Patent application number | Description | Published |
20080232285 | Method and apparatus for real time scheduling of traffic in wireless networks - A method for scheduling of traffic in wireless networks, whereas said network comprises real-time stations intending to send real-time traffic and best-effort stations sending best effort traffic, said method comprising: | 09-25-2008 |
20090198617 | Method and apparatus for performing delegated transactions - A computer implemented method for enabling a third party by a user to execute a transaction on behalf of the user, said method comprising:
| 08-06-2009 |
20090257368 | RADIO TERMINAL, RADIO COMMUNICATION SYSTEM, AND RADIO COMMUNICATION METHOD - A radio terminal includes a radio interface configured to allow radio communication with a radio base station, and a controller configured to control switching between a wake-up state in which the radio interface is turned on and a sleep state in which the radio interface is turned off. The radio terminal acquires a reference wake-up timing scheduled as a wake-up timing for switching from the sleep state to the wake-up state. The controller shifts the wake-up timing from the reference wake-up timing. | 10-15-2009 |
20090257369 | RADIO TERMINAL, RADIO BASE STATION, AND RADIO COMMUNICATION SYSTEM - A radio terminal includes: a controller configured to control switching between a wake-up state in which a radio interface is turned on and a sleep-state in which the radio interface if turned off; a battery configured to accumulate electric power to be supplied to the radio interface; a remaining battery amount acquiring unit configured to acquiring a remaining battery amount being a remaining amount of electric power accumulated in the battery. The controller performs switching from the sleep state to the wake-up state, according to a communication order where own radio terminal performs radio communication. The own-terminal communication order is scheduled based on the remaining battery amount. | 10-15-2009 |
Patent application number | Description | Published |
20110219423 | METHOD AND APPARATUS FOR TRIGGERING USER COMMUNICATIONS BASED ON PRIVACY INFORMATION - An approach is provided for protecting a user identity in communication based on privacy information. The privacy engine selects one or more parameters associated with a privacy metric. Next, the privacy engine determines the parameters in a communication environment, the communication environment including a user device and a plurality of other devices. Next, the privacy engine computes a privacy level based, at least in part, on the parameters and the privacy metric. Next, the privacy engine compares the computed privacy level against a predetermined privacy level. Then, the privacy engine triggers a communication to one or more of the other devices in the communication environment based, at least in part, on the comparison. | 09-08-2011 |
20120215845 | METHOD AND APPARATUS FOR PRESERVING PRIVACY FOR APPOINTMENT SCHEDULING - An approach is provided for preserving privacy for appointment scheduling. A scheduling platform receives a request to schedule an appointment among one or more users. The scheduling platform determines availability information for the one or more users from one or more respective devices, wherein the availability information is encrypted using homomorphic encryption. The scheduling platform then processes and/or facilitates a processing of the availability information using, at least in part, one or more homomorphic functions to determine one or more recommended time slots for the appointment. | 08-23-2012 |
20130174211 | Method And Apparatus Providing Privacy Setting And Monitoring User Interface - A method and an apparatus provide for operating a user interface of a device to receive from a user, for individual ones of a plurality of user privacy categories, a user privacy setting; to map each user privacy setting to one or more device sensors to form a sensor policy for the user privacy category; and to monitor application program accesses to device sensors to detect a violation of a sensor policy. An aspect of the exemplary embodiments of this invention is the user interface that can represent privacy levels of each application program to the user in a “user-friendly” format. Another aspect of the exemplary embodiments is to provide the user device with an ability to detect and act on or at least report privacy violations by the application programs. | 07-04-2013 |
20130185804 | METHOD AND APPARATUS FOR GENERATING PRIVACY RATINGS FOR APPLICATIONS - An approach is provided for generating privacy ratings for applications. A privacy ratings platform determines use information associated with one or more applications executing on one or more devices. By way of example, the use information is determined based, at least in part, on usage data associated with one or more input sources, one or more components, one or more categories of personal information, or a combination thereof associated with the one or more devices. The privacy ratings platform then processes and/or facilitates a processing of the use information to determine one or more privacy ratings for the one or more applications. | 07-18-2013 |
20130198849 | Method And Apparatus Providing Privacy Benchmarking For Mobile Application Development - A method operates, during development of an application program intended to be run on a mobile user device, to perform a computer assisted analysis of the application program to determine at least one user privacy-related aspect of the application program; and to present the determined at least one user privacy-related aspect. The determined at least one user privacy-related aspect may be presented to a developer of the application program An apparatus and system for performing the method are also disclosed. | 08-01-2013 |
20140081980 | METHOD AND APPARATUS FOR ACCESSING AND DISPLAYING PRIVATE USER INFORMATION - Methods and apparatuses are provided for accessing and displaying private user information. A privacy-preserving overlay platform determines a request, from at least one application, for user data. The privacy-preserving overlay platform processes and/or facilitates a processing of the data to generate at least one index value of the data. Further, the privacy-preserving overlay platform causes, at least in part, a return of the at least one index value to the at least one application in response to the request. | 03-20-2014 |
Patent application number | Description | Published |
20130238897 | METHOD AND APPARATUS FOR PROVIDING EFFICIENT MANAGEMENT OF CERTIFICATE REVOCATION - A method for providing efficient management of certificate revocation may comprise storing a list of identifiers of digital certificates including a revocation list defining a list of revoked certificates in an accumulator, storing a witness value in association with at least some entries in the revocation list in which the witness value provides proof of the membership or non-membership of an identifier in the revocation list, enabling generation of a new accumulator and a new witness value responsive to each insertion or deletion of an entry in the revocation list, and enabling batch updates to the revocation list using a reduced bitlength value generated based on to a ratio of a value generated based on elements added to the revocation list to a value generated based on elements deleted from the revocation list. A corresponding apparatus is also provided. A method for certificate authorities (CA) that use Bloom filters for certificate revocation list (CRL) compression that enables the CA to hash only the entry that is to be un-revoked so that a good compression rate may be provided while avoiding computation of the entire CRL for each un-revocation. | 09-12-2013 |
20130344884 | Methods And Apparatus For Reporting Location Privacy - Privacy evaluation in a mobile electronic device. Location data collected by one or more applications operating on the electronic device is evaluated to determine the precision with which a user's location and movements can be reconstructed based on the location data collected by one or more of the applications. Information relating to such precision may be presented to the user, suitably by a graphic display representing a circle or ellipse within which the user's movement cannot be determined or a set of streets within which the user's movement cannot be determined. | 12-26-2013 |
20140006616 | METHOD AND APPARATUS FOR CATEGORIZING APPLICATION ACCESS REQUESTS ON A DEVICE | 01-02-2014 |
20150113664 | Preventing Unintentionally Violating Privacy When Sharing and/or Publishing Content - Embodiments of this invention relate to the field of sharing and publishing content. It is inter-alia disclosed to obtain content at a device, to determine whether or not the content is associated with at least one potentially sensitive entity and, in case that it is determined that the content is associated with at least one potentially sensitive entity, non-modally notifying a user of the device that the content is associated with at least one potentially sensitive entity and/or preventing an at least unintentional sharing and/or publishing of the content by a user of the device. | 04-23-2015 |
20150261960 | METHOD AND APPARATUS PROVIDING PRIVACY BENCHMARKING FOR MOBILE APPLICATION DEVELOPMENT - A method operates, during development of an application program intended to be run on a mobile user device, to perform a computer assisted analysis of the application program to determine at least one user privacy-related aspect of the application program; and to present the determined at least one user privacy-related aspect. The determined at least one user privacy-related aspect may be presented to a developer of the application program An apparatus and system for performing the method are also disclosed. | 09-17-2015 |
Patent application number | Description | Published |
20100215484 | TURBINE ENERGY GENERATING SYSTEM - A turbine energy generating system includes a combustion chamber for converting fuel into energy by igniting an air and fuel mixture, a turbine for converting energy produced by the combustion chamber into mechanical energy, and a generator for converting mechanical energy produced by the turbine into electrical energy in the range of 1 to 15 kilowatts. | 08-26-2010 |
20120085611 | ENERGY RECOVERY SYSTEM - An energy recovery system including a device that produces a magnetic field adapted for mounting to a vehicle and a stationary conductor adapted for placing in or adjacent the path of the vehicle wherein the magnetic field induces current to flow through the conductor when the vehicle moves past the conductor. The vehicle may be an automobile, a truck, a train, or other type of vehicle. When used in conjunction with a train, the energy recovery system may be designed to recover energy from non-locomotive train cars in addition to, or in lieu of, the train locomotive. Kinetic energy that would otherwise be lost to heat energy through the application of brakes to the non-locomotive cars can thereby be recovered and re-used. | 04-12-2012 |
20120280503 | EXHAUST ENERGY RECOVERY SYSTEM - An energy recovery system includes a fan and a wind turbine adapted to mount adjacent the fan to recover energy from the air flow generated by the fan. | 11-08-2012 |
Patent application number | Description | Published |
20130088584 | IRIS CAMERAS - An iris camera for capturing an image of an iris of a user is described. The iris camera comprises: a lens; an image sensor for capturing an image produced by the lens; a processor for analysing the degree of focus of successive images produced by the sensor and for controlling a lens position adjustment motor to move the lens to a position where a subsequent captured image potentially has an increased degree of focus; and a proximity sensor for providing an initial measurement of the distance between the lens and the user. The processor is arranged to user the initial distance measurement obtained by the proximity sensor as a starting point for capturing images of the iris to effect a fine-focus adjustment. | 04-11-2013 |
20130089236 | Iris Recognition Systems - The present invention concerns a method for capturing an image of an iris free of specularities from a spectacle-wearing user for use in an iris recognition identification system, which includes an illumination source and an image capture device. The method comprises illuminating the user's eye from a first illumination position associated with a first optical path, and capturing a first image of the eye; and determining if the first image comprises a specular image in a first region of interest, the specular image being formed by light reflected from the spectacles. If a specular image is present, the method further comprises illuminating the eye from a second illumination position associated with a second optical path different to the first optical path, such that the specular image is shifted to a second region; and capturing a second image of the eye. | 04-11-2013 |
20130089241 | SECURITY IMPROVEMENTS FOR IRIS RECOGNITION SYSTEMS - A method of verifying the authenticity of an eye provided for identification purposes in an iris recognition identification system is described. The method comprises: illuminating the eye using an illumination source to generate a specular reflection in a pupil and/or iris region of the eye, the specular reflection forming as a result of light emitted from the illumination source being reflected from the eye; capturing an image of the eye including the specular reflection; determining the position of the specular reflection formed in the pupil and/or iris region, from the captured image; and verifying the authenticity of the eye by comparing the determined position with an expected position for an authentic eye. | 04-11-2013 |
20130147603 | Iris Cameras - The present invention relates to a method for authenticating a transaction using a biometric identifier and a portable data store. The method comprises: generating a first bit pattern of a user's iris from a captured image of the user's iris; accessing a user profile stored on the portable data store, the user profile comprising a pre-stored second bit pattern of an authentic user's iris; comparing the first and second bit patterns; and generating an authentication signal to authenticate the transaction, when the first and second bit patterns are equivalent. In addition, the present invention relates to apparatus for carrying out the present method. | 06-13-2013 |
Patent application number | Description | Published |
20090054475 | HETEROCYCLIC RECEPTOR AGONISTS FOR THE TREATMENT OF DIABETES AND METABOLIC DISORDERS - Compounds and methods are provided for the treatment of, inter alia, Type II diabetes and other diseases associated with poor glycemic control. The compounds of the invention are orally active. | 02-26-2009 |
20090137590 | N-LINKED HETEROCYCLIC RECEPTOR AGONISTS FOR THE TREATMENT OF DIABETES AND METABOLIC DISORDERS - Compounds and methods are provided for the treatment of, inter alia, Type II diabetes and other diseases associated with poor glycemic control. | 05-28-2009 |
20100087465 | HETEROCYCLIC RECEPTOR AGONISTS FOR THE TREATMENT OF DIABETES AND METABOLIC DISORDERS - Compounds and methods are provided for the treatment of, inter alia, Type II diabetes and other diseases associated with poor glycemic control. The compounds of the invention are orally active. | 04-08-2010 |
20100130511 | HETEROCYCLIC RECEPTOR AGONISTS FOR THE TREATMENT OF DIABETES AND METABOLIC DISORDERS - Compounds and methods are provided for the treatment of, inter alia, Type II diabetes and other diseases associated with poor glycemic control. The compounds of the invention are orally active. | 05-27-2010 |
20100216827 | ARYL GPR120 RECEPTOR AGONISTS AND USES THEREOF - Aryl GPR120 agonists are provided. These compounds are useful for the treatment of metabolic diseases, including Type II diabetes and diseases associated with poor glycemic control. | 08-26-2010 |
20120322804 | N-LINKED HETEROCYCLIC RECEPTOR AGONISTS FOR THE TREATMENT OF DIABETES AND METABOLIC DISORDERS - Compounds and methods are provided for the treatment of, inter alia, Type II diabetes and other diseases associated with poor glycemic control. | 12-20-2012 |
20130059845 | BICYCLIC AGONISTS OF GPR131 AND USES THEREOF - The present disclosure relates to compounds that act as agonists of, or otherwise modulate the activity of, GPR131 and to their use in the treatment of various diseases. In particular embodiments, the structure of the compounds is given by Formula I: | 03-07-2013 |
20130059856 | AGONISTS OF GPR131 AND USES THEREOF - Chemical compounds which act as agonists of, or otherwise modulate the activity of, GPR131 are disclosed. Related compositions, formulations and methods of use are also described. | 03-07-2013 |
20130281691 | HETEROCYCLIC RECEPTOR AGONISTS FOR THE TREATMENT OF DIABETES AND METABOLIC DISORDERS - Compounds and methods are provided for the treatment of, inter alia, Type II diabetes and other diseases associated with poor glycemic control. The compounds of the invention are orally active. | 10-24-2013 |
20140024830 | HETEROCYCLIC RECEPTOR AGONISTS FOR THE TREATMENT OF DIABETES AND METABOLIC DISORDERS - Compounds and methods are provided for the treatment of, inter alia, Type II diabetes and other diseases associated with poor glycemic control. The compounds of the invention are orally active. | 01-23-2014 |
20140121246 | GPR120 RECEPTOR AGONISTS AND USES THEREOF - GPR120 agonists are provided. These compounds are useful for the treatment of metabolic diseases, including Type II diabetes and diseases associated with poor glycemic control. | 05-01-2014 |
20150239881 | HETEROCYCLIC RECEPTOR AGONISTS FOR THE TREATMENT OF DIABETES AND METABOLIC DISORDERS - Compounds and methods are provided for the treatment of, inter alia, Type II diabetes and other diseases associated with poor glycemic control. The compounds of the invention are orally active. | 08-27-2015 |