Intellectual Ventures I LLC Patent applications |
Patent application number | Title | Published |
20140218560 | FILE MANAGING METHOD FOR A DIGITAL APPARATUS - A file managing method for a digital apparatus includes (a) establishing a folder corresponding to a file type generated in an operational mode of the digital apparatus, and (b) storing a file according to its file type to the folder corresponding to the file type established in step (a). | 08-07-2014 |
20140201850 | METHODS AND SYSTEMS FOR PROVIDING ACCESS CONTROL TO SECURED DATA - In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion. | 07-17-2014 |
20140141859 | METHOD AND APPARATUS FOR SLOT-MACHINE GAMING - A gaming apparatus, such as a slot machine, that randomly determines a combination of symbols and pays prizes according to a determined payout table, is used to perform a gaming method similar to conventional slot machine play, but that permits greater interaction with the player. The gaming method provides the player with the option of increasing an amount wagered after at least one of the symbols has been determined. The method additionally provides the player with the option to randomly determine a symbol or symbols a second time, or to force a symbol to be the same as a symbol already determined, optionally at additional cost. The method includes making appropriate adjustments to a payout table, depending on the player's actions during game play. | 05-22-2014 |
20140133378 | POWER MANAGEMENT FOR WIRELESS DIRECT LINK - Disclosed herein are exemplary techniques for managing power in a direct wireless link between two wireless devices. The present disclosure provides at least three direct link power management techniques: Fast Resumption Mode (FRM) wherein the direct link is resumed automatically at a specified timing synchronization function (TSF); Slow Resumption Mode (SRM) wherein the direct link may be resumed by sending a Resume-Request via the access point; and Reverse Polling (RP), wherein one peer station of the direct link is continually awake and the other peer station uses reverse polling to start a service period. Thus, a method for power management of a direct wireless link between two wireless devices is disclosed. The method comprising the steps of establishing a direct wireless link between the first wireless device and the second wireless device; transmitting, from a first wireless device, a frame having a time value; receiving, at the second wireless device, the frame from the first wireless device; suspending the direct wireless link a duration determined based on the time value; and resuming the direct wireless link at a time determined based on the time value. | 05-15-2014 |
20140101457 | METHOD AND SYSTEM FOR PROVIDING DOCUMENT RETENTION USING CRYPTOGRAPHY - Techniques for utilizing security criteria to implement document retention for electronic documents are disclosed. The security criteria can also limit when, how and where access to the electronic documents is permitted. The security criteria can pertain to keys (or ciphers) used to secure (e.g., encrypt) electronic files (namely, electronic documents), or to unsecure (e.g., decrypt) electronic files already secured. At least a portion of the security criteria can be used to implement document retention, namely, a document retention policy. After a secured electronic document has been retained for the duration of the document retention policy, the associated security criteria becomes no longer available, thus preventing subsequent access to the secured electronic document. In other words, access restrictions on electronic documents can be used to prevent access to electronic documents which are no longer to be retained. | 04-10-2014 |
20140075206 | METHODS AND SYSTEMS FOR PROVIDING ACCESS CONTROL TO SECURED DATA - In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion. | 03-13-2014 |
20140059238 | STREAMING MEDIA - A method for providing a session invitation protocol (SIP) session between a first and a second entity. An SIP session is established between the first and second entity. At least one media stream is transmitted from the first entity to the second entity. At least one of transmission, storage and play back of the at least one media stream is controlled in the SIP session at the first and/or second entity. | 02-27-2014 |
20140056133 | METHOD AND ARRANGEMENT FOR TRANSFERRING INFORMATION IN A PACKET RADIO SERVICE - A method and an arrangement for transferring information including delay sensitive data, such as speech and video data, in a packet radio service is provided. Data blocks are transmitted from a mobile station to a radio resource entity during a first active data transfer period using an uplink temporary block flow (TBF) connection. The uplink TBF connection is maintained during a passive period that follows the first active data transfer period, wherein during the passive period the mobile station does not send data blocks to the radio resource entity. | 02-27-2014 |
20140052778 | METHOD AND APPARATUS FOR MAPPING A SITE ON A WIDE AREA NETWORK - A method and system for organizing and displaying information about Internet Web pages on Web maps are disclosed. Web maps display a summary of the information that a Web page provides access to, in a format that facilitates a rapid assessment of what may be accessed through a Web site's home page, or through any Web page on the Web site. Preferably, Web maps are displayed on a Web page, or within a frame of a Web page, by an Internet browser application. A set of Web maps may be automatically generated by a search engine or directory in response to a user's search request. Alternatively, a user may request that a Web map be produced for a particular Web page of interest. The Web maps are preferably generated by a Web server, or by an application running in the background of a user's computer, so that the user may perform other tasks on the user's computer while the Web maps are being generated. | 02-20-2014 |
20140045490 | RECOVERY TECHNIQUES IN MOBILE NETWORKS - A technique for protecting location information of a subscriber in a mobile network is disclosed. A User Mobility Server (UMS) receives a first query from a first call state control function (CSCF). The UMS transmits a call setup and a subscriber identity to a servicing-call state control function (S-CSCF). The S-CSCF may have no record of the subscriber identity due to a restart are some other event. The UMS receives a second query from the S-CSCF based in part of the subscriber identity. The UMS transmits a home address of a mobile station to the S-CSCF. The UMS may also transmit a profile download to the S-CSCF. | 02-13-2014 |
20140029433 | SYMMETRIC TRANSMIT OPPORTUNITY (TXOP) TRUNCATION - Various embodiments of symmetric transmit opportunity (TXOP) truncation (STT) systems and methods are disclosed. One method embodiment, among others, comprises receiving a frame that truncates a TXOP around a first station, and responsive to receiving the frame, sending a second frame that truncates the TXOP around a second station. Others system and method embodiments are disclosed. | 01-30-2014 |
20140012609 | TRANSMISSION OF AUTHORIZATION INFORMATION - The present invention relates to a method for utilizing a mobile station for the transmission of authorization information requiring verification in a telecommunication network comprising the mobile station. In the method, the information to be verified is transmitted to the mobile station, the authorization information transmitted is presented on the display of the mobile station, the authorization information presented is read from the display of the mobile station, and the authenticity of the authorization information thus read is verified. According to the invention, the authorization information is sent in a form comprising information to be presented in a graphic form, and the authorization information is presented on the display of the mobile station using a user-independent function of the mobile station in question for the presentation of graphic information. | 01-09-2014 |
20130326019 | Method and apparatus for data file transfer using destination linked directories - A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a request for a confirmation receipt from a third party authenticator authenticating the attributes of a file; a transferring system that transfers attributes of at least one file to be authenticated to the third party authenticator from the device that requested the confirmation; and a receiving system that receives the confirmation receipt comprising authenticated file attributes, after authentication by the third party authenticator; wherein, at least one file authentication is received from the third party authenticator. Corresponding processing devices, media, systems and methods are also provided. | 12-05-2013 |
20130227212 | REFRESH REQUEST QUEUING CIRCUITRY - An apparatus and system associated with memory are disclosed herein. In various embodiments, an apparatus may include first circuitry to determine a number of queued pending refresh requests for a memory bank based on a comparison of a count from a refresh-request counter to a count from a refresh-address counter; and second circuitry to set a refresh flag in response to a determination that the number of queued pending refresh requests exceeds a predetermined number. Other embodiments may be disclosed and/or claimed. | 08-29-2013 |
20130223418 | RF Sniffer - Systems and methods wirelessly communicate data over a plurality of cellular channels by sniffing for available frequency channels; requesting an allocation of preferably adjacent cellular frequency channels from a mobile station to a base station; and allocating available frequency channels in response to the request from the mobile station. | 08-29-2013 |
20130165109 | RECOVERY TECHNIQUES IN MOBILE NETWORKS - A technique for protecting location information of a subscriber in a mobile network is disclosed. A User Mobility Server (UMS) receives a first query from a first call state control function (CSCF). The UMS transmits a call setup and a subscriber identity to a servicing-call state control function (S-CSCF). The S-CSCF may have no record of the subscriber identity due to a restart are some other event. The UMS receives a second query from the S-CSCF based in part of the subscriber identity. The UMS transmits a home address of a mobile station to the S-CSCF. The UMS may also transmit a profile download to the S-CSCF. | 06-27-2013 |
20130100889 | COLLISION AVOIDANCE SYSTEMS AND METHODS - Disclosed herein are various embodiments of collision avoidance systems and methods. One method embodiment, among others, comprises a client sending an end of transmission (EOT) request to an access point (AP), and responsive to the EOT request, the AP responding with an EOT frame. | 04-25-2013 |
20130073597 | FILE TRANSFER SYSTEM - A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a request for a confirmation receipt from a third party authenticator authenticating the attributes of a file; a transferring system that transfers attributes of at least one file to be authenticated to the third party authenticator from the device that requested the confirmation; and a receiving system that receives the confirmation receipt comprising authenticated file attributes, after authentication by the third party authenticator; wherein, at least one file authentication is received from the third party authenticator. Corresponding processing devices, media, systems and methods are also provided. | 03-21-2013 |
20130022059 | DUAL MODE COMMUNICATION SYSTEMS AND METHODS - Embodiments of dual mode communication systems and methods are disclosed. On system embodiment, among others, comprises logic configured to perform spatial multiplexing and expanded bandwidth signaling to data. | 01-24-2013 |
20120289038 | SEMICONDUCTOR DEVICE HAVING CONTROLLABLE TRANSISTOR THRESHOLD VOLTAGE - In an embodiment, a semiconductor device includes a single-layer gate nonvolatile memory in which a floating gate is formed on a semiconductor substrate. The floating gate is formed above a diffusion layer serving as a control gate of the nonvolatile memory. The diffusion layer may be insulated from the semiconductor substrate by an insulating film such as a silicon oxide film. A pair of diffusion layers may be formed in surface regions of the semiconductor substrate on the two sides of the floating gate extending on a tunnel oxide film in an embodiment. The configuration described herein may realize a reliable semiconductor device in a low-cost process, may have a control gate which may withstand a high voltage applied when data is erased or written, and may prevent an operation error by minimizing variations in the threshold value, in some embodiments. | 11-15-2012 |
20120257527 | TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) PACKET-CENTRIC WIRELESS POINT TO MULTI-POINT (PtMP) TRANSMISSION SYSTEM ARCHITECTURE - A packet-centric wireless system includes: a wireless base station communicating via a transmission control protocol/internet protocol (TCP/IP) to a first data network; one or more host workstations communicating via TCP/IP to the first data network; one or more subscriber customer premise equipment (CPE) stations coupled with the wireless base station over a shared bandwidth via TCP/IP over a wireless medium; and one or more subscriber workstations coupled via TCP/IP to each of the subscriber CPE stations over a second network. The system can allocate shared bandwidth among the subscriber CPE stations to optimize end-user quality of service (QoS). The first data network includes at least one of: a wireline network; a wireless network; a local area network (LAN); and a wide area network (WAN). The second network includes at least one of: a wireline network; a wireless network; a local area network (LAN); and a wide area network (WAN). | 10-11-2012 |
20120246419 | CONCURRENT MEMORY BANK ACCESS AND REFRESH REQUEST QUEUING - An apparatus and system associated with memory are disclosed herein. In various embodiments, an apparatus may include first circuitry configured to queue pending refresh requests for a plurality of memory banks; and second circuitry coupled to the first circuitry and configured to set a refresh flag in response to a determination that a number of queued pending refresh requests for a memory bank from the plurality of memory banks exceeds a predetermined number. Other embodiments may be disclosed and/or claimed. | 09-27-2012 |
20120204171 | Method for Distributing Content to a User Station - A non-transitory computer-readable storage medium having stored thereon computer-executable instructions that, in response to being executed by a computing device, cause the computing device to perform operations including upon occurrence of a scheduled time, polling an update distribution server to determine that an update for a computer executable software application is available, the computer executable software application configured to operate on the computing device and in response to determining that the update is available, obtaining the update over the Internet from the update distribution server, and selecting whether to install the update at a first time or to defer installing the update until a second time that is later than the first time. | 08-09-2012 |
20120188260 | GRAPHICS CONTROLLER INTEGRATED CIRCUIT WITHOUT MEMORY INTERFACE - A CMOS integrated circuit that comprises a graphics controller system that consists of a graphics engine and video memory together with some interface blocks, a PCMCIA host adapter, an infrared interface for generating video images on a LCD or CRT display unit, and a video stream interface for receiving video signals. Since the video memory is integrated on the same integrated circuit as the graphics controller, no package pins are required for the memory interface. The pins thus saved are used to provide access to an on-chip PCMCIA host adapter. The internal memory interface is 128 bits wide. Simultaneous performance improvement and power dissipation reduction is achieved because of the wide memory interface and the elimination of the large parasitic capacitances associated with a package pin connection. | 07-26-2012 |
20120173864 | FLEXIBLE MULTI-PROCESSING SYSTEM - A processor includes a scalar computation unit; a vector co-processor coupled to the scalar computation unit; and one or more function-specific engines coupled to the scalar computation unit, the engines adapted to minimize data exchange penalties by processing small in-out bit slices. | 07-05-2012 |
20120124164 | Method and apparatus for data file transfer using destination linked directories - A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a request for a confirmation receipt from a third party authenticator authenticating the attributes of a file; a transferring system that transfers attributes of at least one file to be authenticated to the third party authenticator from the device that requested the confirmation; and a receiving system that receives the confirmation receipt comprising authenticated file attributes, after authentication by the third party authenticator; wherein, at least one file authentication is received from the third party authenticator. Corresponding processing devices, media, systems and methods are also provided. | 05-17-2012 |
20120011411 | ON-CHIP SERVICE PROCESSOR - An integrated circuit is described that includes a stored program processor for test and debug of user-definable logic plus external interface between the test/debug circuits and the component pins. The external interface may be via an existing test interface or a separate serial or parallel port. Test and debug circuits may contain scan strings that may be used to observe states in user-definable logic or be used to provide pseudo-random bit sequences to user-definable logic. Test and debug circuits may also contain an on-chip logic analyzer for capturing sequences of logic states in user-definable circuits. Test and debug circuits may be designed to observe states in user-definable circuits during the normal system operation of said user-definable circuits. | 01-12-2012 |
20110231669 | Computer Virus Protection - A network is protected from e-mail viruses through the use of a sacrificial server. Any executable programs or other suspicious parts of incoming e-mail messages are forwarded to a sacrificial server, where they are converted to non-executable format such as Adobe Acrobat PDF and sent to the recipient. The sacrificial server is then checked for virus activity. After the execution is completed, the sacrificial server is rebooted. | 09-22-2011 |