Patent application number | Description | Published |
20080304605 | METHOD OF PROVIDING A DATA SIGNAL FOR CHANNEL ESTIMATION AND CIRCUIT THEREOF - A received signal having pilots is converted to a first signal in the frequency domain having the pilots. The pilots are extracted from the first signal to obtain extracted pilots to form a second signal. The second signal is used to provide a first estimate of a channel. The first estimate is converted to the time domain. Noise is removed from the first estimate in the time domain to provide a second estimate of the channel in the time domain. An autocorrelation of the channel in the frequency domain is determined using the second estimate of the channel. Extension signals are determined using the autocorrelation. The extension signals are appended to the first estimate of the channel to obtain a third estimate of the channel. The third estimate is used to provide a data signal in the frequency domain. | 12-11-2008 |
20100061468 | METHOD FOR ESTIMATING CHANNEL STATISTICS IN AN OFDM RECEIVER - A method of estimating channel statistics includes storing a plurality of pilot symbols from a plurality of received signals, establishing a reference for correlation; computing instantaneous correlations for each time lag of each of the plurality of pilot symbols relative to the reference, providing a table comprising non-isotropic scattering correlation values, computing current refined correlations using previous refined correlations and instantaneous correlations, comparing current refined correlations to the table of correlation values, and choosing correlation values from the table based on the step of comparing current refined correlations to the table. | 03-11-2010 |
20130021973 | CELL IDENTIFIER ENCODING AND DECODING METHODS AND APPARATUS - In an embodiment, a wireless communication system ( | 01-24-2013 |
20130034017 | TECHNIQUES FOR IMPROVING CHANNEL ESTIMATION AND TRACKING IN A WIRELESS COMMUNICATION SYSTEM - A technique for performing channel tracking and/or channel estimation in a wireless communication device includes receiving a reference signal and one or more non-error propagation physical channel signals. In general, the one or more non-error propagation physical channel signals must be correctly decoded before a data channel can be decoded. Channel tracking and/or channel estimation are/is then performed based on the reference signal and at least one of the one or more non-error propagation physical channel signals. | 02-07-2013 |
20160043850 | Techniques for Improving Channel Estimation and Tracking in a Wireless Communication System - A technique for performing channel tracking and/or channel estimation in a wireless communication device includes receiving a reference signal and one or more non-error propagation physical channel signals. In general, the one or more non-error propagation physical channel signals must be correctly decoded before a data channel can be decoded. Channel tracking and/or channel estimation are/is then performed based on the reference signal and at least one of the one or more non-error propagation physical channel signals. | 02-11-2016 |
Patent application number | Description | Published |
20150186645 | SYSTEM, APPARATUS AND METHOD FOR AUTOMATICALLY VERIFYING EXPLOITS WITHIN SUSPECT OBJECTS AND HIGHLIGHTING THE DISPLAY INFORMATION ASSOCIATED WITH THE VERIFIED EXPLOITS - According to one embodiment, a threat detection system is integrated with intrusion protection system (IPS) logic and virtual execution logic. The IPS logic is configured to receive a first plurality of objects and filter the first plurality of objects by identifying a second plurality of objects as suspicious objects. The second plurality of objects is a subset of the first plurality of objects and is lesser or equal in number to the first plurality of objects. The virtual execution logic is configured to automatically verify whether any of the suspicious objects is an exploit. The virtual execution logic comprises at least one virtual machine configured to virtually process content within the suspicious objects and monitor for anomalous behaviors during the virtual processing that are indicative of exploits. | 07-02-2015 |
20150199513 | THREAT-AWARE MICROVISOR - A threat-aware microvisor is configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system processes executing on a node of a network environment. The microvisor may be embodied as a module disposed or layered beneath (underlying) an operating system kernel executing on the node to thereby control privileges (i.e., access permissions) to kernel resources, such as one or more central processing units (CPUs), network interfaces, memory, and/or devices, of the node. Illustratively, the microvisor may be configured to control access to one or more of the resources in response to a request by an operating system process to access the resource. | 07-16-2015 |
20150199531 | EXPLOIT DETECTION SYSTEM WITH THREAT-AWARE MICROVISOR - An exploit detection system deploys a threat-aware microvisor to facilitate real-time security analysis, including exploit detection and threat intelligence, of an operating system process executing on a node of a network environment. The microvisor may be organized as a main protection domain representative of the operating system process. In response to the process attempting to access a kernel resource for which it does not have permission, a capability violation may be generated at the main protection domain of the microvisor and a micro-virtual machine (VM) may be spawned as a container configured to encapsulate the process. The main protection domain may then be cloned to create a cloned protection domain that is representative of the process and that is bound to the spawned micro-VM. Capabilities of the cloned protection domain may be configured to be more restricted than the capabilities of the main protection domain with respect to access to the kernel resource. The restricted capabilities may be configured to generate more capability violations than those generated by the capabilities of the main protection domain and, in turn, enable further monitoring of the process as it attempts to access the kernel resource. | 07-16-2015 |
20150199532 | MICRO-VIRTUALIZATION ARCHITECTURE FOR THREAT-AWARE MICROVISOR DEPLOYMENT IN A NODE OF A NETWORK ENVIRONMENT - A micro-virtualization architecture deploys a threat-aware microvisor as a module of a virtualization system configured to facilitate real-time security analysis, including exploit detection and threat intelligence, of operating system processes executing in a memory of a node in a network environment. The micro-virtualization architecture organizes the memory as a user space and kernel space, wherein the microvisor executes in the kernel space of the architecture, while the operating system processes, an operating system kernel, a virtual machine monitor (VMM) and its spawned virtual machines (VMs) execute in the user space. Notably, the microvisor executes at the highest privilege level of a central processing unit of the node to virtualize access to kernel resources. The operating system kernel executes under control of the microvisor at a privilege level lower than a highest privilege level of the microvisor. The VMM and its spawned VMs execute at the highest privilege level of the microvisor. | 07-16-2015 |
20160006756 | TRUSTED THREAT-AWARE MICROVISOR - A trusted threat-aware microvisor may be deployed as a module of a trusted computing base (TCB) that also includes a root task module configured to cooperate with the microvisor to load and initialize one or more other modules executing on a node of a network environment. The root task may cooperate with the microvisor to allocate one or more kernel resources of the node to those other modules. As a trusted module of the TCB, the microvisor may be configured to enforce a security policy of the TCB that, e.g., prevents alteration of a state related to security of the microvisor by a module of or external to the TCB. The security policy of the TCB may be implemented by a plurality of security properties of the microvisor. Trusted (or trustedness) may therefore denote a predetermined level of confidence that the security property is demonstrated by the microvisor. | 01-07-2016 |
Patent application number | Description | Published |
20120253953 | ADJUSTMENT OF A SECURITY LEVEL OF A TRANSACTION SYSTEM BASED ON A BIOMETRIC CHARACTERISTIC OF A CUSTOMER - Methods and systems for adjusting a security level of a transaction system based on biometric characteristics of a customer are disclosed. According to an aspect, a method includes interacting with a customer at a transaction terminal. The method also includes determining a biometric characteristic of the customer based on the interaction with the customer. Further, the method may include adjusting a security level of a transaction system based on the biometric characteristic. | 10-04-2012 |
20140002643 | PRESENTATION OF AUGMENTED REALITY IMAGES ON MOBILE COMPUTING DEVICES | 01-02-2014 |
20140330655 | ADJUSTMENT OF A SECURITY LEVEL OF A TRANSACTION SYSTEM BASED ON A BIOMETRIC CHARACTERISTIC OF A CUSTOMER - Methods and systems for adjusting a security level of a transaction system based on biometric characteristics of a customer are disclosed. According to an aspect, a method includes interacting with a customer at a transaction terminal. The method also includes determining a biometric characteristic of the customer based on the interaction with the customer. Further, the method may include adjusting a security level of a transaction system based on the biometric characteristic. | 11-06-2014 |
20150262216 | COUPON REVIVAL - System, method, and computer program product to perform an operation, the operation comprising receiving, via a computer system interface, a request to revive an expired coupon, responsive to the request, determining that a condition for reviving the expired coupon has been accepted, and storing, in a computer readable storage medium, an indication that the revived coupon is valid for use. | 09-17-2015 |
Patent application number | Description | Published |
20090099861 | INGESTION AND DISTRIBUTION OF MULTIPLE CONTENT TYPES - A content portal provides a single user interface for uploading content for distribution to various marketplaces. A user may create a user account with the content portal and upload content, which is stored by the content portal. The content may include a variety of different content types. The content portal may be used to manage the content and to distribute the content to a variety of marketplaces. The marketplaces may also return analytics to the content portal, which provides reports to the user regarding activities associated with the content at the marketplaces. | 04-16-2009 |
20090299965 | NAVIGATING PRODUCT RELATIONSHIPS WITHIN A SEARCH SYSTEM - Embodiments of the present invention relate to aggregating product information from a variety of sources to generate user interfaces that allow users to navigate and discover products. Product information is aggregated from both feed and crawl sources, and product entities are identified within the aggregate product information. In some embodiments, product entities are associated with product classes, and product class detail pages are generated that include product entities within each product class and allow users to view correlations between those produce entities. In some embodiments, relationships are identified between product entities. When a user selects to view information for a given product entity, information is provided indicating similar product entities that have a relationship with the given product entity. | 12-03-2009 |
20100125484 | REVIEW SUMMARIES FOR THE MOST RELEVANT FEATURES - A method, system, and medium are provided for capsule summaries of reviews, such as product and service reviews. Raw comments and reviews are collected from several sources, which can be obtained from different locations, such as Internet sites. A number of features for each product or service category are developed, which are then correlated to the collected comments and reviews. A rating is assigned to each comment and review, which indicates the level of positivity or negativity of the comment or review. Ratings for each feature are combined to give an overall rating of the product or service under review. More relevant results, such as the most positive and the most negative reviews of each feature, along with the overall rating, are returned to a user to provide a quick summary of the selected product or service. If a user would like more details or more results, options are provided to go deeper into the capsule summary to obtain as much information or detail as desired. | 05-20-2010 |
20130246385 | EXPERIENCE RECOMMENDATION SYSTEM BASED ON EXPLICIT USER PREFERENCE - Presented in this disclosure are systems and methods for enabling access to content from a preferred source to a computer user is presented. A preferred source is a source of content that a user has identified as being “preferred.” Once a user establishes a source as a preferred source (through a first channel), other channels by which the user can obtain content from the preferred source are identified. In various embodiments, the other channels are automatically enabled for the user or, alternative, presented to the user for opting into receiving the content from that channel. | 09-19-2013 |
20130246414 | SEARCH RESULTS PERSONALIZATION BASED ON EXPLICITLY PREFERRED SOURCES - While some search engines personalize search results for a user, search engines have failed to enable personalization according to a user's explicitly preferred sources of content. According to the disclosed subject matter, a list of preferred sources is maintained for a user. When a search query is received from the user, a set of search results responsive to the query is obtained. From the set search results, one or more search results that correspond to a preferred source are identified. The set of search results is arranged with the one or more search results placed in more prominent positions in the set of search of search results. A search results page is generated according to the arranged set of search results and the generated search results page is returned in response to the user's search query. | 09-19-2013 |
20130246415 | SEARCHING BASED ON OTHERS' EXPLICITLY PREFERRED SOURCES - While some search engines personalize search results for a user, search engines have failed to enable personalization according to a user's explicitly preferred sources of content. According to the disclosed subject matter, a list of preferred sources is maintained for a user as well as a plurality of entities. When a search query is received from the user, a set of search results responsive to the query is obtained. From the set search results, one or more search results that correspond to a preferred source are identified. The set of search results is arranged with the one or more search results placed in more prominent positions in the set of search of search results. A search results page is generated according to the arranged set of search results and the generated search results page is returned in response to the user's search query. | 09-19-2013 |
20130262460 | Publisher Ecosystem for Preferring Search Sources - Content source owners may associate their sites with a user as the user's preferred source. According to the disclosed subject matter, a preference communication is received indicating that an identified content source is to be a preferred source for an identified user. A set of search results is obtained responsive to a search request from the identified user. The set of search results include at least one search result referencing content from the identified content source. The set of search results is rearranged according preferred sources associated with the identified user, including the identified content source, such that the search result referencing content from the identified content source is repositioned within the ordered set of search results to a more prominent position in the rearranged set of search results. A search results page is generated from the rearranged set of search results and returned to the identified user. | 10-03-2013 |
20140214937 | Activity Graphs - The description relates to activity graphs. One example can obtain details from multiple activity cards. The example can identify relationships between at least some of the details of the multiple activity cards. The example can also generate an activity graph that reflects at least some of the relationships between individual activity cards. | 07-31-2014 |
20150074546 | IN-APPLICATION CUSTOMIZATION - In-application customization is provided where users can both use and customize the application. Within a graphical user interface of an application developed by an original author, an interaction from a customizer user of the application can be received to make a modification to the application from a set of available modifications that the original author did not create for the application. The modification can be performed using functionality made available through a developer program service. | 03-12-2015 |
Patent application number | Description | Published |
20100051859 | Carbon Dioxide Capture and Related Processes - Processes for capturing carbon dioxide are described. The carbon dioxide may be captured from the atmosphere and/or from the waste stream of a carbon dioxide point source (e.g., power plants, chemical plants, natural gas fields, oil fields, industrial sites, etc.). The processes can involve capturing carbon dioxide using alkaline solutions (e.g., NaOH). In some processes, the carbon dioxide may react with the alkaline solution to form a product (e.g., NaHCO | 03-04-2010 |
20110135551 | CARBON DIOXIDE CAPTURE AND RELATED PROCESSES - Processes for capturing carbon dioxide are described. The carbon dioxide may be captured from the atmosphere and/or from the waste stream of a carbon dioxide point source (e.g., power plants, chemical plants, natural gas fields, oil fields, industrial sites, etc.). The processes can involve capturing carbon dioxide using alkaline solutions (e.g., NaOH). In some processes, the carbon dioxide may react with the alkaline solution to form a product (e.g., NaHCO | 06-09-2011 |
20120262701 | SEMICONDUCTOR OPTOELECTRONIC DEVICE - A manufacture having an electrical response to incident photons includes a semiconductor substrate; a chalcogen-doped semiconductor active layer on a first side of the substrate; a first contact in electrical contact with the active layer; and a second contact in electrical contact with the substrate; wherein, photons incident upon the active layer cause a variation in current between the first and second contacts. | 10-18-2012 |
20130230794 | COMPLEX OXIDES FOR CATALYTIC ELECTRODES - A catalytic electrode may include a complex oxide deposited on a substrate. The complex oxide maybe an oxide of an alloy of ruthenium and another less expensive metal, including without limitation cobalt and manganese. The percentage of ruthenium in the complex oxide can be reduced to about 20 percent or less, while still allowing the electrode to maintain adequate electrocatalytic activity during redox reactions at the electrode. Electrodes can be synthesized using RuCo oxides with ruthenium content reduced to about 5%, or using RuMn oxides having ruthenium content reduced to about 10%, while maintaining good catalytic activity. These electrodes may be used in electrochemical cells including without limitation fuel cells, flow batteries and regenerative fuel cells such as halogen fuel cells or hydrogen-halogen fuel cells. These electrodes may also be used in electrolytic cells. | 09-05-2013 |
20130288463 | METHOD FOR PRODUCING THIN LAYERS OF CRYSTALLINE OR POLYCRYSTALLINE MATERIALS - Method for making thin crystalline or polycrystalline layers. The method includes electrochemically etching a crystalline silicon template to form a porous double layer thereon, the double layer including a highly porous deeper layer and a less porous shallower layer. The shallower layer is irradiated with a short laser pulse selected to recrystallize the shallower layer resulting in a crystalline layer. Silicon is deposited on the recrystallized shallower layer and the silicon is irradiated with a short laser pulse selected to crystalize the silicon leaving a layer of crystallized silicon on the template. Thereafter, the layer of crystallized silicon is separated from the template. The process of the invention can be used to make optoelectronic devices. | 10-31-2013 |
20150243991 | SMALL ORGANIC MOLECULE BASED FLOW BATTERY - The invention provides an electrochemical cell based on a new chemistry for a flow battery for large scale, e.g., grid-scale, electrical energy storage. Electrical energy is stored chemically at an electrochemical electrode by the protonation of small organic molecules called quinones to hydroquinones. The proton is provided by a complementary electrochemical reaction at the other electrode. These reactions are reversed to deliver electrical energy. A flow battery based on this concept can operate as a closed system. The flow battery architecture has scaling advantages over solid electrode batteries for large scale energy storage. | 08-27-2015 |
20160043423 | SMALL ORGANIC MOLECULE BASED FLOW BATTERY - The invention provides an electrochemical cell based on a new chemistry for a flow battery for large scale, e.g., gridscale, electrical energy storage. Electrical energy is stored chemically at an electrochemical electrode by the protonation of small organic molecules called quinones to hydroquinones. The proton is provided by a complementary electrochemical reaction at the other electrode. These reactions are reversed to deliver electrical energy. A flow battery based on this concept can operate as a closed system. The flow battery architecture has scaling advantages over solid electrode batteries for large scale energy storage. | 02-11-2016 |
Patent application number | Description | Published |
20120076181 | ADAPTING TRANSFER FUNCTIONS OF CONTINUOUS-TIME EQUALIZERS - Described embodiments provide a method of adjusting configurable parameters of at least one linear equalizer in a communication system. A transmitting device applies an input signal to a receiver. The at least one linear equalizer equalizes the input signal. A sampler generates one or more sampled values of the input signal. A data detector digitizes the sampled values of the input signal. At least one error detection module generates an error signal based on one or more of a plurality of sampled values of the input signal and a target value. An adaptation module determines a gradient signal based on a comparison of one or more of the plurality of sampled values of the input signal and one or more of the plurality of values of the error signal. The adaptation module adjusts a transfer function of the at least one linear equalizer based on the determined gradient signal. | 03-29-2012 |
20130039407 | LOW-POWER DOWN-SAMPLED FLOATING TAP DECISION FEEDBACK EQUALIZATION - In described embodiments, a variety of down-sampling techniques are employed to generate a more constrained set of floating-tap positions when compared to floating-tap Decision Feedback Equalization (DFE) architectures that allow unconstrained IT resolution or separated floating-tap positions. Down-sampling is employed to constrain the floating-tap positions rather than positions occurring with IT resolution or spacing. Two broad down-sampling techniques, phase pruning and phase amalgamation, are applied to a variety of exemplary DFE implementations. Although the tap positions are more constrained, the architectures select floating-tap positions containing dominant reflection inter-symbol interference (ISI) terms. | 02-14-2013 |
20130077669 | Method of Compensating for Nonlinearity in a DFE-based Receiver - A receiver has an input and a decision feedback equalizer (DFE). The DFE couples to the receiver input and has at least one tap coefficient. An input signal, having a first amplitude level insufficient to cause significant non-linear distortion in the receiver, is applied to the receiver input. After the DFE adapts to the applied input signal having the first amplitude level by adjusting the at least one tap coefficient, the adaptation process is stopped. Then the at least one tap coefficient is scaled by a factor α and the amplitude of input signal is adjusted to a second amplitude level greater than the first amplitude level by the scale factor α. Although the second amplitude level might be sufficient to cause significant non-linear distortion in the receiver, the scaled tap coefficient has the correct values for proper DFE operation in the presence of the non-linear distortion. | 03-28-2013 |
20130287088 | Receiver Having Limiter-Enhanced Data Eye Openings - A communication system having a receiver with a linear path and a nonlinear path. As the receiver receives a data signal, it adaptively equalizes the received signal, and amplitude-limits the equalized signal in the nonlinear path using a saturable amplifier limiter or the like. A slicer extracts data from the limited equalized received signal. In the linear path, a clock recovery circuit generates a clock signal from the equalized received signal. A delay circuit in the linear path at least partially compensates for propagation delay in the limiter. Having the clock recovery occur in other than the nonlinear path, a low jitter clock is generated. The limiter enhances the vertical opening of the data eye by increasing the rise and fall times of the limited signal, providing more noise margin for the slicer to operate with and a greater timing margin in which to sample the sliced data. | 10-31-2013 |