Patent application number | Description | Published |
20090222568 | Connectivity Platform - Disclosed are a connectivity platform that allows for proprietary connectivity modules to plug into the operating system and also allows the operating system users and various existing networking applications in the operating system that are authorized by those providers to use that connectivity via existing APIs without the need for the applications to change or for extra configuration of the application to be performed. In an example disclosed herein, the providers provide NAT or firewall traversal and implement the appropriate transport mechanism. This allows for applications and computing devices to communicate in environments where connectivity is prevented by intermediate systems. | 09-03-2009 |
20100146120 | CALLER-SPECIFIC VISIBILITY MASKS FOR NETWORKING OBJECTS - A computer configured to provide caller-specific network views, even when multiple callers are active on the computer. The operating system of the computer is configured to selectively perform network operations based on the identity of the caller. Network views are implemented by making subsets of networking objects available to each caller, such as a user or an application. Components that execute networking functions can, based on the identify of the caller, select networking objects to use in performing a requested function or verify that required networking objects are available to the caller. The network views may be stored as visibility masks in a database. APIs may be provided to create, modify, and delete visibility masks in the database. The masks may support arbitrary and potentially overlapping subsets of networking objects for the callers. | 06-10-2010 |
20140369358 | CONNECTIVITY PLATFORM - Disclosed are a connectivity platform that allows for proprietary connectivity modules to plug into the operating system and also allows the operating system users and various existing networking applications in the operating system that are authorized by those providers to use that connectivity via existing APIs without the need for the applications to change or for extra configuration of the application to be performed. In an example disclosed herein, the providers provide NAT or firewall traversal and implement the appropriate transport mechanism. This allows for applications and computing devices to communicate in environments where connectivity is prevented by intermediate systems. | 12-18-2014 |
Patent application number | Description | Published |
20120158947 | OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS - A mobile computing device that supports cost aware network behavior. An operating system of the mobile computing device may associate data for transmission with a entity and, based on a policy applicable to that entity and information on data usage, determine appropriate processing for the data. The processing may include transmitting the data, with or without throttling, or blocking transmission of the data. The policy, for example, may be supplied by a user or may be encoded in a tag supplied with the data for transmission. The policies may be specified for entities such as an application, an operating system service, a user account or a category of applications. Enforcement of the determined processing may be based on action within the stack or a separate enforcement mechanism, such as a firewall. | 06-21-2012 |
20120254420 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 10-04-2012 |
20130067059 | Keep Alive Management - Keep alive management techniques are described. In one or more implementations, a keep alive interval is calculated by an operating system of the computing device. The keep alive interval is used to maintain one or more notification channels between one or more applications of the computing device and a network. | 03-14-2013 |
20130067060 | Wake Pattern Management - Wake pattern management techniques are described. In one or more implementations, network traffic received by a network interface device of a computing device is monitored and a traffic pattern is recognized in the monitored network traffic. An application of the computing device is identified that corresponds to the recognized traffic pattern and responsive to this identification, at least a portion of the identified application is woken. | 03-14-2013 |
20130067260 | Operating System Management of Network Interface Devices - Operating system management of network interface devices is described. In one or more implementations, a determination is made by an operating system that network traffic associated with one or more applications of the computing device has completed. Responsive to the determination, a network interface device is caused to transition to a mode to reduce power consumption of the network interface device by the operating system. | 03-14-2013 |
20130205040 | ENSURING SYMMETRIC ROUTING TO PRIVATE NETWORK - Aspects of the subject matter described herein relate to symmetric routing to a private network. In aspects, a remote client may try to connect to an entity of a private network using a non-routable network address. Upon detecting that connectivity is not established or not possible via a given network address, the client may obtain network data associated with a gateway that provides access to the private network and create a virtual interface where the gateway is the next-hop router. After creating the virtual interface, the client may communicate with entities of the private network using the virtual interface of the client. By sending traffic through the virtual interface with a source address having a prefix associated with the gateway, the client may ensure that traffic sent to and from the private network traverses the gateway. | 08-08-2013 |
20130219058 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 08-22-2013 |
20140310546 | Operating System Management of Network Interface Devices - Operating system management of network interface devices is described. In one or more implementations, a determination is made by an operating system that network traffic associated with one or more applications of the computing device has completed. Responsive to the determination, a network interface device is caused to transition to a mode to reduce power consumption of the network interface device by the operating system. | 10-16-2014 |
20140359167 | PATTERN COALESCING FOR REMOTE WAKE-ENABLED APPLICATIONS - In various embodiments, methods and systems for managing wake-enabled transport connections of wake-enabled applications is provided. A set of ports is designated as a wake-enabled port set. An operating system (OS) of a computing device running applications plumbs the multiport wake pattern to the one or more network interface controllers (NIC) of the computing device. A wake-enabled application acquires a port from the wake-enabled port set. The OS makes a determination that the application is wake-enabled and as such, assigns a port, from the wake-enable port set, to the wake-enabled application. Upon receiving a packet at the NIC, a determination is made whether the packet corresponds to a wake-enabled transport connection based on comparing the packet to the multiport wake pattern. Upon matching the packet to the multiport wake pattern, the NIC communicates with the OS to wake a portion of the wake-enabled application associated with the wake-enabled transport connection. | 12-04-2014 |
20150052373 | Keep Alive Management - Keep alive management techniques are described. In one or more implementations, a keep alive interval is calculated by an operating system of the computing device. The keep alive interval is used to maintain one or more notification channels between one or more applications of the computing device and a network. | 02-19-2015 |
20150074269 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 03-12-2015 |
20150215185 | Wake Pattern Management - Wake pattern management techniques are described. In one or more implementations, network traffic received by a network interface device of a computing device is monitored and a traffic pattern is recognized in the monitored network traffic. An application of the computing device is identified that corresponds to the recognized traffic pattern and responsive to this identification, at least a portion of the identified application is woken. | 07-30-2015 |
Patent application number | Description | Published |
20130018500 | METHODS AND APPARATUS FOR PROCESSING SUBSTRATES USING MODEL-BASED CONTROLAANM PORTHOUSE; KEITH BRIANAACI SunnyvaleAAST CAAACO USAAGP PORTHOUSE; KEITH BRIAN Sunnyvale CA USAANM LANE; JOHN W.AACI San JoseAAST CAAACO USAAGP LANE; JOHN W. San Jose CA USAANM GREGOR; MARIUSCHAACI GilroyAAST CAAACO USAAGP GREGOR; MARIUSCH Gilroy CA USAANM MERRY; NIRAACI Mountain ViewAAST CAAACO USAAGP MERRY; NIR Mountain View CA USAANM RICE; MICHAEL R.AACI PleasantonAAST CAAACO USAAGP RICE; MICHAEL R. Pleasanton CA USAANM MINKOVICH; ALEXAACI CampbellAAST CAAACO USAAGP MINKOVICH; ALEX Campbell CA USAANM LI; HONGBINAACI Mountain ViewAAST CAAACO USAAGP LI; HONGBIN Mountain View CA USAANM DZILNO; DMITRY A.AACI SunnyvaleAAST CAAACO USAAGP DZILNO; DMITRY A. Sunnyvale CA US - Methods and apparatus are disclosed herein. In some embodiments, methods of controlling process chambers may include predetermining a relationship between pressure in a processing volume and a position of an exhaust valve as a function of a process parameter; setting the process chamber to a first state having a first pressure in the processing volume and a first value of the process parameter, wherein the exhaust valve is set to a first position based on the predetermined relationship to produce the first pressure at the first value; determining a pressure control profile to control the pressure as the process chamber is changed to a second state having a second pressure and a second process parameter value from the first state; and applying the pressure control profile to control the pressure by varying the position of the exhaust valve while changing the process chamber to the second state. | 01-17-2013 |
20140117982 | FILM MEASUREMENT - In one embodiment, a sample is tested by an eddy current sensor at two distances separated by a known incremental distance. In one aspect, at least one of an unknown distance of the sensor from the test sample and the film thickness of the test sample may be determined as a function of a comparison of sensor output levels of a single parameter and the known incremental distance to calibration data. In yet another aspect, the distance between the sensor and the test sample may oscillated to produce an oscillating sensor output signal having an amplitude and mean which may be measured and compared to calibration data to identify at least one of the unknown film thickness of a conductive film on a test sample, and the unknown distance of the test sample from the sensor. Other aspects and features are also described. | 05-01-2014 |
20140367265 | NON-CONTACT SHEET RESISTANCE MEASUREMENT OF BARRIER AND/OR SEED LAYERS PRIOR TO ELECTROPLATING - A measurement tool for measuring an electrical parameter of a metal film deposited on a front side of a workpiece includes an electrical sensor connected to a workpiece contact point, an energy beam source with a beam impact location on the front side, a holder and a translation mechanism capable of translating the holder relative to the workpiece support, the beam source supported on the holder, and a computer programmed to sense a behavior of an electrical parameter sensed by the sensor. | 12-18-2014 |
20140367266 | FAST AND CONTINUOUS EDDY-CURRENT METROLOGY OF A CONDUCTIVE FILM - A measurement tool includes a rotation stage supporting an workpiece support, a thickness sensor overlying a workpiece support surface; a translation actuator coupled to the thickness sensor for translation of the thickness sensor relative to the workpiece support surface; and a computer coupled to control the rotation actuator and the translation actuator, and coupled to receive an output of the thickness sensor. | 12-18-2014 |
Patent application number | Description | Published |
20130125208 | PORTABLE SECURITY DEVICE AND METHODS OF USER AUTHENTICATION - Disclosed a portable security device and methods for secure user authentication. The security device stores operating system agents that enable communication with user devices that have different operating systems. The security device also stores user authentication data for accessing different Internet resources by the user devices. The security devices connects to the user device using an operating system agent corresponding to the operating system of the user device, and receives from the user device a request to access an Internet resource. The security device select user authentication data associated with the requested Internet resource, and obtains the requested Internet resource using the selected user authentication data. | 05-16-2013 |
20130333018 | Portable Security Device and Methods for Secure Communication - Disclosed a portable personal security device and methods for secure communication. In one example, the personal security device may wirelessly connect to a user device and collect information about the user device. The personal security device may then assess security characteristics of the user device based on the collected information. When the user device is determined to be unsecure, the personal security devices may instruct the user to use a secure internet application of the personal security device instead of an unsecure internet application of the user device. In addition, the personal security device may instruct the user to use a secure data input device of the personal security device instead of an unsecure data input device of the user device. The personal security device then receives via the secure data input device a user input data for the secure internet application, and transmit it to the user device. | 12-12-2013 |
20150058087 | METHOD OF IDENTIFYING SIMILAR STORES - A computer-implemented method and computer program product for identifying similar stores and determining store parameters based on the similar stores. The one or more computer programs identify key items by selecting a subset of all items. The one or more computer programs assign store feature vectors each including values of a store behavior for the key items. The one or more computer programs determine a similarity distance between each pair of the vectors. The one or more computer programs identify similar stores of a given store based on the similarity distance. The one or more computer programs determine one or more parameters for the given stores, based on the similar stores. | 02-26-2015 |
Patent application number | Description | Published |
20110211660 | MULTI -CHANNEL SEQUENTIAL VITERBI DECODER - A multi-channel sequential Viterbi decoder includes: an input data buffer, a “Read Single Data Word from Input Data Buffer” signal driver, a processing unit selector, a decoder channel parameters registers unit, a processing unit for the “Reset Path Metrics” command, a processing unit for the “Set Path Metric Value for the Given Path Number” command, a processing unit for the “Get Single Bit from the Path with Given Number” command, a processing unit for the “Process Input Samples” command, a decoding paths and path metrics RAM, a unit for generating current decoder channel base address for the decoding paths and path metrics RAM, a unit for generating cell address for the decoding path and path metric RAM, and a data buffers unit for decoder channels output. | 09-01-2011 |
20110307767 | METHOD AND APPARATUS FOR SIGNAL-TO-NOISE RATIO ESTIMATION IN CONVOLUTIONAL CODES (VITERBI) DECODER - A method of estimating signal-to-noise ratio in a Viterbi decoder comprising: setting a threshold SNR value; determining a dependence on SNR of the average decoding path length; filling branch metrics matrix, minimal path metrics matrix, path metrics matrix and paths matrix with initial values; receiving packets from a communication channel; calculating the matrices that contains paths stored during operation of Viterbi algorithm in its rows, and a minimal path metrics matrix, including calculating an estimate of a decoding path length, where all the paths converge, based on the paths matrix; calculating current SNR estimate using an estimate of a decoding path length, based on results of previous steps; setting a decoder control signal to an active state if the current estimated SNR does not exceed the threshold, and to an inactive state otherwise; if the decoder control signal is in active state, the branch metrics matrix, the minimal path metrics matrix, the paths metrics matrix and the paths matrix are filled with the initial values; generating a decoded symbol; and repeating the steps on a next packet if one is available. | 12-15-2011 |
20130039448 | MULTI-CHANNEL SEQUENTIAL VITERBI DECODER - A multi-channel sequential Viterbi decoder includes: an input buffer, a “Read Data from Input Buffer” signal driver, a processing unit selector, a decoder channel parameters registers unit, a processing unit for a “Reset Path Metrics” command, a processing unit for a “Set Path Metric Value for the Given Path Number” command, a processing unit for a “Get Single Bit from the Path with Given Number” command, a processing unit for a “Process Input Samples” command, a memory for storing decoding paths and path metrics, a unit for generating an address for the memory, and data buffers for decoder channels output. | 02-14-2013 |
Patent application number | Description | Published |
20090282047 | SYSTEM AND METHOD FOR SOCIAL INFERENCE BASED ON DISTRIBUTED SOCIAL SENSOR SYSTEM - A method (and system) for data acquisition includes extracting information from user communications and allowing a user to control the information to be extracted. The method of data acquisition may include downloading a user's sent materials from a communication data repository, analyzing the downloaded materials and extracting data portions that are authored by the user, generating statistical values from the extracted data, transmitting the generated statistical values to one or multiple repositories, receiving generated statistical values one or multiple server machines, and aggregating statistical values of multiple users. | 11-12-2009 |
20120173720 | SYSTEM AND METHOD FOR SOCIAL INFERENCE BASED ON DISTRIBUTED SOCIAL SENSOR SYSTEM - A method (and system) for data acquisition includes downloading a user's sent materials from a communication data repository, analyzing the sent materials and extracting data portions that are authored by the user, generating statistical values from the extracted data, transmitting the generated statistical values to one or multiple repositories, receiving the generated statistical values on one or multiple server machines, and aggregating statistical values of multiple users. | 07-05-2012 |
20120240217 | Computer Security - Computer security processes include displaying information elements on a computer display screen. Some of the information elements are mapped to corresponding parameters. The computer security processes also include receiving a selected information element from the information elements displayed on the computer display screen, and determining a value of a parameter associated with the selected information element based on a condition. The value of the parameter is changeable according to changes in the condition. The computer security processes further include comparing the selected information element with the value of the parameter, and upon determining the value of the parameter matches the selected information element, providing a user with access to a system resource. | 09-20-2012 |
Patent application number | Description | Published |
20110198615 | High-Sensitivity, High-Resolution Detector Devices and Arrays - Avalanche amplification structures including electrodes, an avalanche region, a quantifier, an integrator, a governor, and a substrate arranged to detect a weak signal composed of as few as several electrons are presented. Quantifier regulates the avalanche process. Integrator accumulates a signal charge. Governor drains the integrator and controls the quantifier. Avalanche amplifying structures include: normal quantifier, reverse bias designs; normal quantifier, normal bias designs; lateral quantifier, normal bias designs; changeable quantifier, normal bias, adjusting electrode designs; normal quantifier, normal bias, adjusting electrode designs; and lateral quantifier, normal bias, annular integrator designs. Avalanche amplification structures are likewise arranged to provide arrays of multi-channel devices. The described invention is expected to be used within photodetectors, electron amplifiers, chemical and biological sensors, and chemical and biological chips with lab-on-a-chip applications. Structures have immediately applicability to devices critical to homeland defense. | 08-18-2011 |