Patent application number | Description | Published |
20090291667 | CHARGING SYSTEM FOR A COMMUNICATION SYSTEM - A communication system comprises network elements ( | 11-26-2009 |
20100056184 | PRESENCE-AWARE CELLULAR COMMUNICATION SYSTEM AND METHOD - A cellular communication system comprises a network supporting user equipment over an air interface, the network having a hierarchical cell arrangement with overlay cells and underlay cells. An underlay base station is associated with a subset of registered user equipment. An activation server switches the underlay base station between an inactive mode and an active mode in response to detecting that registered user equipment meets a location criterion. The underlay base station only supports user equipment when in the active mode, e.g., it may only transmit a pilot signal in this mode. Interference and power consumption may be substantially reduced by sending the base station into the inactive mode thereby resulting in increased capacity of the cellular communication system as a whole. | 03-04-2010 |
20100058205 | RECONFIGURABLE MULTIPLE-SCREEN DISPLAY - A device comprises a display arrangement which includes a plurality of displays that are movable relative to each other such that a plurality of display configurations can be achieved. Each of the display configurations provides a combined display area which is different for at least two of the display configurations. An application processor is operable to execute a plurality of user applications, each of which can provide a display output. A display driver is arranged to generate an arrangement of display output for the display arrangement from the display output of an application being executed. The display driver sets a display characteristic for the arrangement of display output in response to a characteristic of the executed application and the deployed display configuration. For example, depending on the application being executed and the current display configuration, a size of a display window used for the application can be selected. | 03-04-2010 |
20100167732 | PROVIDING OVER-THE-TOP SERVICES ON FEMTO CELLS OF AN IP EDGE CONVERGENCE SERVER SYSTEM - A method is provided for enabling an over the top (OTT) service over a broadband network. The method includes receiving a registration request from a mobile User Equipment (UE) over a femto cell to register with a cellular operator of a cellular network. The registration request is forwarded to an authentication, authorization, and accounting (AAA) server associated with the cellular operator to register the mobile UE therewith. A rendition of the registration request is forwarded to an AAA server associated with a broadband operator of a broadband network to register the mobile UE therewith. | 07-01-2010 |
20100167740 | WIDE AREA MOBILE COMMUNICATIONS OVER FEMTO-CELLS - A method and apparatus is provided for hand-off of a mobile User Equipment (UE) across a femto cellular network. The method includes dynamically clustering a plurality of neighboring femto cells in a vicinity of a first femto cell to which a mobile UE is currently attached. The dynamic cluster of neighboring femto cells is moved across the femto cellular network in accordance with movement of the mobile UE across the femto cellular network. | 07-01-2010 |
20120159181 | Virus Localization Using Cryptographic Hashing - Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function. | 06-21-2012 |
20120167223 | Virus Localization Using Cryptographic Hashing - Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function. | 06-28-2012 |
20140181160 | SEQUENTIAL SEMANTIC REPRESENTATIONS FOR MEDIA CURATION - Generating a sequential semantic representation and a resulting content item sequence or presentation is disclosed. A set of nodes and paths among the nodes are determined. Each node includes a corresponding a set of criteria. The paths define a relationship among the plurality of nodes. Transitional operators that define additional criteria for the nodes, are associated with the paths. Content items that include characteristics that are determined to match the corresponding set of criteria for at least one of the nodes are retrieved. | 06-26-2014 |