176 | DATA COMPARATOR - A system that identifies commonalities and/or differences in data is disclosed. Specifically, the innovation employs hashing algorithms to identify similarities and/or differences in data from one entity by comparing a hash of the data to a hash of data of another entity. The hashing functionality maintains privacy and/or confidentiality of the information thereby reducing the possibility of accidental or unwanted disclosure. | 09-25-2008 |
20080273435 | OPTICAL DNA - The claimed subject matter relates to architectures and/or mechanisms that can facilitate issuing, embedding and verification of an optical DNA (o-DNA) signature. A first mechanism is provided for obtaining a set of manufacturing errors inherent in an optical media instance. These errors can be encoded into the o-DNA that can be cryptographically signed with a private key, then embedded into the source optical media instance. A second mechanism is provided that can decrypt the o-DNA with a public key and compare the authenticated errors to the observed errors to ascertain whether the optical media instance is authentic as opposed to a forgery or counterfeit. | 11-06-2008 |
20080301304 | MULTIMEDIA SPACES - The claimed subject matter provides a system and/or method that detect watermarks incorporated within analog and/or digital signals associated with multimedia presentations. The disclosed system can include a component that receives analog and/or digital signals, ascertains the existence of a watermark associated with the received signals, and extracts metadata encapsulated within the watermark, wherein the metadata can both include information regarding the broadcast multimedia presentations as well as information unrelated to the broadcast multimedia. Extracted metadata or more particularly, attributes contained within the metadata can be utilized to establish online social networks based at least on the associated attributes. | 12-04-2008 |
20080312095 | VACCINE DESIGN METHODOLOGY - Systems and methodologies for efficient vaccine design are disclosed herein. A methodology for efficient vaccine design in accordance with one or more embodiments disclosed herein may be operable to receive a graph having vertices corresponding to epitope sequences present in the pathogen population, weights for respective vertices corresponding to respective frequencies with which corresponding epitope sequences appear in the pathogen population, and directed edges that connect vertices that correspond to overlapping epitope sequences. Such a methodology may also be operable to determine a candidate vaccine sequence of overlapping epitope sequences by identifying a path though the graph corresponding to a series of connected vertices and directed edges that maximizes the total weight of the vertices in the path for a desired vaccine sequence length. | 12-18-2008 |
20090049545 | TOLERATING AND DETECTING ASYMMETRIC RACES - Detecting and/or tolerating races. Races occur due to malicious threads not respecting software locks. A method of detecting and/or correcting races includes making local copie(s) and reference copie(s) of shared data. Any read and write operations performed by a safe thread are caused to be performed on the local copie(s) during a critical section. The critical section defines a time frame which a variable lock is placed on shared data. Any read and write operations performed by malicious threads are allowed to be performed on the shared data during the critical section. The shared data, the local copie(s), and the reference copie(s) are compared to determine that a race has been detected. An indication can be output that a race has occurred or the race can be corrected. | 02-19-2009 |
20090147949 | UTILIZING CRYPTOGRAPHIC KEYS AND ONLINE SERVICES TO SECURE DEVICES - The claimed subject matter in accordance with an aspect provides systems and/or methods that generates, allocates, or utilizes strong symmetric cryptographic keys to secure storage devices. The system can include components that determine whether a storage device with an associated credential cache has been affiliated with the system. The system extracts authentication information included within the credential cache and establishes communications with a web service that utilizes the authentication information to generate and return a set strong symmetric cryptographic keys to the system. The system employs one of the set of strong symmetric cryptographic keys to encrypt or decrypt the storage device to make content persisted on the storage device available and thereafter removes the distributed set of strong symmetric cryptographic keys from the system. | 06-11-2009 |
20090150296 | REPUTATION IN ON-LINE CONSUMER MARKETS - Seller's reputation quantification technique embodiments are presented that quantify in monetary terms a risk of dissatisfaction to a potential buyer of a product or service from a seller in an on-line consumer market. Generally, this involves computing the monetary sales limit for the seller. This monetary sales limit represents an amount, which if a sum of the current prices of all the products and services currently offered by the seller is equal to or less than the amount, there would not be a significant risk to the buyer of being dissatisfied with the product or service. Given this, a risk of a potential buyer's dissatisfaction with a product or service purchased from the seller in view of a price the buyer wants to pay is assessed. The assessed risk is then provided to the potential buyer in the form of one or more risk indicators. | 06-11-2009 |
20090157494 | SCALABLE AUDIT-BASED PROTOCOL FOR PAY-PER-ACTION ADS - Systems and methods that account for payment of sales commission received by the merchant. An audit component simulates user behavior in purchasing items from the merchant in an advertising system, which encompasses interaction among a merchant (who advertise on websites/blogs); a trusted party (who monitors activities of the merchant), an advertisement publisher, and an advertisement consumer (e.g., buyer of the merchandise offered by the merchant). | 06-18-2009 |
20090158044 | OPTICAL DNA BASED ON NON-DETERMINISTIC ERRORS - The claimed subject matter relates to architectures and/or mechanisms that can facilitate issuing, embedding and verification of an optical DNA (o-DNA) signature. A first mechanism is provided for obtaining a set of manufacturing errors inherent in an optical media instance. These errors can be non-deterministic and can be encoded into the o-DNA that can be cryptographically signed with a private key, and then embedded into the source optical media instance. A second mechanism is provided that can decrypt the o-DNA with a public key and compare the authenticated errors to the observed errors to ascertain whether the optical media instance is authentic as opposed to a forgery or counterfeit. | 06-18-2009 |
20090164426 | SEARCH ENGINE PLATFORM - Systems and methods to perform efficient searching for web content using a search engine are provided. In an illustrative implementation, a computing environment comprises a search engine computing application having an essential pages module operative to execute one or more selected selection algorithms to select content from a cooperating data store. In an illustrative operation, the exemplary search engine executes on a received search query to generate search results. Operatively, the retrieved results can be generated based upon their joint coverage of the submitted search query by deploying a selected sequential forward floating selection (SFFS) algorithm executing on the essential pages module. In the illustrative operation, the SFFS algorithm can operate to iteratively add one and delete one element from the set to improve a coverage score until no further improvement can be attained. The resultant processed search results can be considered essential pages. | 06-25-2009 |
20090265022 | PLAYBACK OF MULTIMEDIA DURING MULTI-WAY COMMUNICATIONS - Multimedia playback technique embodiments are presented which facilitate the playback of an arbitrary media recording during a multi-party communication over a real-time multi-way communication system via a user's communication device. The recorded media can be interjected into a multi-party communication on a real time basis. This is generally accomplished by the media recording being inserted into a media stream being processed by the user's communication device as part of the multi-party communication. This can be done by either replacing a portion of the media stream with the media recording or mixing the media recording with a portion of the media stream. Once inserted, the media recording is transmitted as part of the media stream to a least one other party to the communication. | 10-22-2009 |
20090327177 | SEMI-EXACT ALGORITHMS FOR OPTIMIZATION - Described herein is a meta-algorithm adaptable to different types of optimization problems and different computing platforms. A problem space is (i) browsed using a heuristic that computes objectives locally and (ii) while constructing a solution, key decisions are performed globally. A simple data structure—a probabilistic cache—is used to efficiently store intermediate sub-solutions. As an example, the meta-algorithm is applied to find an algorithm for solving the graph coloring problem. | 12-31-2009 |
20100044438 | Counterfeit and Tamper Resistant Labels with Randomly Occurring Features - Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' features. The information from the scan is utilized to provide identifying indicia which uniquely identifies each label and may be later verified against the label features that are present to determine whether the label is genuine. In a described implementation, the identifying indicia may be cryptographically signed. | 02-25-2010 |
20100057695 | POST-PROCESSING SEARCH RESULTS ON A CLIENT COMPUTER - Described is a technology by which a deep query response comprising a large number of URLs is processed at a client-side recipient into a secondary set of search results. A client requests a deep query response (e.g., hundreds of URLs) related to a query, generally in conjunction with a traditional query request/response. As the traditional query response is output for inspection by the user, the client performs deep query processing on the deep query response by fetching files for the deep response URLs, and parsing those files for analyzing their content, e.g., to perform ranking and/or summarizing for a secondary output. Because more files and their content are evaluated and processed in client-side deep query processing, more relevantly ranked and/or summarized content is provided to the user, which may include improved advertising revenue. Queries also may be classified into a query type for use in deep query processing. | 03-04-2010 |
20100058064 | LOGIN AUTHENTICATION USING A TRUSTED DEVICE - A user working on a client computer is allowed to remotely login to a server over a computer network. A first secure connection is established between the client and the server. Communications with a trusted device which is in the user's control is established via a communication channel between the trusted device and the client, where this channel is not part of the network. A second secure connection is established between the trusted device and the server through the client, where this second secure connection is tunneled within the first secure connection. The user remotely logs into the server over the second secure connection using the trusted device. | 03-04-2010 |
20100085853 | PROTECTING OPTICAL MEDIA USING RANDOM, MOVING RADIO FREQUENCY SCATTERERS - The subject innovation relates to systems and/or methodologies for using randomly positioned electromagnetic scatterers deposited into a predetermined region of an optical storage medium (e.g., Blue Ray DVD, HD DVD, CD, etc.) as a distinct three dimensional ( | 04-08-2010 |
20100125490 | SOCIAL NETWORK REFERRAL COUPONS - The claimed subject matter provides a system and/or a method that facilitates enhancing coupon distribution in a non-evasive manner based upon a referral. A social network can include two or more users with at least one actively acknowledged connection that indicates a relationship between a first user and a second user. An interface can receive a referral from the first user associated with the social network, wherein the referral describes an experience related to at least one of a business or a service. A viral coupon component can implement a non-evasive delivery of a coupon to the second user based upon leveraging the relationship between the first user and the second user, wherein the coupon is incorporated within at least one of an advertisement or a listing. The vial coupon component delivery of the coupon can be triggered based upon the second user actively investigating at least one of the business or the service. | 05-20-2010 |
20100127823 | Radio Frequency Certificates of Authenticity and Related Scanners - Radio frequency certificates of authenticity (RFCOAs) and associated scanners and methods are presented. In one implementation, an array of miniaturized antenna elements in an RFCOA scanner occupies an area smaller than a credit card yet obtains a unique electromagnetic fingerprint from an RFCOA associated with an item, such as the credit card. The antenna elements are miniaturized by a combination of both folding and meandering the antenna patch components. The electromagnetic fingerprint of an exemplary RFCOA embeddable in a credit card or other item is computationally infeasible to fake, and the RFCOA cannot be physically copied or counterfeited based only on possession of the electromagnetic fingerprint. | 05-27-2010 |
20100177048 | EASY-TO-USE SOFT KEYBOARD THAT DOES NOT REQUIRE A STYLUS - The claimed subject matter provides systems and/or methods that generates a soft keyboard projected onto a touch sensitive surface. The system includes components that form and associate groups of characters, symbols, numerals, letters, or punctuation to a small number of soft keys projected onto the touch sensitive surface, animates the groups of characters, symbols, numerals, letters, or punctuation assigned to the small number of soft keys, and obtains indication of a character, symbol, numeral, letter, or punctuation selected by a user when the user touches the surface while the groups of characters, symbols, numerals, letters, or punctuation are in animation. | 07-15-2010 |
20100214894 | Optical Medium with Added Descriptor to Reduce Counterfeiting - Functionality is described for reducing the unauthorized reproduction of optical media, such as optical discs of various types. The functionality operates by adding a physical descriptor to an optical medium, forming reference descriptor information based on the descriptor (by reading the descriptor L | 08-26-2010 |
20100300271 | Detecting Beat Information Using a Diverse Set of Correlations - A beat analysis module is described for determining beat information associated with an audio item. The beat analysis module uses an Expectation-Maximization (EM) approach to determine an average beat period, where correlation is performed over diverse representations of the audio item. The beat analysis module can determine the beat information in a relative short period of time. As such, the beat analysis module can perform its analysis together with another application task (such as a game application task) without disrupting the real time performance of that application task. In one application, a user may select his or her own audio items to be used in conjunction with the application task. | 12-02-2010 |
20110002209 | OPTICAL MEDIUM WITH ADDED DESCRIPTOR TO REDUCE COUNTERFEITING - Functionality is described for reducing the unauthorized reproduction of optical media, such as optical discs of various types. The functionality operates by adding a physical descriptor to an optical medium, forming reference descriptor information based on the descriptor, signing the reference descriptor information to produce authenticity information, and adding the authenticity information to the optical medium. At a point of consumption, the functionality operates by reading the authenticity information and reading the descriptor. Based on the information that is read, the functionality performs cryptographic analysis and descriptor-based analysis to validate the optical medium. The functionality includes various provisions to reduce the impact of wear and tear on the above-summarized analysis. The functionality can be applied to stamped or recordable optical media. | 01-06-2011 |
20110029501 | Search Engine Platform - Systems and methods to perform efficient searching for web content using a search engine are provided. In an illustrative implementation, a computing environment comprises a search engine computing application having an essential pages module operative to execute one or more selected selection algorithms to select content from a cooperating data store. In an illustrative operation, the exemplary search engine executes on a received search query to generate search results. Operatively, the retrieved results can be generated based upon their joint coverage of the submitted search query by deploying a selected sequential forward floating selection (SFFS) algorithm executing on the essential pages module. In the illustrative operation, the SFFS algorithm can operate to iteratively add one and delete one element from the set to improve a coverage score until no further improvement can be attained. The resultant processed search results can be considered essential pages. | 02-03-2011 |
20110202427 | Device-Pairing by Reading an Address Provided in Device-Readable Form - A system is described for allowing a user, operating a trusted device, to remotely log into a server via a potentially untrustworthy client. The system operates by establishing a first secure connection between the client and the server. The system then establishes a second secure connection between the device and the server through the client. The user then remotely logs into the server over the second secure connection using the device. The second secure connection is tunneled within the first secure connection, preventing the untrustworthy client from discovering personal information associated with the user. According to one feature, prior to forming the second secure connection, the user can establish a pairing relationship with the client by reading an address of the client using any kind of reading mechanism. According to another feature, the device can receive marketing information in the course of a transaction. | 08-18-2011 |
20110243074 | Data Center Using Wireless Communication - A data center includes a plurality of computing units that communicate with each other using wireless communication, such as high frequency RF wireless communication. The data center may organize the computing units into groups (e.g., racks). In one implementation, each group may form a three-dimensional structure, such as a column having a free-space region for accommodating intra-group communication among computing units. The data center can include a number of features to facilitate communication, including dual-use memory for handling computing and buffering tasks, failsafe routing mechanisms, provisions to address permanent interface and hidden terminal scenarios, etc. | 10-06-2011 |
20110314210 | LEVERAGING CHIP VARIABILITY - Embodiments are described that leverage variability of a chip. Different areas of a chip vary in terms of reliability under a same operating condition. The variability may be captured by measuring errors over different areas of the chip. A physical factor that affects or controls the likelihood of an error on the chip can be varied. For example, the voltage supplied to a chip may be provided at different levels. At each level of the physical factor, the chip is tested for errors within the regions. Some indication of the error statistics for the regions is stored and then used to adjust power used by the chip, to adjust reliability behavior of the chip, to allow applications to control how the chip is used, to compute a signature uniquely identifying the chip, etc. | 12-22-2011 |
20110314537 | AUTOMATIC CONSTRUCTION OF HUMAN INTERACTION PROOF ENGINES - Human Interaction Proofs (“HIPs”, sometimes referred to as “captchas”), may be generated automatically. An captcha specification language may be defined, which allows a captcha scheme to be defined in terms of how symbols are to be chosen and drawn, and how those symbols are obscured. The language may provide mechanisms to specify the various ways in which to obscure symbols. New captcha schemes may be generated from existing specifications, by using genetic algorithms that combine features from existing captcha schemes that have been successful. Moreover, the likelihood that a captcha scheme has been broken by attackers may be estimated by collecting data on the time that it takes existing captcha schemes to be broken, and using regression to estimate the time to breakage as a function of either the captcha's features or its measured quality. | 12-22-2011 |
20110320822 | KEYED HUMAN INTERACTIVE PROOF PLAYERS - A human interactive puzzle (HIP) authorization architecture where keyed and animated puzzles are executed by HIP players which are distinct and obfuscated to the point where breaking a single player is a relatively costly operation. A key is created in response to a request for a service, a HIP player is created based on the key, and a small installation executable is created that expands during installation to produce a computationally expensive data structure on the client relative to verification of the solution at the server. Thus, copying of the player or relay of the puzzle to a third system requires more time than allowed to receive the solution at the server. | 12-29-2011 |
20120058824 | SCALABLE REAL-TIME MOTION RECOGNITION - Human body motion is represented by a skeletal model derived from image data of a user. The model represents joints and bones and has a rigid body portion. The sets of body data are scaled to a predetermined number of sets for a number of periodic units. A body-based coordinate 3-D reference system having a frame of reference defined with respect to a position within the rigid body portion of the skeletal model is generated. The body-based coordinate 3-D reference system is independent of the camera's field of view. The scaled data and representation of relative motion within an orthogonal body-based 3-D reference system decreases the data and simplifies the calculations for determining motion thus enhancing real-time performance for multimedia applications controlled by a user's natural movements. | 03-08-2012 |
20120165098 | SCALABLE REAL-TIME MOTION RECOGNITION - Human body motion is represented by a skeletal model derived from image data of a user. The model represents joints and bones and has a rigid body portion. The sets of body data are scaled to a predetermined number of sets for a number of periodic units. A body-based coordinate 3-D reference system having a frame of reference defined with respect to a position within the rigid body portion of the skeletal model is generated. The body-based coordinate 3-D reference system is independent of the camera's field of view. The scaled data and representation of relative motion within an orthogonal body-based 3-D reference system decreases the data and simplifies the calculations for determining motion thus enhancing real-time performance for multimedia applications controlled by a user's natural movements. | 06-28-2012 |
20120167061 | IDENTIFYING FACTORABLE CODE - Various embodiments are disclosed that relate to the automated identification of one or more computer program functions for potentially placing on a remote computing device in a split-computational computing environment. For example, one disclosed embodiment provides, on a computing device, a method of determining a factorable portion of code to locate remotely from other portions of the code of a program to hinder unauthorized use and/or distribution of the program. The method includes, on a computing device, receiving an input of a representation of the code of the program, performing analysis on the representation of the code, the analysis comprising one or more of static analysis and dynamic analysis, and based upon the analysis of the code, outputting a list of one or more functions determined from the analysis to be candidates for locating remotely. | 06-28-2012 |
20120191803 | DECOMMISSIONING FACTORED CODE - Various embodiments are disclosed that relate to decommissioning factored code of a program on a computing device. For example, one disclosed embodiment provides a method of operating a computing device. The method includes executing a program on the computing device, and while executing the program, identifying a remote location of a factored function via a code map, sending a call to the factored function and receiving a return response. The method further comprises, upon occurrence of a decommissioning event, receiving a copy of the factored function; and updating the code map with a location of the copy of the factored function. | 07-26-2012 |
20120192209 | FACTORING MIDDLEWARE FOR ANTI-PIRACY - Embodiments are disclosed that relate to hindering unauthorized use or distribution of a middleware program contained within an application. One example embodiment provides a method for hindering unauthorized use or distribution of a middleware program contained within an application. The method comprises acquiring factored middleware code, the factored middleware code having a missing function residing on a remote computing device, and building an application around the factored middleware code such that the application is configured to call to the remote computing device for execution of the missing function during use. The application may be configured to send a call to the remote computing device for execution of the missing function during use. | 07-26-2012 |
20120214594 | MOTION RECOGNITION - Human body motion is represented by a skeletal model derived from image data of a user. Skeletal model data may be used to perform motion recognition and/or similarity analysis of body motion. An example method of motion recognition includes receiving skeletal motion data representative of a user data motion feature from a capture device relating to a position of a user within a scene. A cross-correlation of the received skeletal motion data relative to a plurality of prototype motion features from a prototype motion feature database is determined. Likelihoods that the skeletal motion data corresponds to each of the plurality of prototype motion features are ranked. The likelihoods are determined using the cross-correlation. A classifying operation is performed on a subset of the plurality of prototype motion features. The subset of the plurality of prototype motion features is chosen because its members have the relatively highest likelihoods of corresponding to the skeletal motion data. | 08-23-2012 |
20120319919 | PIFA ARRAY - A PIFA (Planar Inverted-F Antenna) array antenna has multiple PIFAs. The PIFA array is used to provide different radiation patterns for communication. A signal being emitted by the PIFA array is manipulated. According to the manipulation, the PIFA array may emit the signal with an omni-directional radiation pattern or a directional radiation pattern; the same PIFA array (antenna) is used for both directional communication and omni-directional communication. The PIFA array may be used in mobile computing devices, smart phones, or the like, allowing such devices to transmit directionally and omni-directionally. The signal manipulation may involve splitting the signal into components that feed PIFAs, and before the components reach the PIFAs, changing properties of the components (e.g., phase) relative to each other. | 12-20-2012 |
20130090064 | DYNAMIC RANGE WIRELESS COMMUNICATIONS ACCESS POINT - The claimed subject matter provides for systems and/or methods for a dynamic range wireless access point to initiate deliberate and/or selective communications with one or more wireless devices over a short range radio path. One embodiment of an access point system comprises a processor that transfers one or more wireless devices to a long range radio path once a transition condition has been met. In another embodiment, an access point system may affect transactions between user/customer's smart devices and a commercial place of business where the access point system and the smart devices initiate communications when the smart devices are deliberately placed within the proximity of the access point antenna and/or the smart devices are brought within the vicinity of the access point antenna such as by passing through the entrance or exit to the place of business. | 04-11-2013 |
20130205174 | LEVERAGING CHIP VARIABILITY - Embodiments are described that leverage variability of a chip. Different areas of a chip vary in terms of reliability under a same operating condition. The variability may be captured by measuring errors over different areas of the chip. A physical factor that affects or controls the likelihood of an error on the chip can be varied. For example, the voltage supplied to a chip may be provided at different levels. At each level of the physical factor, the chip is tested for errors within the regions. Some indication of the error statistics for the regions is stored and then used to adjust power used by the chip, to adjust reliability behavior of the chip, to allow applications to control how the chip is used, to compute a signature uniquely identifying the chip, etc. | 08-08-2013 |
20140040073 | Comparative Shopping Tool - The claimed subject matter relates to a computer-implemented architecture that can provide a non-invasive comparative shopping tool, such as a browser plug-in. For example, the plug-in can determine whether a web user is currently visiting a purchase page, thus indicating that the web user is likely to be interested in purchasing items online. Upon making this determination, the plug-in can display a non-invasive listing (that can be quickly and conveniently dismissed) of comparable items at favorable prices (or with favorable features, etc.) that are available for purchase at other web sites. In addition, the plug-in can communicate with a data store, e.g., by way of the web, in order to help make various determination as well as to receive the listing of comparable items. | 02-06-2014 |
20140247822 | DYNAMIC RANGE WIRELESS COMMUNICATIONS ACCESS POINT - The claimed subject matter provides for systems and/or methods for a dynamic range wireless access point to initiate deliberate and/or selective communications with one or more wireless devices over a short range radio path. One embodiment of an access point system comprises a processor that transfers one or more wireless devices to a long range radio path once a transition condition has been met. In another embodiment, an access point system may affect transactions between user/customer's smart devices and a commercial place of business where the access point system and the smart devices initiate communications when the smart devices are deliberately placed within the proximity of the access point antenna and/or the smart devices are brought within the vicinity of the access point antenna such as by passing through the entrance or exit to the place of business. | 09-04-2014 |