Patent application number | Description | Published |
20100085562 | Prismatic Lock And Key Security - Methods and apparatus for lock and key security, the lock including a light receptacle, a scatter pattern detecting module, and a locking mechanism, the key including a light source and a prism, the lock and key security including receiving, in the light receptacle of the lock, light transmitted by the light source in the key through the prism; identifying, by the scatter pattern detecting module, a scatter pattern of the received light; comparing, by the scatter pattern detecting module, the scatter pattern to a unique preauthorized pattern for operating the lock; if the scatter pattern matches the unique preauthorized pattern, switching, by the scatter pattern detecting module, the current locking state of the locking mechanism; and if the scatter pattern does not match the unique preauthorized pattern, maintaining the current locking state of the locking mechanism. | 04-08-2010 |
20120182437 | GENERATING STILL IMAGES AND VIDEO BY CAPTURE OF IMAGES PROJECTED BY LIGHT PASSING THROUGH A DISPLAY SCREEN - Methods and systems for generating still images and video by capture of images projected by light passing through a display screen are disclosed. According to an aspect, a method includes controlling light emitting components of a display screen to activate in a sequence for displaying a sequence of images. For example, in an organic light emitting diode (OLED) display screen, the method may include controlling a subset of the display screen OLEDs to activate in sequence to display a sequence of images. The displayed sequence of images may appear to a viewer of the display screen to be a still image or a video. The method may control light emitting components different subsets of the LEDs to be activated in the sequence, such that different areas of the display screen display images in each part of the sequence. | 07-19-2012 |
20120205433 | COMMUNICATION OF TRANSACTION DATA WITHIN A SELF-CHECKOUT ENVIRONMENT - Systems and method for communication of transaction data within a self-checkout environment are disclosed. According to an aspect, a method includes controlling a display device to display a machine-readable representation of transaction data. The method may include receiving a signal that indicates acknowledgement of reading of the machine-readable representation of the transaction data. Further, the method may include controlling the display device to display a machine-readable representation of other transaction data in response to receipt of the signal. | 08-16-2012 |
20120284383 | CLOUD WORKLOAD MANAGEMENT WITH AUTOMATED WORKLOAD BIDDING - A computer program product is provided for managing workload in a computer system. Computer usable program code cause a first compute node to broadcast a workload bid request to a plurality of compute nodes, wherein the workload bid request includes workload parameters. The compute nodes each receive the request from the first compute node, and each compute node uses the workload parameters to calculate a cost of running the workload. One or more individual compute nodes within the plurality of compute nodes send a workload bid to the first compute node, wherein each workload bid includes the cost of running the workload on the individual compute node sending the workload bid. The first compute node receives and uses each workload bid to select a target compute node to run the workload, wherein the target compute node is selected from the individual compute nodes and the first compute node. | 11-08-2012 |
20120284410 | CLOUD WORKLOAD MANAGEMENT WITH AUTOMATED WORKLOAD BIDDING - A computer-implemented method for workload management in a computer system is provided. According to the method, a first compute node broadcasts a workload bid request to a plurality of compute nodes, wherein the workload bid request includes workload parameters characterizing the workload. The plurality of compute nodes each receive the workload bid request from the first compute node, and each of the plurality of compute nodes uses the workload parameters included in the workload bid request to calculate a cost of running the workload. One or more individual compute nodes within the plurality of compute nodes each send a workload bid to the first compute node, wherein each workload bid includes the cost of running the workload on the individual compute node sending the workload bid. The first compute node receives each workload bid and selects a target compute node to run the workload. | 11-08-2012 |
20130009758 | Tactile Visual Indicator - A tactile visual indicator and methods, apparatuses, and computer program products for controlling a tactile visual indicator are provided. Embodiments include a light source; an electromagnetically inductive wound coil; and a light pipe coupled to a ferromagnetic-metal jacket surrounding the outside of the light pipe. The ferromagnetic-metal jacket is within the wound coil and one end of the light pipe is provided to the light source. The light pipe and the ferromagnetic-metal jacket are configured to move within the wound coil in response to the coil receiving power. Light shining through the light pipe from the light source provides a visual indication of a status and the movement of the light pipe and jacket within the wound coil provides a tactile indication of the status via contact with a user. | 01-10-2013 |
20130080669 | Dynamically Determining A Primary Or Slave Assignment Based On An Order Of Cable Connection Between Two Devices - Methods, apparatuses, and computer program products for dynamically determining a primary or slave assignment based on an order of cable connection between two devices are provided. Embodiments include detecting, by a first device, insertion of one end of a cable into a port of the first device; determining, by the first device, whether a power signal is received from the cable at the port of the first device; if the power signal is received, performing, by the first device, a data transfer operation over the cable as a slave device to a second device that is coupled to the other end of the cable; and if the power signal is not received, performing, by the first device, a data transfer operation over the cable as a primary device to the second device that is coupled to the other end of the cable. | 03-28-2013 |
20130111495 | Load Balancing Servers | 05-02-2013 |
20130162241 | DETECTING MALICIOUS HARDWARE BY MEASURING RADIO FREQUENCY EMISSIONS - A method of testing an electronic device comprises measuring radio frequency emissions at a plurality of positions relative to a trusted unit of a particular electronic device during operation of the trusted unit, and measuring radio frequency emissions at the same plurality of positions relative to a second unit of the particular electronic device. For each of the plurality of positions, the radio frequency emissions measured from the second unit are compared to the radio frequency emissions measured from the trusted unit. The method then determines whether there is any frequency at which the measured amplitude of the radio frequency emissions from the second unit and the measured amplitude of the radio frequency emissions from the trusted unit exhibit a statistically significant difference. | 06-27-2013 |
20130214897 | Prismatic Lock And Key Security - Methods and apparatus for lock and key security, the lock including a light receptacle, a scatter pattern detecting module, and a locking mechanism, the key including a light source and a prism, the lock and key security including receiving, in the light receptacle of the lock, light transmitted by the light source in the key through the prism; identifying, by the scatter pattern detecting module, a scatter pattern of the received light; comparing, by the scatter pattern detecting module, the scatter pattern to a unique preauthorized pattern for operating the lock; if the scatter pattern matches the unique preauthorized pattern, switching, by the scatter pattern detecting module, the current locking state of the locking mechanism; and if the scatter pattern does not match the unique preauthorized pattern, maintaining the current locking state of the locking mechanism. | 08-22-2013 |
20140086430 | REMOVING NETWORK DELAY IN A LIVE BROADCAST - A first stream of audio data is received a into a data store. Excess pauses are identified in the audio data. A second stream of audio data is transmitted from the data store comprising the first stream of audio data with the excess pause removed, the second stream of audio data transmitted after a delay that is approximately equal to but no less than the duration of the removed excess pause. | 03-27-2014 |
20140088745 | REMOVING NETWORK DELAY IN A LIVE BROADCAST - A first stream of audio data is received a into a data store. Excess pauses are identified in the audio data. A second stream of audio data is transmitted from the data store comprising the first stream of audio data with the excess pause removed, the second stream of audio data transmitted after a delay that is approximately equal to but no less than the duration of the removed excess pause. | 03-27-2014 |