Patent application number | Description | Published |
20130346310 | Privacy Enhancing Personal Data Brokerage Service - The subject disclosure is directed towards a technology by which access to a protected entity's data is controlled by a data brokerage service. The service determines whether a requesting entity has appropriate access rights to requested information, and if so, the service returns a response corresponding to the protected data. In one aspect, the protected data may be location data of a protected entity that is maintained independent of a payment instrument. The location data is used to compute feasibility information as to whether the protected entity is authorized to perform a transaction using the payment instrument. | 12-26-2013 |
20130346704 | Indicating Cached Content Status - Described is a technology by which a link to content is visibly augmented to convey information related to a cached status of the linked-to content. In one aspect, a cached versus not cached indication may be provided to convey such cache-related information to a user. Staleness of cached content also may be indicated. Also described is pre-fetching and/or updating cache content, which may be conveyed to the user by the conveyed cache-related status information. | 12-26-2013 |
20140279026 | ENERGY-EFFICIENT MOBILE ADVERTISING - Various technologies described herein pertain to prefetching advertisements for mobile advertising. A prediction model for estimating a number of advertisements that a mobile client is likely to request during an upcoming prediction time period can be employed. An estimated total amount of time of likely interaction with application(s) executed by the mobile client can be predicted; based upon such prediction, a number of advertisement slots likely to be available and a probability of each of the advertisement slots being available can be computed. Moreover, an ad server can allocate advertisements in a pending advertisement queue and/or disparate advertisements collected from an ad exchange to the mobile client based upon the number of advertisement slots likely to be available, the probability of each of the advertisements slots being available, and aggregated probabilities of the pending advertisements in the pending advertisement queue being displayed prior to corresponding deadlines for expiration. | 09-18-2014 |
20140280669 | Memory Sharing Over A Network - Memory is shared among physically distinct, networked computing devices. Each computing device comprises a Remote Memory Interface (RMI) accepting commands from locally executing processes and translating such commands into forms transmittable to a remote computing device. The RMI also accepts remote communications directed to it and translates those into commands directed to local memory. The amount of storage capacity shared is informed by a centralized controller, either a single controller, a hierarchical collection of controllers, or a peer-to-peer negotiation. Requests that are directed to remote high-speed non-volatile storage media are detected or flagged and the process generating the request is suspended such that it can be efficiently revived. The storage capacity provided by remote memory is mapped into the process space of processes executing locally. | 09-18-2014 |
20140280708 | Network Routing Modifications For Distribution Of Data - The transmission of multiple copies of data to other computing devices is optimized by minimizing the number of copies of such data transmitted through an expensive portion of the network. A store-and-forward methodology is utilized to transmit only a single copy through the expensive portion and the data is subsequently forked into multiple copies directed to multiple destination computing devices. Computing devices that are not intended destinations can be conscripted as intermediate computing devices, if appropriate to minimize copies of the data transmitted through an expensive portion. Additionally, accommodation can be made for data that is intolerant of out-of-order delivery by utilizing adaptive protocols that avoid mechanisms that may result in out-of-order delivery for data intolerant of such and by utilizing packet sorting at data convergence points to reorder the data. Different protocol settings can be utilized to transmit data across different portions of the network. | 09-18-2014 |
20140281019 | Network Transmission Adjustment Based On Application-Provided Transmission Metadata - Application-provided transmission metadata is utilized, in conjunction with current network information, to adjust network transmissions. An interface between applications seeking to transmit data and networking components enables the application to provide destination information, communication type information, information regarding the quantity of data to be transferred, timeliness information, data location information, cost information, and other like transmission metadata. Current network information can be obtained by the networking components themselves, or can be provided by, or enhanced by, a centralized controller. The networking components can then optimize both the routing and the protocol settings in the form of adjustments to error control settings, flow control settings, receiver control settings, segmentation settings, and other like protocol settings. | 09-18-2014 |
20140285416 | Short Range Wireless Powered Ring for User Interaction and Sensing - In general, the short range wireless powered ring described herein pertains to a finger-worn ring. In one embodiment the ring has a small interaction area towards the palm of the hand that employs sensors to sense user input and can interpret this input and other data. For example, the ring can interpret user input as scroll and select input actions. The ring communicates user interactions and other data wirelessly using a low-power wireless solution. The ring contains a coil and other circuitry for energy harvesting from short range wireless enabled devices such as, for example, NFC enabled phones, while users interact with their devices. A built in rechargeable battery is used to store the scavenged energy. The ring may also contain physiological and inertial sensors. The ring can provide a readily available input device of small form factor that has an easily accessible energy source for ease of use. | 09-25-2014 |
20150143459 | PROTECTING PRIVACY IN WEB-BASED IMMERSIVE AUGMENTED REALITY - An “AR Privacy API” provides an API that allows applications and web browsers to use various content rendering abstractions to protect user privacy in a wide range of web-based immersive augmented reality (AR) scenarios. The AR Privacy API extends the traditional concept of “web pages” to immersive “web rooms” wherein any desired combination of existing or new 2D and 3D content is rendered within a user's room or other space. Advantageously, the AR Privacy API and associated rendering abstractions are useable by a wide variety of applications and web content for enhancing the user's room or other space with web-based immersive AR content. Further, the AR Privacy API is implemented using any existing or new web page coding platform, including, but not limited to HTML, XML, CSS, JavaScript, etc., thereby enabling existing web content and coding techniques to be smoothly integrated into a wide range of web room AR scenarios. | 05-21-2015 |