Patent application number | Description | Published |
20110099153 | METHOD AND APPARATUS FOR GENERATING A POLYMORPHIC NOTE - An approach is provided for generating a polymorphic note. A polymorphic note manager receives a request, from a device, to generate a polymorphic note, wherein the polymorphic note includes information of a plurality of application types that is developed over a period of time. The polymorphic note manager then generates the polymorphic note in response to the request and stores the polymorphic note for access by the device. | 04-28-2011 |
20110099189 | METHOD AND APPARATUS FOR EXPLORING CONNECTIONS OF A POLYMORPHIC NOTE - An approach is provided for exploring connections of a polymorphic note. A polymorphic note manager receives a request to display one or more polymorphic notes connected to a selected polymorphic note. In response to the request, the polymorphic note manager determining the one or more connected polymorphic notes and causes, at least in part, actions that result in display of the selected polymorphic note, the one or more connected polymorphic notes, corresponding connections between the selected polymorphic note and the one or more connection polymorphic notes, or a combination thereof. | 04-28-2011 |
20110099490 | METHOD AND APPARATUS FOR PRESENTING POLYMORPHIC NOTES IN A GRAPHICAL USER INTERFACE - An approach is provided for presenting polymorphic notes in a graphical user interface. A polymorphic note manager receives a request to display a plurality of polymorphic notes on a graphical user interface of a device. In response to the request, the polymorphic note manager determines an order of the plurality of polymorphic notes according to either an associated date or, if there is no associated date, a creation date corresponding to each of the plurality of polymorphic notes. The polymorphic note manager then causes, at least in part, actions that result in display of the plurality of polymorphic notes in the graphical user interface according to the determined order | 04-28-2011 |
20110239158 | METHOD AND APPARATUS FOR PROVIDING SOFT REMINDERS - An approach is provided for presenting soft reminders (e.g., reminders for notes with no triggering criteria). A reminder manager receives an input, from a user, for specifying a note. The note is not associated with triggering criteria. In response to the request, the reminder manager retrieves contextual information from a device associated with the user, and causes, at least in part, presentation of a reminder of the note based, at least in part, on the contextual information. | 09-29-2011 |
20120297302 | DEVICE, SYSTEM AND METHOD FOR IMAGE-BASED CONTENT DELIVERY - Media content is provided using thumbnail-based images and respective archives linked thereto. In accordance with one or more embodiments, access is provided to interactive single-page and multi-page thumbnail images, with each thumbnail image being linked to at least one of a plurality of media-content units in respective sets of the media-content units (e.g., to pages within respective articles each having one or more pages, with each page having predefined text and image data in a set layout). Archive data is identified and communicated for each media content unit, responsive to user input data indicating a selection of one of the thumbnail images, and based on availability of the archive data locally at a user device. | 11-22-2012 |
20120297490 | MEDIA CONTENT DEVICE, SYSTEM AND METHOD - Media content is provided using metric-apportioning. In accordance with one or more embodiments, remote-user interface circuits are authenticated and remote access is provided to different sets of media content via the interface. For each authenticated interface and a time-based period during which the interface accesses the media content, time-stamped usage data that characterizes use of the media content at the interface is communicated therewith. A usage metric characterizing usage of the media content is apportioned based upon the time-stamped usage data and stored weighting factor data for the media content. | 11-22-2012 |
20120317482 | MEDIA CONTENT DEVICE, SYSTEM AND METHOD - Access is provided for different types of media content provided by disparate publishers, and in formats corresponding to operating characteristics of respective user devices. As consistent with one or more example embodiments herein, media content access is filtered for users requesting access via different user devices, based upon characteristics of the device to which the access is provided, user subscription data and publisher-specific criteria. A user-specific storefront interface is generated for each of a multitude of users, based upon the filtering. Each storefront interface indicates media content that can be displayed at the device to which access is requested, and identifies media content to which the user does and does not have subscription access. The user-specific storefront interfaces are presented at respective user devices, and media content is delivered to each device in response to selections made via the user-specific storefront interfaces. | 12-13-2012 |
Patent application number | Description | Published |
20080304506 | MULTIPLE REQUEST INTERVALS - Methods and apparatuses are presented for communicating using a shared communication medium. A request is sent over the shared communication medium. The shared communication medium is organized to include a request signal space and a scheduled transmission signal space. The request signal space includes a plurality of request segments each having a different location within the request signal space. The scheduled transmission signal space includes a plurality of scheduled transmission segments each having a different location within the scheduled transmission signal space. The request occupies more than one request segment. Each of the more than one request segments is randomly selected by the first node. An assignment is received assigning the request to a transmission opportunity in the scheduled transmission signal space. The assignment is made in response to detecting at least one of the more than one request segments. A data transmission is sent using the assigned transmission opportunity. | 12-11-2008 |
20080304507 | QUASISYNCHRONOUS RESERVATION REQUESTS - Methods and apparatuses are presented for communicating using a shared communication medium. A request is sent in a request signal space where the request represents a code sequence that is a member of a set of code sequences. Each member is characterized by an autocorrelation function that has a peak centered at zero time offset. Each member is further characterized by a cross correlation function. The cross correlation function has a low correlation window having a width and surrounding a zero time offset. An assignment is received that assigns the request to a transmission opportunity in a scheduled transmission signal space. The assignment is made in response to detecting the code sequence from receiving multiple requests having relative timing offsets less than the width of the low correlation window. A data transmission is sent using the assigned transmission opportunity in the scheduled transmission signal space. | 12-11-2008 |
20110007646 | INTERFERENCE RESISTANT SATELLITE LINK POWER CONTROL USING DOWNLINK BEACON - A method for determining EIRP of user terminals in a satellite communication system comprises obtaining a frequency gain of a gateway at one or more frequencies, obtaining a path gain of the gateway for one or more signal paths, and obtaining a satellite beacon signal power at a receiver of the gateway. The method also comprises determining a target signal power at the gateway for one or more frequency channels, where the target signal power based at least in part on the frequency gain, the path gain, and the satellite beacon signal power. The method also comprises obtaining a message signal power at the gateway of a message from a user terminal, and determining the EIRP of the user terminal based at least in part on a difference between the target signal power and the message signal power. | 01-13-2011 |
20110009054 | TRANSMIT FREQUENCY PRECORRECTION FOR SATELLITE TERMINALS - A method for determining a frequency correction and a symbol rate correction for transmissions from a user terminal in a satellite communications system comprises determining a frequency of a signal received at the user terminal, and determining a symbol rate of the signal received at the user terminal. The method also comprises computing an error associated with an oscillator at an outdoor unit of the user terminal, and computing an error associated with an oscillator at an indoor unit of the user terminal. The method also comprises computing a transmit frequency correction for the user terminal based on the error of the oscillator at the outdoor unit and the error of the oscillator at the indoor unit, and computing a transmit symbol rate correction for the user terminal based on the error of the oscillator at the indoor unit. | 01-13-2011 |
20140145887 | DEVICE AND METHOD FOR REDUCING INTERFERENCE WITH ADJACENT SATELLITES USING A MECHANICALLY GIMBALED ASYMMETRICAL-APERTURE ANTENNA - Methods, apparatuses, and systems for two-way satellite communication and an asymmetric-aperture antenna for two-way satellite communication are disclosed. In one embodiment, a beam pattern for an asymmetric-aperture antenna is offset in a narrow beamwidth direction, and the offset beam pattern is directed by a mechanical gimbal, with the beam pattern offset made to reduce interference with an adjacent satellite. In additional embodiments, operational areas near the equator are identified for a given offset beam pattern, or a beam pattern offset may be adjusted over time to compensate for movement of the asymmetric-aperture antenna when attached to an airplane, boat, or other mobile vehicle. | 05-29-2014 |
Patent application number | Description | Published |
20100064354 | MAIDSAFE.NET - This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating resources and freedom by allowing users to anonymously and irrefutably be seen as genuine individuals on the network and to communicate with other users with total security and to securely access resources that are both their own and those that are shared by others with them. Further, this invention comprises a system of self healing data, secure messaging and a voting system to allow users to dictate the direction of development of the network, whereby adoption or denial of proposed add-ons to the network will be decided. System incompatibilities and security breaches on networks and the Internet are addressed by this invention where disparity and tangents of development have had an undue influence. The functional mechanisms that this invention provides will restore open communications and worry-free access in a manner that is very difficult to infect with viruses or cripple through denial of service attacks and spam messaging, plus, it will provide a foundation where vendor lock-in need not be an issue. | 03-11-2010 |
20130262865 | DISTRIBUTED FILE SYSTEMS - A method of providing a distributed file system allowing the storage of data comprising a plurality of directories and files arranged in a hierarchical structure on a key addressable storage system, the storage system being accessible by a plurality of users, the method comprising the steps of: storing data of a child directory on the storage system and creating a datamap which provides the at least one location of the stored data; assigning an identifier to the child directory and to a parent directory for the child directory; encrypting the datamap using both the child directory identifier and the parent directory identifier; and storing the encrypted datamap on the storage system using at least part of the child directory identifier as the key. | 10-03-2013 |
20140237614 | COMMUNICATION SYSTEM AND METHOD - There is provided a system, including a network that is defined by its novel approach to privacy, security and freedom for its users, namely privacy by allowing access anonymously, security by encrypting and obfuscating resources and freedom by allowing users to anonymously and irrefutably be seen as genuine individuals on the network and to communicate with other users with total security and to securely access resources that are both their own and those that are shared by others with them. Functional mechanisms that the system are able to restore open communications and worry-free access in a manner that is very difficult to infect with viruses or cripple through denial of service attacks and spam messaging; moreover, it will provide a foundation where vendor lock-in need not be an issue. | 08-21-2014 |
20150026474 | MANAGED AUTHENTICATION ON A DISTRIBUTED NETWORK - An authoritative computer network ( | 01-22-2015 |
Patent application number | Description | Published |
20100037060 | FILE SYSTEM AUTHENTICATION - The present invention relates to file system authentication and, in particular, authentication of users for accessing files stored on a serverless distributed or peer-to-peer file system. Its objective is to preserve the anonymity of the users and to provide secure and private storage of data for users on a serverless distributed file system. It provides a method of authenticating access to a distributed file system comprising the steps of; receiving a user identifier; retrieving an encrypted validation record identified by the user identifier; decrypting the encrypted validation record so as to provide decrypted information; and authenticating access to data in the distributed file system using the decrypted information. | 02-11-2010 |
20100058054 | MSSAN - This invention allows users to maximise their use of existing storage, processing power and network bandwidth resources. This is achieved through providing an enhanced level of data backup and restore that employs the initial encryption of data and storing one user's data on another user's hard drives through an anonymsing process. The efficiency of this process is enhanced when this invention is used in conjunction with self authentication which then provides the ability to log into a network anonymously from potentially anywhere. | 03-04-2010 |
20120210120 | SELF-ENCRYPTION PROCESS - This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating resources and freedom by allowing users to anonymously and irrefutably be seen as genuine individuals on the network and to communicate with other users with total security and to securely access resources that are both their own and those that are shared by others with them. The functional mechanisms that this invention provides will restore open communications and worry-free access in a manner that is very difficult to infect with viruses or cripple through denial of service attacks and spam messaging, plus, it will provide a foundation where vendor lock-in need not be an issue. | 08-16-2012 |
20120311339 | METHOD FOR STORING DATA ON A PEER-TO-PEER NETWORK - A method of storing data from a first node on a peer-to-peer network. The method includes creating a public and private key pair from a data item, determining a hash value for the public key, assigning the hash value as a user identifier for the user of the node, and storing the public key within a distributed hash table of the network. The user identifier corresponds to the key for the public key within the distributed hash table. The method includes the step of digitally signing the user identifier using the created private key. | 12-06-2012 |
20130061049 | DISTRIBUTED NETWORK SYSTEM - A method of storing data from a first node on a peer-to-peer network. The method includes creating a public and private key pair from a data item. The method also includes determining a hash value for the public key and assigning the hash value as a user identifier for the user of the node. The method also includes storing the public key within a distributed hash table of the peer-to-peer network. The user identifier corresponds to the key for the public key within the distributed hash table. | 03-07-2013 |