Gupta, CA
Aashima Gupta, Union City, CA US
Patent application number | Description | Published |
---|---|---|
20090299784 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR FURNISHING INFORMATION TO CUSTOMER REPRESENTATIVES - A method is provided for permitting telephone sales representatives access to information on qualification of customers to obtain particular products. A client server system is used. A client submits information concerning a product, a type of qualification and customer information to the server. Based on the product and type of qualification, a set of qualification rules is then obtained. The qualification rules are organized by category. Customer credit information, including credit history, preexisting products, and other information, is obtained from a customer credit database. Customer credit information is then traversed through the qualification rules to obtain a qualification result, which is returned to the client. In a method for providing scripts to representatives, who identify a requested type of script and the product, the representatives are provided with a dynamically generated script of the requested type and specific to the identified product. Script types are classified into functional types. Scripts are dynamically filled with customer-specific information, such as name, price and product. The output is provided for display on the telephone representative's browser. A general sales script is provided in the browser window. Links for items that are required in response to customer inquiries are also provided in the window. When a link is selected, a script is provided specific to the type of customer inquiry. | 12-03-2009 |
20100287458 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR FURNISHING INFORMATION TO CUSTOMER REPRESENTATIVES - A method for providing scripts to customer representatives includes the steps of: receiving from a client computer information identifying a customer, a product, and a workflow; determining a script based on the received product and workflow information; obtaining the determined script, the script comprising text and variables, from a database; replacing the variables in the determined script with text in accordance with at least the received customer identification information to provide a customized script; and providing the customized script to the client computer for display. | 11-11-2010 |
Abbinav Gupta, Menlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20110161331 | Incremental Update Of Long-Term And Short-Term User Profile Scores In A Behavioral Targeting System - A behavioral targeting system determines user profiles from online activity. The system includes a plurality of models that define parameters for determining a user profile score. Event information, which comprises on-line activity of the user, is received at an entity. To generate a user profile score, a model is selected. The model comprises recency, intensity and frequency dimension parameters. The behavioral targeting system generates a user profile score for a target objective, such as brand advertising or direct response advertising. The parameters from the model are applied to generate the user profile score in a category. The behavioral targeting system has application for use in ad serving to on-line users. | 06-30-2011 |
Abheek Gupta, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20100026348 | HIGH SIGNAL LEVEL COMPLIANT INPUT/OUTPUT CIRCUITS - A signal driver for an interface circuit has a first stage level shifter to accept input signals and output signals at a first signal level. The signal driver also has a second stage level shifter coupled to the first stage level shifter to output signals at a second signal level. Electronic components of the first and second stage level shifter have reliability limits less than the second signal level. The first and second stage configurations of the first stage level shifter and the second stage level shifter prevents exposing the electronic components to terminal to terminal signal levels higher than the reliability limits when processing signals for output at the second signal level. | 02-04-2010 |
20100026362 | HIGH SIGNAL LEVEL COMPLIANT INPUT/OUTPUT CIRCUITS - A level detector has an input circuit adapted to accept signals of multiple signal levels for detecting a specific level. The signal levels include a first signal level and a larger second signal level. Electronic components of the input circuit have reliability levels less than the second signal level. A latch circuit is coupled to the input circuit for latching a signal consistent with a detected level of an accepted signal. | 02-04-2010 |
20100026363 | HIGH SIGNAL LEVEL COMPLIANT INPUT/OUTPUT CIRCUITS - A level shifter has at least one of either a pull up or a pull down circuit. The circuit is made of electronic components with reliability limits less than a maximum signal level output by the level shifter. The level shifter also has a timing circuit coupled to at least on of either the pull up or pull down circuit. The timing circuit controls a time of application of an input signal to at least one of either the pull up or pull down circuit preventing a terminal to terminal signal level experienced by the electronic components exceeding the reliability limits. | 02-04-2010 |
20100026364 | HIGH SIGNAL LEVEL COMPLIANT INPUT/OUTPUT CIRCUITS - An interface input has an input circuit adapted to receive input signal levels higher than a maximum signal level that a host circuitry's electronic components can reliably handle. The input circuit shifts the level of the input signal to a desired signal level. A keeper circuit is coupled to the input circuit and maintains trigger levels of the shifted signals consistent with the input signal level. | 02-04-2010 |
20100030924 | HIGH SIGNAL LEVEL COMPLIANT INPUT/OUTPUT CIRCUITS - A signal interface circuit has a signal path for communicatively coupling host circuitry to peripheral circuitry of multiple peripherals. Communication signals in the signal path are of a peripheral signal level. The signal path has electronic components adapted for use in communicating signals between the host circuitry and the peripheral circuitry. The electronic components in the signal path have reliability limits less than the peripheral signal level. The configuration of the electronic components in the signal path allow communication of signals at the peripheral signal level. | 02-04-2010 |
Abhinav Gupta, Los Angeles, CA US
Patent application number | Description | Published |
---|---|---|
20110182281 | FACILITATING VERIFICATION OF CALL LEG SETUP IN THIRD PARTY CALL CONTROL SYSTEMS - In a third party call control system, a controller sends a command to a PBX for causing the PBX to initiate setup of a call leg between the PBX and a telephone device. The PBX responsively places a telephone call to the telephone device and sends an indicator to the controller that the call is in a ringing state. Responsive to the indicator, the controller subscribes with the PBX for event notification of DTMF tones from the telephone device for verifying the setup of the call leg. Configuration of the PBX for providing the desired event notification to the controller may thus be completed before any DTMF tones arrive at the PBX. This may be true even if an audio channel of the telephone call is established before the PBX receives any indication that the call was answered. Verification of call leg setup by the controller may thus be facilitated. | 07-28-2011 |
20110189985 | System and Method for Alternating Between In-Band and Out-of-Band Communication Path - Systems, methods and devices are disclosed useful for enabling wireless signals representing control messages to be sent between a wireless handheld telephony device and a call control server during an ongoing communication session when an out-of-band path becomes unavailable, the communication session being controlled by the call control server. | 08-04-2011 |
Abhinav Gupta, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20110268019 | USING JOINT DECODING ENGINE IN A WIRELESS DEVICE - A method for using a joint decoding engine in a wireless device is disclosed. A first symbol stream and a second symbol stream in a received multiple input multiple output (MIMO) signal is determined. A scaled channel estimate for a wireless transmission channel and a scaled noise covariance of the MIMO signal are also determined. The scaled channel estimate and the first symbol stream are whitened. Max log maximum a posteriori (MLM) processing is performed on the whitened first symbol stream to produce a first data stream. The first data stream may be de-rate matched and decoded to produce a decoded first data stream. | 11-03-2011 |
20120142276 | METHOD AND APPARATUS FOR DATA AIDED CHANNEL QUALITY ESTIMATION - Methods and apparatuses for data aided channel quality estimation using both pilot and data information are disclosed herein. In one exemplary aspect, a method for estimating channel quality in a wireless communication system is disclosed. The method comprises estimating a pilot noise variance based on a pilot signal received from a base station on a downlink and estimating a data noise variance based on a data signal received from the base station on the downlink. The method also comprises combining the pilot noise variance and the data noise variance to obtain a combined noise variance, and estimating the channel quality based on the combined noise variance. | 06-07-2012 |
20130343497 | NON-PRIMARY PILOT CHANNEL DISCOVERY FOR INTERFERENCE CANCELLATION - Methods and apparatus are described for processing a signal in a communication system. A signal may be received a user equipment, and a pilot transmission from a non-primary transmit antenna of a cell in the communication system may be detected in the signal based on metrics associated with a pilot channel. Information about the pilot channel is not signaled to the user equipment. The detected pilot transmission is used to improve receiver processing of the signal. | 12-26-2013 |
20140192853 | APPARATUS AND METHOD FOR ITERATIVE INTERFERENCE CANCELLATION IN A WIRELESS COMMUNICATION NETWORK - One or more aspects of the disclosure provide an efficient equalization scheme capable of mitigating multi-path interference on channels with large delay spread using short-length equalizers. That is, by dividing stored samples of a signal received on the multi-path channel by time into a plurality of clusters, a short-length equalizer can be utilized in an iterative fashion on each of the clusters, thus eliminating the need for a large length equalizer while still providing improved performance over that of a Rake receiver at large delay spreads. Other aspects, embodiments, and features are also claimed and described. | 07-10-2014 |
20150033098 | DEVICES AND METHODS FOR RECONSTRUCTING CORRUPTED CONTROL CHANNEL BITS - UEs are adapted to facilitate reconstruction of a segment of corrupted bits. According to one example, a UE can receive a control channel transmission such as a HS-SCCH transmission. The control channel transmission may include a plurality of information bits and a plurality of cyclic redundancy check (CRC) bits. The UE may further determine that a contiguous segment of the received information bits is corrupt. The UE may accordingly utilize the uncorrupted information bits and CRC bits to reconstruct the corrupt information bits. In some instances, the UE may utilize the uncorrupted bits to reconstruct the corrupt information bits using a new generator polynomial. In other instances, the UE may utilize the uncorrupted bits to reconstruct the corrupt information bits using the original generator polynomial. Other aspects, embodiments, and features are also included. | 01-29-2015 |
20150071081 | APPARATUSES AND METHODS FOR UPLINK POWER CONTROL IN WIRELESS COMMUNICATION - Aspects of the disclosure provide techniques for improving uplink transmit power control at a user equipment (UE). When the UE is communicating with multiple cells using Multi-flow High-Speed Downlink Packet Access (MF-HSDPA), the UE may control its uplink power based on an improved MF-HSDPA uplink power control algorithm, which is different from an or-of-downs (OOD) transmit power control. In handover, a UE may determine its transmit power to be less than a transmit power requested by a high-speed cell and more than an OOD transmit power. | 03-12-2015 |
Amarnath Gupta, Redwood City, CA US
Patent application number | Description | Published |
---|---|---|
20120128242 | SYSTEM AND METHOD FOR DETECTING SCENE CHANGES IN A DIGITAL VIDEO STREAM - A system and method that processes video to extract a keyframe-based adequate visual representation is disclosed. Certain embodiments utilize a hierarchical processing technique. A first stage in the hierarchy extracts a chromatic difference metric from a pair of video frames. An initial set of frames is chosen based on the chromatic metric and a threshold. A structural difference measurement is extracted from this initial set of frames. A second threshold is used to select key frames from the initial set. The first and second thresholds can be user selectable. The output of this process is the visual representation. The method is extensible to any number of metrics and any number of levels. | 05-24-2012 |
Anand S. Gupta, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20100235615 | METHOD AND SYSTEM FOR DISCOVERY OF A ROOT FILE SYSTEM - A method for discovery of a root file system that includes obtaining a tag corresponding to a boot image for an operating system, identifying, by a boot loader, a location of the boot image having a predefined value matching the tag, loading a kernel of the operating system retrieved from the boot image, and transferring execution to the kernel, wherein the boot loader provides the tag for the location to the kernel. The method further includes identifying, by the kernel, the location of the root file system based on the tag provided by the boot loader, and executing the operating system on a processor using the root file system identified by the kernel. | 09-16-2010 |
Ankur Gupta, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20090089169 | Event Based Serving - Apparatus, system and methods for an event based advertising server are enclosed. Trend data measured over time periods for user queries are measured. A determination is made as to whether an eligibility event for an advertisement has occurred. If an eligibility event is determined to have occurred, eligibility change data for the advertisement is generated. The eligibility change data defines a change to the presentation eligibility of the advertisement and is based on the trend data. | 04-02-2009 |
20120072281 | METHOD AND SYSTEM TO MONETIZE DOMAIN QUERIES IN SPONSORED SEARCH - Techniques are provided for enabling relevant search results and advertisement selections to be generated in response to domain queries. A query that is input to a search engine is received. The query is analyzed to determine whether the search query is a domain query. If the query is determined to be a domain query, at least one domain related segment is stripped from the domain query to generate a condensed query, the condensed query is tokenized into at least one token, and the token(s) is/are spell corrected to generate at least one query feature. The query feature(s) may be normalized to generate at least one normalized query feature. The query feature(s) is/are provided to an advertisement selector to be used to select one or more advertisements. | 03-22-2012 |
20120089456 | SYSTEM FOR SEARCH BID TERM SELECTION - A system is disclosed for selecting bid terms for search advertising. A bid term selection tool includes a processor to execute an algorithm to provide suggested bid terms. The algorithm includes a cosine similarity function, a modified cosine similarity function, a penalty factor function, and an expected revenue function. The bid term selection tool aggregates the function of the algorithm for potential bid terms and compares the totals for the potential bid terms to select a relevant bid term. | 04-12-2012 |
Anshu Gupta, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20120124676 | QUICK PAYMENT USING MOBILE DEVICE BINDING - Methods and systems are provided for secure device binding that provides user convenience through avoiding repetitive logging in when changing apps or moving from website to website. A mobile device undergoes binding to an account so that customers do not always have to enter their password when going through a financial transaction process, on a known (e.g., registered) mobile device. A device may be bound during an initial login, and once logged in, the user can select an option to be “remembered” so that the user need not re-login on the same device for future visits with an app or to a website that shares the service provider library. | 05-17-2012 |
Anshuman Gupta, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20120035414 | CONTOURED ELASTOMERIC BARRIER FOR BOWEL RETENTION AND METHOD OF USE - The invention provides a device for bowel packing having an essentially elliptical shape that is essentially symmetrical along a minor axis of the ellipse, and the device includes a notch located on the minor axis below the major axis. The device is composed of material comprising an elastomeric polymer and the device is appropriately sized for retaining the intestines of a mammal. The invention further provides methods of use of the devices of the invention for bowel packing. The invention further provides methods for increasing bowel packing speed, increasing effectiveness of bowel retention, decreasing the formation of post-operative intraperitoneal adhesions, and increasing temperature of the abdominal cavity during surgery by use of the device. | 02-09-2012 |
Anubhav Gupta, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20100278191 | Hierarchical Rate Limiting of Control Packets - Line cards receive control packets and perform a hierarchical rate limiting on those control packets. A set of identifier keys are extracted from the control packets and the protocol of those control packets are determined. At a first level, the control packets are rate limited per unique set of identifier keys per protocol. Those packets which fail the first rate limiting level are dropped. Those packets which pass the first rate limiting level are rate limited at a second level per protocol type. Those packets which fail the second level rate limiting are dropped while those packets which pass the second level rate limiting are sent to the control card for further processing. | 11-04-2010 |
20120195323 | HIERARCHICAL RATE LIMITING OF CONTROL PACKETS - Line cards receive control packets and perform a hierarchical rate limiting on those control packets. A set of identifier keys are extracted from the control packets and the protocol of those control packets are determined. At a first level, the control packets are rate limited per unique set of identifier keys per protocol. Those packets which fail the first rate limiting level are dropped. Those packets which pass the first rate limiting level are rate limited at a second level per protocol type. Those packets which fail the second level rate limiting are dropped while those packets which pass the second level rate limiting are sent to the control card for further processing. | 08-02-2012 |
20140337553 | METHOD AND SYSTEM FOR INTERRUPT SIGNALING IN AN INTER-INTEGRATED CIRCUIT (I2C) BUS SYSTEM - Embodiments of a method and system are disclosed. One embodiment of a method for signaling an interrupt in an I2C system that includes a master I2C device and at least one slave I2C device that are connected by an SDA line and an SCL line is disclosed. The method involves, at the slave I2C device, pulling the SDA line low to signal an interrupt and at the slave I2C device, releasing the SDA line in response to either the SCL line having been pulled low or the expiration of a predetermined time period, whichever occurs first. In an embodiment, the predetermined time period is 1 ms. | 11-13-2014 |
Anurag P. Gupta, Saratoga, CA US
Patent application number | Description | Published |
---|---|---|
20090245246 | SYSTEMS AND METHODS FOR IMPROVING PACKET SCHEDULING ACCURACY - A packet scheduler is configured to perform quality of service (QoS) scheduling on a per-data unit basis. A downstream processing engine is operatively connected to the packet scheduler for receiving forwarded packets. A feedback path is operatively connected between the downstream processing engine and the packet scheduler for transmitting a net data unit change value reflecting a change in packet size between an output of the packet scheduler and an output of the downstream processing engine. | 10-01-2009 |
20100161949 | SYSTEM AND METHOD FOR FAST BRANCHING USING A PROGRAMMABLE BRANCH TABLE - Methods and systems consistent with the present invention provide a programmable table which allows software to define a plurality of branching functions, each of which maps a vector of condition codes to a branch offset. This technique allows for a flexible multi-way branching functionality, using a conditional branch outcome table that can be specified by a programmer. Any instruction can specify the evaluation of arbitrary conditional expressions to compute the values for the condition codes, and can choose a particular branching function. When the processor executes the instruction, the processor's arithmetic/logical functional units evaluate the conditional expressions and then the processor performs the branch operation, according to the specified branching function. | 06-24-2010 |
20110069615 | SYSTEMS AND METHODS FOR LIMITING LOW PRIORITY TRAFFIC FROM BLOCKING HIGH PRIORITY TRAFFIC - A method for processing high priority packets and low priority packets in a network device includes performing arbitration on high priority packets until no high priority packets remain. Arbitration then is enabled on low priority packets. A packet size associated with the selected low priority packet is compared with a programmable threshold. Low priority packets are excluded from subsequent arbitration for a programmable duration when the packet size exceeds the programmable threshold. | 03-24-2011 |
20110087930 | SELF-CLEANING MECHANISM FOR ERROR RECOVERY - A system manages a buffer having a group of entries. The system receives information relating to a read request for a memory. The system determines whether an entry in the buffer contains valid information. If the entry is determined to contain valid information, the system transmits the information in the entry in an error message. The system may then store the received information in the entry. In another implementation, the system stores data in one of the entries of the buffer, removes an address corresponding to the one entry from an address list, and starts a timer associated with the one entry. The system also determines whether the timer has exceeded a predetermined value, transferring the data from the one entry when the timer has exceeded the predetermined value, and adds the address back to the address list. | 04-14-2011 |
20110158124 | MAINTAINING DATA UNIT ORDER IN A NETWORK SWITCHING DEVICE - Data units received by a network device may be classified into traffic flow classes in which the determined traffic flow class for a data unit may be dynamically refined as the data unit is processed by the network device. A dispatch component of the network device may receive data units associated with traffic flow classes. Parallel processing engines of the network device may receive the data units from the dispatch component and may generate, for a least one of the data units, a plurality of dynamically refined indications of the traffic flow class to which the data unit belongs. Additionally, an ordering component of the network device may include a plurality of re-order queues, where the at least one data unit successively progresses through at least two of the re-order queues in an order defined by the plurality of dynamically refined indications of the traffic flow class. | 06-30-2011 |
20120084534 | SYSTEM AND METHOD FOR FAST BRANCHING USING A PROGRAMMABLE BRANCH TABLE - Methods and systems consistent with the present invention provide a programmable table which allows software to define a plurality of branching functions, each of which maps a vector of condition codes to a branch offset. This technique allows for a flexible multi-way branching functionality, using a conditional branch outcome table that can be specified by a programmer. Any instruction can specify the evaluation of arbitrary conditional expressions to compute the values for the condition codes, and can choose a particular branching function. When the processor executes the instruction, the processor's arithmetic/logical functional units evaluate the conditional expressions and then the processor performs the branch operation, according to the specified branching function. | 04-05-2012 |
20120311175 | GUARANTEED BANDWIDTH MEMORY APPARATUS AND METHOD - Output logic generates read requests using a programmable schedule that controls read bandwidth for multiple data streams and stores the read requests in a queuing device. The output logic also dequeues the read requests based on a similar programmable schedule, forwards the read requests to the memory, and reads data units from the memory based on the read requests. | 12-06-2012 |
20130111156 | FLEXIBLE PIN ALLOCATION | 05-02-2013 |
Arjun Gupta, Los Angeles, CA US
Patent application number | Description | Published |
---|---|---|
20120185300 | METHODS AND SYSTEMS FOR ANALYZING AND PROVIDING DATA FOR BUSINESS SERVICES - Apparatus and methods for collecting information may include receiving one or more inputs of information related to a business experience. In addition, the apparatus and methods may include storing the received business information. The methods may also include analyzing the received information to generate one or more targeted recommendations; and forwarding the one or more targeted recommendations to management of the business. | 07-19-2012 |
Arun Gupta, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20110153603 | TIME SERIES STORAGE FOR LARGE-SCALE MONITORING SYSTEM - Methods and apparatus are described for collecting and storing large volumes of time series data. For example, such data may comprise metrics gathered from one or more large-scale computing clusters over time. Data are gathered from resources which define aspects of interest in the clusters, such as nodes serving web traffic. The time series data are aggregated into sampling intervals, which measure data points from a resource at successive periods of time. These data points are organized in a database according to the resource and sampling interval. Profiles may also be used to further organize data by the types of metrics gathered. Data are kept in the database during a retention period, after which they may be purged. Each sampling interval may define a different retention period, allowing operating records to stretch far back in time while respecting storage constraints. | 06-23-2011 |
Bindu Gupta, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20110279184 | AREA EFFICIENT CONCURRENT MATCHING TRANSCEIVER - An integrated circuit for transmit and receive matching is described. The integrated circuit includes a transmit amplifier. The transmit amplifier includes a first transistor, a second transistor and a first inductor. The first inductor couples the first transistor to the second transistor. The integrated circuit also includes a low noise amplifier. The low noise amplifier includes a third transistor, a fourth transistor, the first inductor, a second inductor, a third inductor and a transformer. The second inductor couples the first inductor to the third transistor. The third inductor couples the third transistor to ground. | 11-17-2011 |
20150084688 | BASEBAND PROCESSING CIRCUITRY - Techniques for designing baseband processing circuitry for radio IC's. In an aspect, techniques for differential-to-single-ended conversion in a baseband portion of the IC are disclosed to reduce the pin count and package size for RF IC's. In another aspect, the converter includes selectable narrowband and wideband amplifiers, wherein the wideband amplifiers may be implemented using transistor devices having smaller area than corresponding transistor devices of narrowband amplifiers. Further techniques for bypassing one or more elements, and for implementing a low-pass filter of the converter using an R-C filter network, are described. | 03-26-2015 |
Binita Gupta, La Jolla, CA US
Patent application number | Description | Published |
---|---|---|
20110299587 | METHODS AND SYSTEMS FOR RESIZING MULTIMEDIA CONTENT BASED ON QUALITY AND RATE INFORMATION - In general, this disclosure describes techniques for exchanging information between a plurality of encoder modules and a multiplex module to combine segments of data from the encoder modules with an improved overall quality. In particular, the encoder modules associate their respective segments of data with quality and rate information and send at least the quality and rate information associated with the segments of data to the multiplex module. The multiplex module analyzes the quality and rate information to determine whether the segments of data that encoder modules desire to include in the current superframe fit within the available bandwidth of a transmission channel. If the multiplex module determines the plurality of segments of data do not fit within the available bandwidth, the multiplex module selects one or more of the segments to be resized based on the quality and rate information received from the encoder modules. | 12-08-2011 |
20130130705 | METHODS AND APPARATUS FOR RF CHANNEL SELECTION IN A MULTI-FREQUENCY NETWORK - Methods and apparatus for RF channel selection in a multi-frequency network. A method includes identifying selected local operations infrastructures (LOIs) and their neighboring LOIs, generating a neighbor description message (NDM) that identifies the selected LOIs and their neighboring LOIs and associates a descrambling sequence identifier with each RF channel of the selected LOIs and their neighboring LOIs, and distributing the NDM over the selected LOIs. An apparatus includes a message decoder to receive an NDM that identifies RF channels of a first LOI and neighboring LOIs, and wherein each RF channel is associated with a descrambling sequence identifier, and processing logic to detect content acquisition failures, determine a list of RF channels and their associated LOIs that carry desired content, and select a selected RF channel that is associated with a selected LOI that carries the most additional content among the associated LOIs. | 05-23-2013 |
Deepa Gupta, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20110208705 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR STORING FILE SYSTEM CONTENT IN A MULTI-TENANT ON-DEMAND DATABASE SYSTEM - In accordance with embodiments, there are provided mechanisms and methods for storing file system content in a multi-tenant on-demand database system. These mechanisms and methods for storing file system content in a multi-tenant on-demand database system can enable embodiments to reduce a number of files stored on a file system, avoid copying of all file system content to file system copies, etc. | 08-25-2011 |
20130246373 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR STORING FILE SYSTEM CONTENT IN A MULTI-TENANT ON-DEMAND DATABASE SYSTEM - In accordance with embodiments, there are provided mechanisms and methods for storing file system content in a multi-tenant on-demand database system. These mechanisms and methods for storing file system content in a multi-tenant on-demand database system can enable embodiments to reduce a number of files stored on a file system, avoid copying of all file system content to file system copies, etc. | 09-19-2013 |
Deepak Gupta, Stanford, CA US
Patent application number | Description | Published |
---|---|---|
20110244566 | Enhanced efficiency of induced pluripotent stem cell generation - Human somatic cells are reprogrammed to become induced pluripotent stem cells (iPS cells) by the introduction of a minicircle DNA vector. Cells of interest include adipose stem cells. | 10-06-2011 |
Dhruv Gupta, Davis, CA US
Patent application number | Description | Published |
---|---|---|
20110299422 | METHOD, APPARATUS, AND SYSTEM FOR CONNECTING A MOBILE CLIENT TO WIRELESS NETWORKS - A method for connecting a mobile client to a wireless network includes periodically triggering an access point scanning process so as to monitor an access point density of a wireless network. A frequency of the triggering is adjusted in response to a change in the access point density. | 12-08-2011 |
Dipankar Gupta, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20080256080 | Sharing Media Content Among Families of Broadcast Stations - Sharing media content among families of broadcast stations includes receiving information relating to media content from families of broadcast stations, storing the information such that the information is accessible to at least two of the families of broadcast stations via a computer network, receiving a query for specific media content from a broadcast station, searching the stored information in accordance with the query to identify the specific media content; and enabling the broadcast station to access to the specific media content if the specific media content is identified among the stored information. | 10-16-2008 |
Diwaker Gupta, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20120042196 | MANAGEMENT OF A DISTRIBUTED COMPUTING SYSTEM THROUGH REPLICATION OF WRITE AHEAD LOGS - Several methods and a system of a replicated service for write ahead logs are disclosed. In one embodiment, a method includes persisting a state of a distributed system through a write ahead log (WAL) interface. The method also includes maintaining a set of replicas of a WAL through a consensus protocol. In addition, the method includes providing a set of mechanisms for at least one of detection and a recovery from a hardware failure. The method further includes recovering a persistent state of a set of applications. In addition, the method includes maintaining the persistent state across a set of nodes through the hardware failover. In one embodiment, the system may include a WAL interface to persist a state of a distributed system. The system may also include a WAL replication servlet to maintain and/or recover a set of replicas of a WAL. | 02-16-2012 |
20140101484 | MANAGEMENT OF A DISTRIBUTED COMPUTING SYSTEM THROUGH REPLICATION OF WRITE AHEAD LOGS - Several methods and a system of a replicated service for write ahead logs are disclosed. In one embodiment, a method includes persisting a state of a distributed system through a write ahead log (WAL) interface. The method also includes maintaining a set of replicas of a WAL through a consensus protocol. In addition, the method includes providing a set of mechanisms for at least one of detection and a recovery from a hardware failure. The method further includes recovering a persistent state of a set of applications. In addition, the method includes maintaining the persistent state across a set of nodes through the hardware failover. In one embodiment, the system may include a WAL interface to persist a state of a distributed system. The system may also include a WAL replication servlet to maintain and/or recover a set of replicas of a WAL. | 04-10-2014 |
20150058935 | Out-of-Path, Content-Addressed Writes with Untrusted Clients - A method in data storage involves receiving at a metadata server from a client device a BEGIN_WRITE request identifying data to be written by hashes, consulting, by the metadata server a deduplication table to determine historical nature of the data determined to be written, determining that the data was never previously written, was previously written by another client, or was previously written but failed a verification, sending to the client device write locations with tokens for the data, starting an authentication timer, and authorizing the client device to write directly to the data server using the authentication tokens and the authenticated write locations, determining that the data was previously written by the same client, or that the data was previously written and passed the verification test, notifying the client of this circumstance, and receiving from the client device an END_WRITE request. | 02-26-2015 |
Gaurav Gupta, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20110235499 | SYSTEM AND METHOD FOR ECHO SUPPRESSION IN WEB BROWSER-BASED COMMUNICATION - A system and method for performing echo suppression on a server in browser-based online audio conferences without downloading or installing software on a participant's computing device is disclosed. Streams of audio communication data from the participants in an audio conference are received at the server. An echo suppression application determines the first party that speaks by analyzing the streams to locate speech data, and assigns that party as the “owner” of the audio channel. The speech data is sent to the other participants in the conference. The application then determines whether newly received audio from the owner of the channel is new speech; if so, then the party remains the owner of the channel, and the new speech data is also sent to the other parties in the conference. The channel is surrendered if no new speech is received from the owner in a defined period, and the next party that speaks becomes the new owner of the channel. The other audio data from the participants is replaced by silence. | 09-29-2011 |
20130041871 | DATA VOLUME MANAGEMENT - Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project. | 02-14-2013 |
20130042008 | ELASTIC SCALING OF DATA VOLUME - Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project. | 02-14-2013 |
20130054537 | DATA VOLUME MANAGEMENT - Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project. | 02-28-2013 |
20130054814 | ELASTIC SCALING OF DATA VOLUME - Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project. | 02-28-2013 |
20140059036 | ELASTIC SCALING OF DATA VOLUME - Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project. | 02-27-2014 |
20140297521 | Elastic Scaling of Data Volume - Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project. | 10-02-2014 |
20140344900 | Project Resource Access Control - Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project. | 11-20-2014 |
Honey Gupta, Sherman Oaks, CA US
Patent application number | Description | Published |
---|---|---|
20100095551 | Footwear, footwear inserts and socks for reducing contact forces - Footwear, footwear inserts and socks that include a cavity adapted to receive a portion of an individual's heel foot to reduce contact forces. The cavity can be adapted to contain a liquid, a solid or two layers of material in which the stiffness of the layers differ. | 04-22-2010 |
20110041237 | Portable personally attachable systems for delivering conditioned air to personal breathing zones and other body areas - An apparatus for use in creating a zone of conditioned air on or near a person's body comprising: a blower unit configured to produce a flow of conditioned air; an air delivery system that is detachably connected to and is in flow communication with the blower unit, the said air delivery system having at least one outlet for discharging air. | 02-24-2011 |
Jitendra Gupta, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20120010930 | METHODS FOR AUTHENTICATING A PURCHASE USING LOCATION BASED MOBILE SERVICE - In various embodiments, a rewards program may provide users with rewards for transacting with a merchant. In various embodiments, the transactions are validated before a user is allowed to receive a reward. In various embodiments, a mobile device is used to validate a transaction. In various embodiments, a mobile device may store an indication of a user's progress towards earning a reward. | 01-12-2012 |
Kirti Gupta, La Jolla, CA US
Patent application number | Description | Published |
---|---|---|
20110206009 | METHOD AND APPARATUS FOR INTER-SYSTEM HANDOVER - An inter-system handover system for a wireless communication system supports hand-down and hand-up of user equipment (UE) to different radio access technologies, including synchronous and asynchronous systems. Latency and handover connection failures are reduced by an access node (nodeB) broadcasting information about neighboring systems (targets) when the UE reception (RX) capability is both inside or outside the reception range of the target. A single RX chain is sufficient, although transitioning between a wireless wide area network (WWAN) to a wireless local area network may (WLAN) may advantageously benefit from simultaneous operation on two Rx chains. Optimized list of neighboring RAT systems (targets) are broadcast from the network, including measurement parameters and reporting instructions. Thereby, UE-driven reporting minimizes latencies. UE reports other-system searches to network only if needed for a handover. In addition, handover requests can be bundled with other-system measurement information, if necessary, for additional efficiencies. | 08-25-2011 |
Kshitij Gupta, Davis, CA US
Patent application number | Description | Published |
---|---|---|
20100303227 | ON-HOLD CALL MONITORING SYSTEMS AND METHODS - Systems and methods are provided for monitoring telephone calls that are placed on hold. The telephone calls may be between user electronic devices and call centers, such as customer service departments. In some embodiments, the electronic device can monitor an on-hold telephone call using a background process, which may free up a user interface of the electronic device for one or more non-phone-related tasks. The electronic device can monitor the telephone call for an indicator that a live operator is or will soon be present on the telephone call. Responsive to detecting the indicator, the electronic device can alert the user and allow the user to take control of the telephone call. In some embodiments, the electronic device can obtain information about the call center, such as expected on-hold wait-times, to determine whether an on-hold call should be monitored. | 12-02-2010 |
Laxmi C. Gupta, Los Alamitos, CA US
Patent application number | Description | Published |
---|---|---|
20090292032 | Fire retardant foam and methods of use - Fire retardant foam systems comprise a first part comprising at least one ingredient having NCO functionality; and a second part comprising at least one ingredient having an active hydrogen functionality that is co-reactive with the NCO, wherein the first part and the second part are formulated so that when the parts are mixed together they form a cured foam. The foam system comprises a first fire retardant ingredient that is a phosphorus-based compound, a second fire retardant ingredient that is an intumescent material, and a third fire retardant ingredient that is a brominated ingredient additionally having an active hydrogen functionality that is co-reactive with the NCO of the first part. | 11-26-2009 |
20090309077 | FIRE RETARDANT COATINGS AND BODIES, AND METHODS OF USE - Fire retardant coating systems and solid body cast systems comprise a first part comprising at least one ingredient having NCO functionality; and a second part comprising at least one ingredient having an active hydrogen functionality that is co-reactive with the NCO, wherein the first part and the second part are formulated so that when the parts are mixed together they form a cured coating or a solid body. The coating system or solid body cast system comprises a first fire retardant ingredient that is a phosphorus-based compound, a second fire retardant ingredient that is an intumescent material, and a third fire retardant ingredient that is a brominated ingredient. Methods for preparing a fire retardant coating or solid body are also described. | 12-17-2009 |
Manav Gupta, Redwood City, CA US
Patent application number | Description | Published |
---|---|---|
20110060663 | System and Method of Providing Customer Purchase Propensity Information to Online Merchants - A system for providing online merchants with purchase propensity information is provided. The system includes a processor and a purchase propensity module executable by the processor. The purchase propensity module receives, from an online merchant computer, a message containing a customer identifier that identifies a customer who has established an online browsing session with the online merchant. In response, the purchase propensity module transmits to the online merchant computer purchase propensity data associated with the identified customer while the browsing session is in progress. This allows the online merchant computer to determine a targeted offer for the user while the user is in the online browsing session. | 03-10-2011 |
Mayank Gupta, Mipitas, CA US
Patent application number | Description | Published |
---|---|---|
20110239044 | MANAGEMENT AND TRACKING OF COMPLEX ENTITLEMENT BENEFITS - Methods and systems for management and tracking of complex entitlement benefits are disclosed. For example, a method can include identifying a processing error within a distributed transaction processing system, assessing an impact of the processing error, and determining a recovery strategy to minimize the impact of the processing error. The processing error can be associated with the application of an entitlement to a plurality of transactions. The entitlement can include a defined benefit and a benefit counter. The benefit counter can control a quantity of transactions allowed to receive the entitlement. The impact of the processing error can be assessed in regard to the plurality of transactions. | 09-29-2011 |
Monika Gupta, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20110115741 | TOUCH SENSITIVE PANEL SUPPORTING STYLUS INPUT - Operating a user input device by scanning touch sensitive elements of a touch pad to measure touch sensitive element values. The touch sensitive element values are compared to a stylus input threshold pattern. Upon a favorable comparison, a stylus input condition is determined, stylus input touch pad processing settings are enacted, and a position of the stylus upon the touch pad is detected. Detection of the stylus position upon the touch pad is based upon the touch sensitive element values and the stylus input touch pad processing settings. The touch sensitive element values are compared to a touching finger threshold pattern. Upon a favorable comparison, a touching finger condition is determined, touching finger touch pad processing settings are enacted, and the touching finger's position upon the touch pad is detected based upon the touch sensitive element values. | 05-19-2011 |
20110115742 | TOUCH SENSITIVE PANEL DETECTING HOVERING FINGER - A touch sensitive pad with a plurality of touch sensitive elements and processing circuitry coupled to a communications interface and to the touch sensitive pad for scanning the plurality of touch sensitive elements to measure a plurality of touch sensitive element values. The plurality of touch sensitive element values is compared to a hovering finger threshold pattern. Upon a favorable comparison, a hovering finger condition is determined, and a position of the hovering finger in three-dimensions is detected with respect to the touch sensitive pad. The plurality of touch sensitive element values is compared to a touching finger threshold pattern. Upon a favorable comparison, a touching finger condition is determined, and a position of the touching finger is detected upon the touch sensitive pad. | 05-19-2011 |
20110118025 | GAME CONTROLLER WITH TOUCH PAD USER INTERFACE - A game controller with a communications interface, at least one touch sensitive pad having a plurality of touch sensitive elements, and processing circuitry coupled to the communications interface and the at least one touch sensitive pad. The processing circuitry receives touch pad input via the plurality of touch sensitive elements of the at least one touch sensitive pad. The processing circuitry then transmits the touch pad input to a game console via the communications interface. The touch sensitive pad can have a plurality of separate and distinct touch sensitive pads, allowing the processing circuitry to receive touch pad input via each of the plurality of separate and distinct touch sensitive pads. Touch pad input could include user finger and/or user thumb touch pad input. | 05-19-2011 |
20110118026 | HAND-HELD GAMING DEVICE THAT IDENTIFIES USER BASED UPON INPUT FROM TOUCH SENSITIVE PANEL - Operating a game controller to identify a user by receiving touch pad input from at least one touch sensitive pad of the game controller that has a plurality of touch sensitive elements. The touch pad input corresponds to the user's touch of at least some of the plurality of touch sensitive elements. The touch pad input is at least partially processed by processing circuitry of the game controller and transmitted to a game console via a communications interface of the game controller for processing of the at least partially processed touch pad input to identify the user via pattern recognition. At least partially processing the touch pad input can be by identifying at least one finger orientation, at least one finger spacing, at least one finger width, a plurality of finger knuckle/joint locations, and/or a plurality of finger lengths based upon the touch pad input. | 05-19-2011 |
20110118028 | HAND-HELD GAMING DEVICE WITH CONFIGURABLE TOUCH SENSITIVE PANEL(S) - A game controller with a communications interface, at least one touch sensitive pad having a plurality of touch sensitive elements, and processing circuitry coupled to the communications interface and the at least one touch sensitive pad. The processing circuitry enacts touch pad configuration settings that correlate subsets of the plurality of touch sensitive elements to respective distinct user input locations. The processing circuitry receives touch pad input from the at least one touch sensitive pad. The touch pad input corresponds to a user's touch of at least some of the plurality of touch sensitive elements. The processing circuitry processes the touch pad input to determine user input directions based upon the touch pad configuration settings, and then transmits the touch pad input directions to a game console via the communications interface for use as gaming input. | 05-19-2011 |
20130237322 | HAND-HELD GAMING DEVICE WITH CONFIGURABLE TOUCH SENSITIVE PANEL(S) - A game controller with a communications interface includes a touch sensitive pad having a plurality of touch sensitive elements, and processing circuitry coupled to the communications interface and the at least one touch sensitive pad. The processing circuitry enacts touch pad configuration settings that correlate subsets of the plurality of touch sensitive elements to produce distinct user input locations. The processing circuitry receives touch pad input from the at least one touch sensitive pad. The processing circuitry processes the touch pad input to determine user input directions based upon the touch pad configuration settings, and then transmits the touch pad input directions via the communications interface for use as gaming input. | 09-12-2013 |
Munish Gupta, Carmichael, CA US
Patent application number | Description | Published |
---|---|---|
20100042149 | PELVIC OBLIQUITY CORRECTION INSTRUMENT - A pelvic obliquity correction instrument and methods of use are provided. The pelvic obliquity correction instrument includes a first engagement arm for engaging a portion of a spinal fixation system where the first engagement arm is adjustably coupled to a handle assembly. The pelvic obliquity correction instrument also includes a second engagement arm for engaging a second portion of the spinal fixation system. A surgeon exerts force on a first grip at a first end of the handle assembly and a second grip at a second end of the handle assembly to reposition a patient's pelvic bone. The pelvic obliquity correction instrument may provide a surgeon with greater precision, control and torque when rotating a patient's pelvic bone with respect to a superior portion of the patient's spine. | 02-18-2010 |
20120136278 | STRAIN MONITORING SYSTEM AND APPARATUS - A system for monitoring strain as an indicator of biological conditions, such as spinal fusion, glucose levels, spinal loading, and heart rate. The system includes an inter-digitated capacitor sensor, and RF transmitter, and an associated antenna, all of which are microminiature or microscopic in size and can be implanted in a biological host such as a human or animal. An inductively coupled power supply is also employed to avoid the need for implantation of chemical batteries. Power is provided to the sensor and transmitter, and data is transmitted from the sensor, when an external receiving device, such as a handheld RF ID type receiver, is placed proximate the location of the implanted sensor, transmitter and inductively coupled power supply. The implanted sensor, transmitter and inductively coupled power supply can be left in place permanently or removed when desired. | 05-31-2012 |
20140066814 | STRAIN MONITORING SYSTEM AND APPARATUS - A system for monitoring strain as an indicator of biological conditions, such as spinal fusion, glucose levels, spinal loading, and heart rate. The system includes an inter-digitated capacitor sensor, and RF transmitter, and an associated antenna, all of which are microminiature or microscopic in size and can be implanted in a biological host such as a human or animal. An inductively coupled power supply is also employed to avoid the need for implantation of chemical batteries. Power is provided to the sensor and transmitter, and data is transmitted from the sensor, when an external receiving device, such as a handheld RF ID type receiver, is placed proximate the location of the implanted sensor, transmitter and inductively coupled power supply. The implanted sensor, transmitter and inductively coupled power supply can be left in place permanently or removed when desired. | 03-06-2014 |
Munish Chandra Gupta, Carmichael, CA US
Patent application number | Description | Published |
---|---|---|
20100268232 | DELIVERY SYSTEMS, TOOLS, AND METHODS OF USE - A covering for delivering a substance or material to a surgical site is provided. The covering, with substance provided therein, may be referred to as a delivery system. Generally, the covering may be a single or multi-compartment structure capable of at least partially retaining a substance provided therein until the covering is placed at a surgical site. Upon placement, the covering may facilitate transfer of the substance or surrounding materials. For example, the substance may be released (actively or passively) to the surgical site. The covering may participate in, control, or otherwise adjust the release of the substance. In various embodiments, the covering is suitable for a variety of procedure specific uses. Implantation tools may be provided for placing the covering at a surgical site. Kits may be provided including variously sized or shaped coverings and one or more tools for use in placing the covering. | 10-21-2010 |
20110054408 | DELIVERY SYSTEMS, DEVICES, TOOLS, AND METHODS OF USE - A covering for delivering a substance or material to a surgical site is provided. The covering, with substance provided therein, may be referred to as a delivery system. Generally, the covering may be a single or multi-compartment structure capable of at least partially retaining a substance provided therein until the covering is placed at a surgical site. Upon placement, the covering may facilitate transfer of the substance or surrounding materials. For example, the substance may be released (actively or passively) to the surgical site. The covering may participate in, control, or otherwise adjust the release of the substance. In various embodiments, the covering is suitable for a variety of procedure specific uses. Implantation tools may be provided for placing the covering at a surgical site. Kits may be provided including variously sized or shaped coverings and one or more tools for use in placing the covering. | 03-03-2011 |
Nagesh Chandrasekaran Gupta, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20090178017 | SYSTEM AND METHOD FOR I/O SYNTHESIS AND FOR ASSIGNING I/O TO PROGRAMMABLE DEVICES - A method for connecting a programmable device (PD) and an electronic component (EC) based on a protocol, including: obtaining a signal group of the protocol having a group constraint, a first pin definition including an electrical constraint and a logical constraint, and a second pin definition; mapping the first pin definition to a first pin of the PD based on the electrical constraint, the logical constraint, and the group constraint; identifying a first pin of the EC to connect with the first pin of the PD based on the electrical constraint, the logical constraint, the group constraint, and a connection preference; generating a first connection between the first pin of the EC and a second pin of the PD based on the electrical constraint, the logical constraint, the group constraint, and the connection preference; and storing the first connection in an edge list. | 07-09-2009 |
Namit Gupta, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20120180015 | SYSTEM AND METHOD FOR METASTABILITY VERIFICATION OF CIRCUITS OF AN INTEGRATED CIRCUIT - A method and system for metastability verification of an integrated circuit design are provided. An IC design is received and the source-to-destination paths of the IC design are determined. For each of the determined source-to-destination paths, it is determined whether the corresponding source is synchronized. For each source its respective synchronized or unsynchronized result is stored and a report is generated for each source describing whether it is synchronized or unsynchronized. | 07-12-2012 |
20130246989 | SYSTEM AND METHOD FOR METASTABILITY VERIFICATION OF CIRCUITS OF AN INTEGRATED CIRCUIT - A system and methods for metastability verification of an integrated circuit design are provided. An IC design is received and the source-to-destination paths of the IC design are determined. For each of the determined source-to-destination paths, it is determined whether the corresponding source is synchronized. For each source its respective synchronized or unsynchronized result is stored and a report is generated for each source describing whether it is synchronized or unsynchronized. The system may be at least a portion of a computer aided design (CAD) system. | 09-19-2013 |
Neeraj Gupta, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20110196741 | ONLINE AND OFFLINE INTEGRATED PROFILE IN ADVERTISEMENT TARGETING - The present invention provides techniques for generation and use of an online and offline integrated profile for a person, for use in advertisement targeting. The integrated profile may be generated based at least in part on obtained historical offline and online consumer-related behavior information relating to the person. Online or offline advertisements are then targeted to the person based at least in part on the profile. Use and association of online and offline unique identifiers for the person can allow sharing of targeting information between online and offline entities while maintaining a degree of privacy with regard to the person. | 08-11-2011 |
Neil Gupta, Costa Mesa, CA US
Patent application number | Description | Published |
---|---|---|
20090286647 | Compensator for Continuously Variable Transmission - A continuously variable transmission may have a first set of rollers and a second set of rollers that act upon skewed driving and driven surfaces of discs. The input to output ratio of the continuously variable transmission may be changed by pushing either one of the first and second sets of rollers closer to a rotating shaft. To maintain symmetrical loading within the continuously variable transmission, an idler disc assembly may have a strain compensator that deflects to compensate for deflection of outer discs due to elasticity of the main shaft. | 11-19-2009 |
Parag Gupta, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20110149937 | TECHNIQUE FOR MANAGING WIRELESS NETWORKS - Network connectivity may be managed on a computing device. An identifier of each wireless access point or network that is available at a given location is determined. The identifier determined without the device attempting to connect to any available wireless access point or network at the given location. Each determined identifier is compared to one or more network identifiers that are known to the device. The device connects to an available wireless access point having the identifier that is known and detected. | 06-23-2011 |
Pavan Gupta, San Mateo, CA US
Patent application number | Description | Published |
---|---|---|
20110227175 | Stacked Die Package for MEMS Resonator System - A stacked die package for an electromechanical resonator system includes a chip that contains an electromechanical resonator bonded onto the control chip for the electromechanical resonator by a thermally and/or electrically conductive epoxy. In various embodiments, the electromechanical resonator can be a micro-electromechanical system (MEMS) resonator or a nano-electromechanical system (NEMS) resonator. Packaging configurations that may include the chip that contains the electromechanical resonator and the control chip include chip-on-lead (COL), chip-on-paddle (COP), and chip-on-tape (COT) packages. The stacked die package provides small package footprint and/or low package thickness, as well as low thermal resistance and a robust conductive path between the chip that contains the electromechanical resonator and the control chip. | 09-22-2011 |
20120170103 | Spatial Light Modulators and Fabrication Techniques - We describe a method of fabricating an optical MEMS spatial light modulator (SLM). The method comprises providing an optical MEMS SLM wafer bearing multiple optical MEMS SLM devices and spin coating a glass wafer with an organic adhesive, in some preferred embodiments benzocyclobutene. The adhesive is patterned, preferably by uv lithography, to define multiple ring-shaped bond lines each sized to fit around one of the SLM devices, and the glass wafer is then bonded to the MEMS SLM wafer, preferably at a temperature of between 100° C. and 450° C., such that each of the ring-shaped bond lines encompasses a respective SLM device. A portion of the glass wafer adjacent an SLM device is then removed to reveal electrical connectors to the device and the devices are tested before dicing and packaging, to enable selective packaging of working devices. | 07-05-2012 |
20130075853 | Stacked Die Package for MEMS Resonator System - A stacked die package for an electromechanical resonator system includes an electromechanical resonator die bonded or fixed to a control IC die for the electromechanical resonator by, for example, a thermally and/or electrically conductive epoxy. In various embodiments, the electromechanical resonator can be a micro-electromechanical system (MEMS) resonator or a nano-electromechanical system (NEMS) resonator. Certain packaging configurations that may include the chip that contains the electromechanical resonator and the control chip include chip-on-lead (COL), chip-on-paddle (COP), and chip-on-tape (COT) packages. The stacked die package may provide small package footprint and/or low package thickness, and low thermal resistance and a robust conductive path between the dice. | 03-28-2013 |
20150035090 | STACKED DIE PACKAGE FOR MEMS RESONATOR SYSTEM - In a packaging structure for a microelectromechanical-system (MEMS) resonator system, a resonator-control chip is mounted on a lead frame having a plurality of electrical leads, including electrically coupling a first contact on a first surface of the resonator-control chip to a mounting surface of a first electrical lead of the plurality of electrical leads through a first electrically conductive bump. A MEMS resonator chip is mounted to the first surface of the resonator-control chip, including electrically coupling a contact on a first surface of the MEMS resonator chip to a second contact on the first surface of the resonator-control chip through a second electrically conductive bump. The MEMS resonator chip, resonator-control chip and mounting surface of the first electrical lead are enclosed within a package enclosure that exposes a contact surface of the first electrical lead at an external surface of the packaging structure. | 02-05-2015 |
20150041928 | WAFER ENCAPSULATED MICROELECTROMECHANICAL STRUCTURE - A cavity is formed within a first substrate together with trenches that separate first and second portions of the first substrate from each other and from the remainder of the first substrate. The first portion of the first substrate is disposed within the cavity and constitutes a microelectromechanical structure, while the second portion of the substrate is disposed at least partly within the cavity and constitutes a first portion of an electrical contact. A second substrate is secured to the first substrate over the cavity to define a chamber containing the microelectromechanical structure. The second substrate has a first portion that constitutes a second portion of the electrical contact and is disposed in electrical contact with the second portion of the first substrate such that the electrical contact extends from within the chamber to an exterior of the chamber. | 02-12-2015 |
Piyush Gupta, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20110193243 | Unique Package Structure - A system in a package comprising a flip chip semiconductor die on a package substrate, a spacer on the package substrate, and a wire bond semiconductor die supported by the spacer and the flip chip semiconductor die. | 08-11-2011 |
Pratibha Gupta, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20120131641 | OPTIMIZING INTERACTIONS BETWEEN CO-LOCATED PROCESSES - In one set of embodiments, methods, systems, and apparatus are provided to enable secure local invocation of a web service in response to receiving a request from a first composite application to invoke a web service operation of a second composite application, where the first application is associated with a reference policy, and the second application is associated with a service policy, then determining, based upon the service policy and the reference policy, whether local invocation is secure, and invoking the operation using the local invocation in response to determining that the local invocation is secure. Attributes associated with the reference and service policies can indicate whether those policies can be used in a local invocation, or if user authentication is needed before performing the invocation with those policies. The local invocation may comprise a procedure call in an application server from the first application to the second application. | 05-24-2012 |
20130086629 | DYNAMIC IDENTITY CONTEXT PROPAGATION - Techniques are provided for dynamically propagating identity context for a user in a Service-Oriented Architecture. Methods and apparatus are provided that include receiving a request to invoke a web service, retrieving first security claims from application identity context information pertaining to a user, generating second security claims at runtime, packaging the first and second security claims into an authentication token, and transmitting the authentication token to a second computer system in a service request. The second computer system can be configured to extract the first and second security claims from the authentication token, validate the extracted first and second security claims, generate identity context information based upon the extracted first and second security claims, and publish and propagate the identity content information in an identity context object. The second computer system can verify that the security claims conform to corresponding security claim schemas stored in a claims dictionary. | 04-04-2013 |
20130086630 | DYNAMIC IDENTITY SWITCHING - Techniques are disclosed for dynamically switching user identity when generating a web service request by receiving, at a client application, an invocation of a web service, the invocation associated with a first authenticated user identity of a first user, identifying a second user identity, verifying that a switch from the first user identity to the second user identity is permitted by switching rules, including the second user identity in a service request when the switch is permitted, and communicating the service request to the web service. The switching rules can include associations between initial user identities and permitted user identities. Verifying that a switch is permitted can include searching the associations for an entry having an initial user identity that matches the first authenticated user identity and a new user identity that matches the second user identity, wherein the switch is permitted when the entry is found. | 04-04-2013 |
20130086651 | RE-AUTHENTICATION IN SECURE WEB SERVICE CONVERSATIONS - Techniques are disclosed for sharing communication session information, such as encryption keys for data protection, among multiple communication operations and/or multiple users. Multiple users can share the same communication session concurrently, with each message being individually authenticated. The provided techniques include receiving, at a client application, a first request to send a first web service message to a web service application or group of web services, retrieving existing communication session information having the same sharing characteristics as the first request, where the sharing characteristics include web service environment information and/or request information, including the user credentials associated with the user in the message and in each subsequent message communicated using the existing communication session information, and communicating the web service message to the web service application or group of web services using the existing communication session information. | 04-04-2013 |
20130086652 | SESSION SHARING IN SECURE WEB SERVICE CONVERSATIONS - Techniques are disclosed for sharing communication session information sharing in web service applications. The techniques include management of concurrent sessions by dynamically determining the session association of web service requests at runtime. These sessions can be shared by a group of web services on the server side, and across multiple web services clients with many users, independently of where these applications reside. Session identifiers are determined for these concurrent web service invocations based on an algorithm that uses information from configuration and runtime data. Different information is used in the session identifier depending on configuration parameters to provide different types of sharing that correspond to different use cases. This mechanism can be used with SOAP-based web services, REST-based web services, and the like. | 04-04-2013 |
Pravir K. Gupta, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20120109941 | ENRICHING SEARCH RESULTS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for enhancing search results. In one aspect, a method includes identifying a plurality of registered publishers for enriched search results and, for each registered publisher, obtaining enrichment information from the registered publisher and associating the enrichment information with a resource provided by the publisher. A query is received. A plurality of responsive resources that are responsive to the query are identified. A first responsive resource is determined to be associated with enrichment information. An enriched search result is provided, the enriched search result identifying the first responsive resource and including the first responsive resource's associated enrichment information. | 05-03-2012 |
20130218861 | Related Entities - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for receiving a first search query from a user device; receiving search results for the first search query provided by a search engine, wherein each of the search results identifies a respective resource; determining from the search results that the first search query relates to a first entity of a first entity type; determining that one or more entities of a second entity type have a predetermined relationship with the first entity; and transmitting information identifying the one or more entities of the second type to the user device as part of a response to the first search query. | 08-22-2013 |
20130238594 | Related Entities - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying entities that are related to an entity to which a search query is directed. One of the methods includes receiving a search query, wherein the search query has been determined to relate to a first entity of a first entity type, and wherein one or more entities of a second entity type have a relationship with the first entity; receiving search results for the search query; determining that a count of search results identifying a resource containing a reference to the first entity satisfies a first threshold value; determining that a count of search results identifying a resource having the second entity type as a relevant entity type satisfies a second threshold value; and transmitting information identifying the one or more entities of the second entity type as part of the response to the search query. | 09-12-2013 |
Priyanshu Gupta, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20100130996 | DEVICES AND METHODS FOR MANIPULATING A CATHETER SHAFT - A catheter for performing a procedure at a treatment site in the lumen of a blood vessel. The catheter includes an elongate tubular shaft having a proximal bend, a distal bend and a hinge element. A distal portion of the shaft includes a window extending through the sidewall of the shaft between the hinge element and the distal end of the elongate tubular shaft. A working element is disposed within the lumen of the elongate tubular shaft and is configured for performing the procedure through the window at the treatment site. The bends and hinge element are configured to urge the window against a wall of the vessel at the treatment site. | 05-27-2010 |
20120253186 | OCCLUSION-CROSSING DEVICES, IMAGING, AND ATHERECTOMY DEVICES - The present invention relates to: ( | 10-04-2012 |
20140213893 | OCCLUSION-CROSSING DEVICES, IMAGING, AND ATHERECTOMY DEVICES - A catheter device for crossing occlusions includes an elongate body, a central lumen extending within the elongate body from the proximal end to the distal end, a rotatable tip at the distal end of the elongate body, and an OCT imaging sensor. The rotatable tip is configured to rotate relative to the elongate body. The OCT imaging sensor includes an optical fiber coupled with the rotatable tip and configured to rotate therewith. A distal end of the elongate body includes one or more markers configured to occlude the OCT imaging sensor as it rotates. A fixed jog in the elongate body proximal to the distal end of the catheter positions the distal end of the catheter at an angle relative to the region of the catheter proximal to the fixed jog and is aligned with the one or more markers on the elongate body. | 07-31-2014 |
Puja D. Gupta, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20090089628 | FILE SYSTEM ERROR DETECTION AND RECOVERY FRAMEWORK - Methods, systems and machine readable media for file system error detection and protection are described. In one aspect, an embodiment of a method includes collecting first data identifying at least one error in performing at least one of reading or writing data to a storage device and determining, through an association between the first data and file identifiers, a set of files which are effected by the at least one error. The collecting may be performed automatically as a background process. In another aspect, an embodiment of a method includes detecting at least one error in file system metadata for a storage device, the detecting being performed automatically as a background process, and storing state information automatically in response to the detecting; the state information indicates that upon next mounting of the storage device, the data processing system will automatically cause the running of a file system check of the file system metadata. | 04-02-2009 |
20120198287 | FILE SYSTEM ERROR DETECTION AND RECOVERY FRAMEWORK - In one aspect, an embodiment of file system error detection and protection includes collecting first data identifying at least one error in performing at least one of reading or writing data to a storage device and determining, through an association between the first data and file identifiers, a set of files which are effected by the at least one error. The collecting may be performed automatically as a background process. In another aspect, an embodiment includes detecting at least one error in file system metadata for a storage device, the detecting being performed automatically as a background process, and storing state information automatically in response to the detecting; the state information indicates that upon next mounting of the storage device, the data processing system will automatically cause the running of a file system check of the file system metadata. | 08-02-2012 |
Raghav Gupta, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20110260860 | GEOSOCIAL NETWORK SYSTEM AND METHOD FOR AGGREGATING GROUP MEMBERS - A geosocial network system and method for aggregating group members. A plurality of geosocial groups is generated for each user, if desired. Each geosocial group might be based on particular topics of interests specified by the user. Each geosocial group can receive map data contributions from members depending upon the permissions granted by the creator of such a geosocial group. | 10-27-2011 |
Rajarshi Gupta, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20110179027 | AUTOMATIC LINKING OF POINTS OF INTEREST FOR INDOOR LOCATION BASED SEARCHING - A database of the location based relationships of points of interest within an environment is automatically generated using a digital representation of the environment that includes the points of interest at different locations within the environment. The locations of the points of interest in the environment are identified and the location based relationships between the points of interest are determined. The points of interest are labeled with the determined relationships and the points of interest and labeled relationships are stored. For example, a graph structure may be produced where each node is a point of interest and the edges between nodes is labeled with the determined relationships. | 07-21-2011 |
20110190004 | Mobile Station Positioning Assistance With Local Mapping Data - Techniques are provided which may be implemented using various methods and/or apparatuses for use in providing positioning assistance data with local mapping data to mobile stations. For example, positioning assistance data may comprise and/or otherwise be based, at least in part, on local mapping data which may relate to a current location of the mobile station. Such positioning assistance data may, for example, be provided to a mobile station by a first server within a cellular network. | 08-04-2011 |
20110207410 | INTERFERENCE MANAGEMENT MESSAGING INVOLVING TERMINATION OF A REQUEST FOR REDUCTION IN INTERFERENCE - A set of nodes may communicate in a manner that is asynchronous with respect to the communication between other sets of nodes. To facilitate reservations of resources by different nodes, a node may transmit a message that requests neighboring nodes to limit their interfering transmissions on a given resource and then transmit another message to inform the neighboring nodes that the node is no longer using the resource. To address problems that may be caused by concurrent asynchronous transmissions by different nodes, a messaging scheme may be used to enable a first node to acquire control information transmitted by asynchronous neighboring nodes while the first node was transmitting, and was thereby unable to receive control messages. | 08-25-2011 |
20110246148 | Radio model updating - The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for updating radio models. For certain example implementations, a method for one or more server devices may comprise receiving at one or more communication interfaces at least one measurement that corresponds to a position of a first mobile device within an indoor environment. At least one radio model that is stored in one or more memories may be updated based, at least in part, on the at least one measurement to produce at least one updated radio model. The at least one radio model and the at least one updated radio model may correspond to the indoor environment. The at least one updated radio model may be transmitted to enable a second mobile device to use the at least one updated radio model for positioning within the indoor environment. Other example implementations are described herein. | 10-06-2011 |
20110251787 | Navigational Coordinate Systems in Conjunction with Transports and/or Mobile Devices - The subject matter disclosed herein relates to systems, methods, apparatuses, articles, and means for determining at least one navigational coordinate system to be utilized in conjunction with transports and/or mobile devices. For certain example implementations, a method by a mobile device that is at least proximate to a transport may comprise identifying a first navigational coordinate system, with the first navigational coordinate system being associated with the transport and enabling navigation within at least one navigable area of the transport. A second navigational coordinate system may also be identified. The mobile device may determine to utilize at least one of the first navigational coordinate system or the second navigational coordinate system based, at least in part, on one or more predetermined conditions. Other example implementations are described herein. | 10-13-2011 |
20110312277 | REQUESTED TRANSMISSION OF INTERFERENCE MANAGEMENT MESSAGES - A set of nodes may communicate in a manner that is asynchronous with respect to the communication between other sets of nodes. To facilitate reservations of resources by different nodes, a node may transmit a message that requests neighboring nodes to limit their interfering transmissions on a given resource and then transmit another message to inform the neighboring nodes that the node is no longer using the resource. To address problems that may be caused by concurrent asynchronous transmissions by different nodes, a messaging scheme may be used to enable a first node to acquire control information transmitted by asynchronous neighboring nodes while the first node was transmitting, and was thereby unable to receive control messages. | 12-22-2011 |
20120016872 | METHODS AND APPARATUSES FOR USE IN GENERATING AN ENCODED ROUTEABILITY GRAPH DESCRIPTION - Methods and apparatuses are provided that may be implemented in one or more electronic devices to generate an encoded routeability graph description corresponding to a diagram of a structure. The methods and apparatuses may, for example, implement a reduction process to reduce a number of grid points within an encoded routeability graph description, or which may be otherwise used to generate an encoded routeability graph description. | 01-19-2012 |
20120021762 | METHODS AND APPARATUSES FOR USE IN PROVIDING POSITION ASSISTANCE DATA TO MOBILE STATIONS - Methods and apparatuses are provided which may be implemented in various devices to provide position assistance data and/or the like to a mobile station with regard to at least one of a plurality of different indoor regions. | 01-26-2012 |
20120028649 | METHODS AND APPARATUSES FOR USE IN DETERMINING THAT A MOBILE STATION IS AT ONE OR MORE PARTICULAR INDOOR REGIONS - Methods and apparatuses are provided which may be implemented in various devices for to determine or assist in determining that a mobile station is at one or more particular indoor regions and to provide positioning assistance data and/or the like to the mobile station with regard to at least the one or more particular indoor regions. | 02-02-2012 |
20120028654 | METHODS AND APPARATUSES FOR MOBILE STATION CENTRIC DETERMINATION OF POSITIONING ASSISTANCE DATA - Methods and apparatuses are provided which may be implemented in various devices to generate positioning assistance data and/or the like by mobile station with regard to at least one of a plurality of different indoor regions. | 02-02-2012 |
20120044265 | INDOOR LIKELIHOOD HEATMAP - The subject matter disclosed herein may relate to methods, apparatuses, systems, devices, articles, or means for generating or using an indoor likelihood heatmap, etc. For certain example implementations, a method for a device may comprise projecting multiple grid points over a schematic map of an indoor area, with the schematic map indicating multiple obstructions of the indoor area. Feasible paths between grid point pairs of the multiple grid points may be determined. For a particular grid point of the multiple grid points, a count of the feasible paths that traverse the particular grid point may be determined. A likelihood heatmap for use in one or more navigational applications may be generated based, at least in part, on the count. Other example implementations are described herein. | 02-23-2012 |
20120046045 | METHODS AND APPARATUSES FOR USE IN ESTIMATING A LOCATION OF A MOBILE DEVICE WITHIN A STRUCTURE - Methods and apparatuses are provided that may be implemented in a mobile device to determine two or more variations between a baseline probability distribution and two or more probability distributions for signals received from two or more sets of transmitters assigned to two or more regions of a structure. The methods and apparatuses may be further implemented to determine whether the mobile device is located in at least one of the two or more regions based, at least in part, on a comparison of the two or more determined variations. | 02-23-2012 |
20120131223 | Object-Based Transport Protocol - Methods and apparatuses are provided that facilitate providing an object-based transport protocol that allows transmission of arbitrarily sized objects over a network protocol layer. The object-based transport protocol can also provide association of metadata with the objects to control communication thereof, and/or communication of response objects. Moreover, the object-based transport protocol can maintain sessions with remote network nodes that can include multiple channels, which can be updated over time to seamlessly provide mobility, increased data rates, and/or the like. In addition, properties can be modified remotely by network nodes receiving objects related to the properties. | 05-24-2012 |
20120179448 | METHODS AND APPARATUSES FOR USE IN PROVIDING TRANSLATION INFORMATION SERVICES TO MOBILE STATIONS - Techniques are provided which may be implemented using various methods and/or apparatuses to allow a mobile station to request and receive translation information associated with a location (e.g., a region, a point of interest, etc.). The translation information may be based, at least in part, on historical information associated with at least one other request associated with the location and previously obtained from at least one other mobile station. | 07-12-2012 |
20120225663 | RSSI-BASED INDOOR POSITIONING IN THE PRESENCE OF DYNAMIC TRANSMISSION POWER CONTROL ACCESS POINTS - A position fix for a mobile platform is determined using RSSI values for wireless signals received from access points (APs), at least one of which has dynamic transmission power control. The transmission power data for the APs is received from an entity separate from the APs, e.g., a central entity or a positioning assistance server. The RSSI values for wireless signals received from the APs are acquired, as is an RSSI heatmap. Using the transmission power data, the RSSI values and the RSSI heatmap, the position fix for the mobile platform is determined. The position fix may be determined by the mobile platform or a positioning assistance server. Additionally, a server may receive transmission power data for APs and may provide to a mobile platform RSSI heatmap information based on the transmission power data. The RSSI heatmap information may be, e.g., the transmission power data or a RSSI heatmap. | 09-06-2012 |
20120295654 | MEASUREMENTS AND INFORMATION GATHERING IN A WIRELESS NETWORK ENVIRONMENT - Disclosed are methods, apparatus, computer readable media and other implementations, including a method for communicating network information. The method includes transmitting a request message from a mobile device to an access point, and receiving, at the mobile device, a reply message transmitted from the access point in response to receiving the request message, the reply message including data representative of a transmitted signal power level at the access point of the reply message. The method further includes determining, based on the received reply message including the data representative of the transmitted signal power level at the access point, a received signal power level at the mobile device of the reply message, and a round trip time from a first time instance when the request message was transmitted from the mobile device to a second time instance when the reply message was received at the mobile device. | 11-22-2012 |
20130012235 | Venue application for mobile station position estimation - Disclosed is a method, and a system to perform the method, comprising receiving venue infrastructure information at an entity hosted on a mobile station, and selectively providing a portion of the venue infrastructure information to one or more other entities hosted on the mobile station based, at least in part, on a privilege level attributed to the mobile station or a user associated with the mobile station. | 01-10-2013 |
20130017840 | POSITION ESTIMATING FOR A MOBILE DEVICE - Disclosed are methods, techniques and/or systems for selecting and/or determining a strategy and/or approach for searching for signals at a mobile device. Characteristics of and/or information obtained from such searched signals may be used in estimating a location of the mobile device. In one particular example, a strategy and/or approach for searching for wireless signals may be based, at least in part, on an availability of resources at a mobile device. | 01-17-2013 |
20130017842 | RADIO MODEL UPDATING - The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for updating radio models. For certain example implementations, a method for one or more server devices may comprise receiving at one or more communication interfaces at least one measurement that corresponds to a position of a first mobile device within an indoor environment. At least one radio model that is stored in one or more memories may be updated based, at least in part, on the at least one measurement to produce at least one updated radio model. The at least one radio model and the at least one updated radio model may correspond to the indoor environment. The at least one updated radio model may be transmitted to enable a second mobile device to use the at least one updated radio model for positioning within the indoor environment. Other example implementations are described herein. | 01-17-2013 |
20130035110 | LIKELIHOOD OF MOBILE DEVICE PORTAL TRANSITION - The subject matter disclosed herein may relate to methods, apparatuses, systems, devices, articles, or means for conditionally performing a scan responsive to a likelihood of a portal transition, etc. For certain example implementations, a method for a mobile device may comprise determining an indication of a likelihood that a position of the mobile device is transitioning from a first area identifiable by a first location context identifier to a second area identifiable by a second location context identifier via a portal linking the first area and the second area; and conditionally performing a scan for signals transmitted by one or more transmitter devices corresponding to the second area responsive to the indication of the likelihood that the position of the mobile device is transitioning to the second area via the portal. Other example implementations are described herein. | 02-07-2013 |
20130045751 | LOGO DETECTION FOR INDOOR POSITIONING - Example methods, apparatuses, or articles of manufacture are disclosed herein that may be utilized, in whole or in part, to facilitate or support one or more operations or techniques for logo detection for indoor positioning for use in or with a mobile device. Briefly, in accordance with one implementation, a method may include extracting, at a mobile device, visual features from one or more images captured via a camera sensor of the mobile device; and estimating a location of the mobile device based, at least in part, on a match between extracted visual features and one or more brand-specific visual signatures associated with one or more points of interest of one or more known locations. In some instances, an estimated location of a mobile device may be refined based, at least in part, on at least one additional POI of one or more POIs of one or more known locations. | 02-21-2013 |
20130045758 | PEER DEVICE SUPPORTED LOCATION-BASED SERVICE PROVIDER CHECK-IN - Methods, apparatuses and articles of manufacture are provided for use in checking-in a mobile device with a location based service provider at a venue location. A candidate device check-in profile for a candidate device and one or more check-in validation schemes may, for example, be provided, directly or indirectly, to a computing device via the candidate device and/or one or more peer devices. The candidate device may, for example, be checked-in with the location based service provider in response to a determination that the candidate device check-in profile is valid. | 02-21-2013 |
20130079033 | POSITION ESTIMATION VIA PROXIMATE FINGERPRINTS - Example methods, apparatuses, or articles of manufacture are disclosed herein that may be utilized, in whole or in part, to facilitate or support one or more operations or techniques for position estimation via one or more proximate fingerprints for use in or with a mobile communication device. | 03-28-2013 |
20130084891 | FLEXIBLE ARCHITECTURE FOR LOCATION BASED CROWDSOURCING OF CONTEXTUAL DATA - A system for the collection, aggregation and analysis of location based crowdsourcing data includes a server that server that controls the distribution of crowdsourcing requests and workloads to a plurality of external mobile platforms. The server receives crowdsourcing queries from multiple parties and provides measurement requests to the mobile platforms, e.g., based on the location of the mobile platforms. Upon receipt of the measured contextual data from the mobile platforms, the server may distribute information, such as the raw measured contextual data or an analysis of the measured contextual data, to the appropriate requesting parties in a secure manner. The mobile platform may receive a plurality of measurement requests from a remote server, wherein the plurality of measurement requests are based on crowdsourcing queries from a plurality of parties. The mobile platform may measure and provide to the remote server contextual data in response to the plurality of measurement requests. | 04-04-2013 |
20130096885 | DETERMINING A LIKELIHOOD OF A DIRECTIONAL TRANSITION AT A JUNCTION IN AN ENCODED ROUTABILITY GRAPH DESCRIPTION - Techniques are provided, which may be implemented in various methods, apparatuses, and/or articles of manufacture, to obtain an encoded routability graph representative of feasible paths in an indoor environment represented by an encoded map, and assign likelihoods of transition from an ingress edge in the encoded routability graph to individual egress edges through a junction connecting the ingress edge to a plurality of egress edges based, at least in part, on one or more features of the encoded map. | 04-18-2013 |
20130101163 | METHOD AND/OR APPARATUS FOR LOCATION CONTEXT IDENTIFIER DISAMBIGUATION - The subject matter disclosed herein relates to a method, apparatus, and/or system for obtaining one or more images captured at a mobile device and determining a location context identifier (LCI) identifying an area including a location of the mobile device based, at least in part, on the one or more captured images. The LCI may be selected from among a plurality of LCIs. | 04-25-2013 |
20130148632 | USING IDENTIFIER MAPPING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal | 06-13-2013 |
20130150046 | USING IDENTIFIER MAPPING TO RESOLVE ACCESS POINT IDENTIFIER AMBIGUITY - Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal. | 06-13-2013 |
20130172009 | Methods and apparatuses for use in determining a location of a mobile device within a mutli-level physical structure - Methods and apparatuses are provided that may be implemented in a mobile device to determine that the mobile device is located within a particular level of a multi-level physical structure based, at least in part, on a comparison of measured wireless signals and stored measurements of wireless signals. | 07-04-2013 |
20130184012 | Radio model updating - The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for updating radio models. For certain example implementations, a method for one or more server devices may comprise receiving at one or more communication interfaces at least one measurement that corresponds to a position of a first mobile device within an indoor environment. At least one radio model that is stored in one or more memories may be updated based, at least in part, on the at least one measurement to produce at least one updated radio model. The at least one radio model and the at least one updated radio model may correspond to the indoor environment. The at least one updated radio model may be transmitted to enable a second mobile device to use the at least one updated radio model for positioning within the indoor environment. Other example implementations are described herein. | 07-18-2013 |
20130212094 | VISUAL SIGNATURES FOR INDOOR POSITIONING - Systems and methods for managing and utilizing visual signature (VS) databases are described herein. A method for managing a VS database as described herein includes obtaining a plurality of images of objects represented by a VS; obtaining context information associated with the plurality of images; grouping the plurality of images into one or more context classifications according to the context information associated with the plurality of images; for respective ones of the one or more context classifications, selecting an image representative of the VS according to one or more criteria; and adding the selected images for the respective ones of the one or more context classifications to entries of the VS database corresponding to the VS. | 08-15-2013 |
20130230208 | VISUAL OCR FOR POSITIONING - A mobile device can receive OCR library information associated with a coarse position. The coarse position can be determined by the mobile device, or by a network server configured to communicate with the mobile device. A camera on the mobile device can obtain images of human-readable information in an area near the coarse position. The view finder image can be processed with an OCR engine that is utilizing the OCR library information to determine one or more location string values. A location database can be searched based on the location string values. The position of the mobile device can be estimated and displayed. The position estimated can be adjusted based on the proximity of the mobile device to other features in the image. | 09-05-2013 |
20130244624 | SELECTIVE DISTRIBUTION OF LOCATION BASED SERVICE CONTENT TO MOBILE DEVICES - Methods, apparatuses and/or articles of manufacture are provided that selectively distribute location based service content for use by mobile devices with regard to certain indoor environment(s). In one example implementation, one or more computing devices generate data files that collectively represent an initial content for use by a mobile device with regard to an indoor environment, wherein at least one of the data files is generated based, at least in part, on one or more distribution schemes relating to the indoor environment. The one or more computing devices selectively initiates transmission of an indication to one or more mobile devices identifying that a shared data file corresponding to a seeded data file may be obtained from a first mobile device. The first mobile device and/or one or more of the other mobile devices may be identified based, at least in part, on the one or more distribution schemes. | 09-19-2013 |
20130247187 | Computing device to detect malware - Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware. | 09-19-2013 |
20130267201 | Method for malicious activity detection in a mobile station - Disclosed is a method for malicious activity detection in a mobile station of a particular model. In the method, generic malicious behavior patterns are received from a network-based malicious behavior profiling system. Mobile-station-model-specific-behavior-analysis algorithms are generated in the mobile station based on the generic malicious behavior patterns. Mobile station operations may be observed to generate a mobile station activity observation. The mobile station activity observation may be analyzed using the mobile-station-model-specific-behavior-analysis algorithms to generate an activity analysis. Malicious activity may be detected based on the activity analysis. | 10-10-2013 |
20130267260 | MAP MODIFICATION USING GROUND-TRUTH MEASUREMENTS - Disclosed is a method for receiving a conceptual map of a navigable area, the conceptual map including two or more topological elements being related to one another in the conceptual map by a first set of dimensions; applying one or more ground truth measurements or topological constraints to the first set of dimensions of the conceptual map to provide a modified map having corrected dimensions; and mapping an estimated location of the mobile station to the modified map. | 10-10-2013 |
20130268232 | Informative Display for Statistical Positioning System - System and method for providing informative display for statistical positioning system are disclosed. In one embodiment, the method includes receiving a statistical distribution of user locations in an area, where the statistical distribution of user locations includes a plurality of points representing likelihood of a user at corresponding locations, generating a weighted statistical distribution of user locations using an inverse distance weighting function, determining one or more estimated locations of the user using the weighted statistical distribution, and displaying the one or more estimated locations of the user, or a representation of the weighted statistical distribution of user position in a display. | 10-10-2013 |
20130295952 | ADAPTIVE UPDATING OF INDOOR NAVIGATION ASSISTANCE DATA FOR USE BY A MOBILE DEVICE - Various methods, apparatuses and articles of manufacture may be implemented for use in one or more computing platforms to adaptively provide and/or obtain indoor navigation assistance data (INAD) update(s) for use by a mobile device. An INAD update may, for example, comprise a subset of INAD available for an indoor environment. Such a subset may be determined based, at least in part, on a bounded region in an electronic map of the indoor environment. Such a bounded region may, for example, have a shape and/or a size based, at least in part, on at least one parameter indicative of a motion state of the mobile device. | 11-07-2013 |
20130303154 | SYSTEM, APPARATUS, AND METHOD FOR ADAPTIVE OBSERVATION OF MOBILE DEVICE BEHAVIOR - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. Various aspects may correct suspicious or performance-degrading mobile device behaviors. Various aspects may prevent identified suspicious or performance-degrading mobile device behaviors from degrading the performance and power utilization levels of a mobile device over time. Various aspects may restore an aging mobile device to its original performance and power utilization levels. | 11-14-2013 |
20130303159 | COLLABORATIVE LEARNING FOR EFFICIENT BEHAVIORAL ANALYSIS IN NETWORKED MOBILE DEVICE - Methods, systems and devices for classifying mobile device behaviors of a first mobile device may include the first mobile device monitoring mobile device behaviors to generate a behavior vector, and applying the behavior vector to a first classifier model to obtain a first determination of whether a mobile device behavior is benign or not benign. The first mobile device may also send the behavior vector to a second mobile device, which may receive and apply the behavior vector to a second classifier model to obtain a second determination of whether the mobile device behavior is benign or not benign. The second mobile device may send the second determination to the first mobile device, which may receive the second determination, collate the first determination and the second determination to generate collated results, and determine whether the mobile device behavior is benign or not benign based on the collated results. | 11-14-2013 |
20130304676 | ON-DEVICE REAL-TIME BEHAVIOR ANALYZER - Methods, systems and devices for generating data models in a communication system may include applying machine learning techniques to generate a first family of classifier models using a boosted decision tree to describe a corpus of behavior vectors. Such behavior vectors may be used to compute a weight value for one or more nodes of the boosted decision tree. Classifier models factors having a high probably of determining whether a mobile device behavior is benign or not benign based on the computed weight values may be identified. Computing weight values for boosted decision tree nodes may include computing an exclusive answer ratio for generated boosted decision tree nodes. The identified factors may be applied to the corpus of behavior vectors to generate a second family of classifier models identifying fewer factors and data points relevant for enabling the mobile device to determine whether a behavior is benign or not benign. | 11-14-2013 |
20130304677 | Architecture for Client-Cloud Behavior Analyzer - Methods, systems and devices for generating data models in a client-cloud communication system may include applying machine learning techniques to generate a first family of classifier models that describe a cloud corpus of behavior vectors. Such vectors may be analyzed to identify factors in the first family of classifier models that have the highest probably of enabling a mobile device to conclusively determine whether a mobile device behavior is malicious or benign. Based on this analysis, a a second family of classifier models may be generated that identify significantly fewer factors and data points as being relevant for enabling the mobile device to conclusively determine whether the mobile device behavior is malicious or benign based on the determined factors. A mobile device classifier module based on the second family of classifier models may be generated and made available for download by mobile devices, including devices contributing behavior vectors. | 11-14-2013 |
20130304869 | Communicating Behavior Information in a Mobile Computing Device - Methods, systems and devices for communicating behavior analysis information using an application programming interface (API) may include receiving data/behavior models from one or more third-party network servers in a client module of a mobile device and communicating the information to a behavior observation and analysis system via a behavior API. The third-party servers may be maintained by one or more partner companies that have domain expertise in a particular area or technology that is relevant for identifying, analyzing, classifying, and/or reacting to mobile device behaviors, but that do not have access to (or knowledge of) the various mobile device sub-systems, interfaces, configurations, modules, processes, drivers, and/or hardware systems required to generate effective data/behavior models suitable for use by the mobile device. The behavior API and/or client modules allow the third-party server to quickly and efficiently access the most relevant and important information on the mobile device. | 11-14-2013 |
20130305101 | Techniques for Autonomic Reverting to Behavioral Checkpoints - Aspect methods, systems and devices may be configured to create/capture checkpoints without significantly impacting the performance, power consumption, or responsiveness of the mobile device. An observer module of the mobile device may instrument or coordinate various application programming interfaces (APIs) at various levels of the mobile device system and constantly monitor the mobile device (via a low power process, background processes, etc.) to identify the normal operation patterns of the mobile device and/or to identify behaviors that are not consistent with previously computed normal operation patterns. The mobile device may store mobile device state information in a memory as a stored checkpoint when it determines that the mobile device behaviors are consistent with normal operation patterns, and upload a previously stored checkpoint to a backup storage system when it determines that the mobile device behaviors are not consistent with normal operation patterns. | 11-14-2013 |
20130305358 | Minimizing Latency of Behavioral Analysis Using Signature Caches - The various aspects include methods, systems, and devices configured to make use of caching techniques and behavior signature caches to improve processor performance and/or reduce the amount of power consumed by the computing device by reducing analyzer latency. The signature caching system may be configured to adapt to rapid and frequent changes in behavioral specifications and models and provide a multi-fold improvement in the scalability of behavioral analysis operations performed on the mobile device. | 11-14-2013 |
20130316742 | Method and apparatus for transmitting indoor context information - The subject matter disclosed herein relates to a system and method for determining indoor context information relating to a location of a mobile device. Indoor context information may be utilized by a mobile device or a network element to obtain an estimate of a location of the mobile device within an indoor environment. | 11-28-2013 |
20130317778 | Method and apparatus for transmitting indoor context information - The subject matter disclosed herein relates to a system and method for determining indoor context information relating to a location of a mobile device. Indoor context information may be utilized by a mobile device or a network element to obtain an estimate of a location of the mobile device within an indoor environment. | 11-28-2013 |
20130342565 | INDOOR STRUCTURE INFERENCE USING POINTS OF INTEREST - In one implementation, a method may comprise: obtaining a digital map of an indoor region that identifies boundaries between subsections within the indoor region; and approximating locations of walls separating rooms within at least one of the subsections based, at least in part, on locations of feature labels provided in the digital map. | 12-26-2013 |
20140032161 | MULTI-LEVEL LOCATION DISAMBIGUATION - A method of disambiguating a location of a mobile station within a structure includes: obtaining, at the mobile station, regional pressure indications and corresponding region indications indicating regions within a structure that are vertically displaced with respect to each other, each of the regional pressure indications indicating atmospheric pressure information associated with the corresponding region; determining mobile station pressure information associated with a present location of the mobile station; comparing the mobile station pressure information with the regional pressure indications; and based on the comparing, determining in which of the regions the mobile station presently resides. | 01-30-2014 |
20140051432 | SECURE BEHAVIOR ANALYSIS OVER TRUSTED EXECUTION ENVIRONMENT - Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a concise behavior vector based on the observations, and provide the vector to an analyzer module in an unprivileged-secure portion of the secure operating environment. The vector may be analyzed in the unprivileged-secure portion to determine whether the mobile device behavior is benign, suspicious, malicious, or performance-degrading. If the behavior is found to be suspicious, operations of the observer module may be adjusted, such as to perform deeper observations. If the behavior is found to be malicious or performance-degrading behavior the user and/or a client module may be alerted in a secure, tamper-proof manner. | 02-20-2014 |
20140053260 | Adaptive Observation of Behavioral Features on a Mobile Device - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. | 02-20-2014 |
20140053261 | On-Line Behavioral Analysis Engine in Mobile Device with Multiple Analyzer Model Providers - Methods, systems and devices for generating data models in a client-cloud communication system may include applying machine learning techniques to generate a first family of classifier models that describe a cloud corpus of behavior vectors. Such vectors may be analyzed to identify factors in the first family of classifier models that have the highest probability of enabling a mobile device to better determine whether a mobile device behavior is malicious or benign. Based on this analysis, a second family of classifier models may be generated that identify significantly fewer factors and data points as being relevant for enabling the mobile device to better determine whether the mobile device behavior is malicious or benign based on the determined factors. A mobile device classifier module based on the second family of classifier models may be generated and made available for download by mobile devices, including devices contributing behavior vectors. | 02-20-2014 |
20140066103 | Mobile device locating in conjunction with localized environments - The subject matter disclosed herein relates to systems, methods, apparatuses, articles, etc. for mobile device locating in conjunction with localized environments. For certain example implementations, a method may comprise obtaining at a mobile device one or more signals comprising information indicative of a location thereof. The information may be transmitted to one or more servers. A location context identifier (LCI) may be received responsive to the transmitting, with the LCI corresponding to a localized environment at which the mobile device is located. The LCI may be transmitted to the one or more servers. Location-based data may be received responsive to the transmitting of the LCI, with the location-based data being associated with the LCI and pertaining to the localized environment. The location of the mobile device may be determined with respect to the localized environment based, at least in part, on the location-based data. Other example implementations are described herein. | 03-06-2014 |
20140071897 | Synchronizing a Base Station in a Wireless Communication System - A method for synchronizing a wireless communication system is disclosed. A silence duration for a base station is determined based on the time required for a neighbor base station to obtain or maintain synchronization. All transmissions from the base station are ceased for the silence duration. Multiple base stations level may cease transmissions at the same time, thus mitigating interference. | 03-13-2014 |
20140094199 | TECHNIQUES FOR FASTER TIME-TO-FIRST-FIX - Example methods, apparatuses, or articles of manufacture are disclosed herein that may be utilized, in whole or in part, to facilitate or support one or more operations or techniques for a relatively faster time-to-first-fix, such as for use in or with a mobile communication device. Briefly, in accordance with at least one implementation, a method may include transmitting a first message to a mobile device, the first message comprising abbreviated positioning assistance data; receiving a second message from the mobile device, the second message comprising an indication of a coarse location of the mobile device; and transmitting a third message to the mobile device, the third message comprising a detailed tiled radio heat map obtained based, at least in part, on the received indication of the coarse location of the mobile device. | 04-03-2014 |
20140123289 | Computing Device to Detect Malware - Disclosed is an apparatus and method for a computing device to determine if an application is malware. The computing device may include: a query logger to log the behavior of the application on the computing device to generate a log; a behavior analysis engine to analyze the log from the query logger to generate a behavior vector that characterizes the behavior of the application; and a classifier to classify the behavior vector for the application as benign or malware. | 05-01-2014 |
20140128093 | PORTAL TRANSITION PARAMETERS FOR USE IN MOBILE DEVICE POSITIONING - Various methods, apparatuses and/or articles of manufacture are provided for use in one or more electronic devices to perform and/or otherwise support certain positioning capabilities with regard to a mobile device. For example, certain positioning capabilities may make use of one or more portal transition parameters that may be based, at least in part, on a determined likelihood that a mobile device, if located in a first region of a specific environment and within a threshold area of a portal connecting the first region to a second region of the specific environment, may or may not make use of the portal to transition from the first region to the second region, e.g., through the portal. | 05-08-2014 |
20140150100 | Adaptive Observation of Driver and Hardware Level Behavioral Features on a Mobile Device - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. | 05-29-2014 |
20140153773 | Image-Based Indoor Position Determination - In one implementation, a method may comprise: determining a topological representation of an indoor portion of a building based, at least in part, on positions or number of lines in an image of the indoor portion of the building; and comparing the topological representation to one or more stored topological representations, for example in a digital map of the building, to determine a potential position of the indoor portion of the building. | 06-05-2014 |
20140162589 | SYSTEM AND/OR METHOD OF LOCATING A PORTABLE SERVICE ACCESS TRANSCEIVER - Described are devices, methods, techniques and systems for locating a portable services access transceiver (PSAT) for use in aiding emergency “911” services. In one implementation, one or more conditions indicative of movement of a PSAT may initiate a process for obtaining a new estimated location of the PSAT. In another implementation, a location of a PSAT may be determined or updated using indoor navigation techniques. | 06-12-2014 |
20140187177 | METHODS AND SYSTEMS OF DYNAMICALLY GENERATING AND USING DEVICE-SPECIFIC AND DEVICE-STATE-SPECIFIC CLASSIFIER MODELS FOR THE EFFICIENT CLASSIFICATION OF MOBILE DEVICE BEHAVIORS - The various aspects provide a mobile device and methods implemented on the mobile device for modifying behavior models to account for device-specific or device-state-specific features. In the various aspects, a behavior analyzer module may leverage a full feature set of behavior models (i.e. a large classifier model) received from a network server to create lean classifier models for use in monitoring for malicious behavior on the mobile device, and the behavior analyzer module may dynamically modify these lean classifier models to include features specific to the mobile device and/or the mobile device's current configuration. Thus, the various aspects may enhance overall security for a particular mobile device by taking the mobile device and its current configuration into account and may improve overall performance by monitoring only features that are relevant to the mobile device. | 07-03-2014 |
20140188781 | Methods and Systems of Using Boosted Decision Stumps and Joint Feature Selection and Culling Algorithms for the Efficient Classification of Mobile Device Behaviors - Methods and systems for classifying mobile device behavior include configuring a server use a large corpus of mobile device behaviors to generate a full classifier model that includes a finite state machine suitable for conversion into boosted decision stumps and/or which describes all or many of the features relevant to determining whether a mobile device behavior is benign or contributing to the mobile device's degradation over time. A mobile device may receive the full classifier model and use the model to generate a full set of boosted decision stumps from which a more focused or lean classifier model is generated by culling the full set to a subset suitable for efficiently determining whether mobile device behavior are benign. Boosted decision stumps may be culled by selecting all boosted decision stumps that depend upon a limited set of test conditions. | 07-03-2014 |
20140195157 | APPLYING AN INDICATION OF A LIKELIHOOD OF A DIRECTIONAL TRANSITION AT A JUNCTION IN AN ENCODED ROUTABILITY GRAPH DESCRIPTION TO A POSITIONING FUNCTION OF A MOBILE DEVICE - Techniques are provided for a mobile, which may be implemented in various methods, apparatuses, and/or articles of manufacture to obtain an encoded routability graph representative of feasible paths for an indoor environment, along with values indicative of likelihoods of transition at certain junctions identifiable in the encoded routability graph, and determine one or both of an estimated position or an estimated direction of travel of the mobile device. | 07-10-2014 |
20140205099 | Inter-Module Authentication for Securing Application Execution Integrity Within A Computing Device - Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a concise behavior vector based on the observations, and provide the vector to an analyzer module in an unprivileged-secure portion of the secure operating environment. The vector may be analyzed in the unprivileged-secure portion to determine whether the mobile device behavior is benign, suspicious, malicious, or performance-degrading. If the behavior is found to be suspicious, operations of the observer module may be adjusted, such as to perform deeper observations. If the behavior is found to be malicious or performance-degrading behavior the user and/or a client module may be alerted in a secure, tamper-proof manner. | 07-24-2014 |
20140222334 | METHOD AND APPARATUS FOR IDENTIFICATION OF POINTS OF INTEREST WITHIN A PREDEFINED AREA - The subject matter disclosed herein relates to a system and method for identification of points of interest within a predefined area. Location estimates for substantially stationary mobile devices may be utilized to determine locations of one or more points of interest. Location estimates for mobile devices in motion may be utilized to determine locations of one or more corridors. | 08-07-2014 |
20140223553 | Location based process-monitoring - Disclosed are systems, apparatus, devices, methods, computer program products, and other implementations, including a method that includes determining location of a device, and controlling monitoring of behavior of one or more processes executing on the device based on the determined location of the device to identify potential one or more security-risky processes from the monitored one or more executing processes. In some embodiments, controlling the monitoring of the behavior of the one or more processes may include one or more of, for example, adjusting frequency of the monitoring of the one or more processes based on the determined location of the device, adjusting level of detail obtained for the monitored behavior of the one or more processes based on the determined location of the device, and/or adjusting features being observed for the monitored one or more processes based on the determined location of the device. | 08-07-2014 |
20140237595 | APIs for Obtaining Device-Specific Behavior Classifier Models from the Cloud - The various aspects provide a system and methods implemented on the system for generating a behavior model on a server that includes features specific to a mobile computing device and the device's current state/configuration. In the various aspects, the mobile computing device may send information identifying itself, its features, and its current state to the server. In response, the server may generate a device-specific lean classifier model for the mobile computing device based on the device's information and state and may send the device-specific lean classifier model to the device for use in detecting malicious behavior. The various aspects may enhance overall security and performance on the mobile computing device by leveraging the superior computing power and resources of the server to generate a device-specific lean classifier model that enables the device to monitor features that are actually present on the device for malicious behavior. | 08-21-2014 |
20140245306 | Adaptive Observation of Behavioral Features On A Heterogeneous Platform - Methods, devices and systems for monitoring behaviors of a mobile computing device include observing in a non-master processing core a portion of a mobile device behavior that is relevant to the non-master processing core, generating a behavior signature that describes the observed portion of the mobile device behavior, and sending the generated behavior signature to a master processing core. The master processing core combines two or more behavior signatures received from the non-master processing cores to generate a global behavior vector, which may be used by an analyzer module to determine whether a distributed software application is not benign. | 08-28-2014 |
20140283024 | Method for efficient behavioral analysis on a mobile station - Disclosed is a method for efficient behavioral analysis on a mobile station. In the method, one or more first behavioral characteristics associated with a first state of a finite state machine are observed. The one or more first behavioral characteristics may comprise a first subset of observable behavioral characteristics. The mobile station transitions from the first state to a second state. One or more second behavioral characteristics associated with the second state of the finite state machine are observed. The one or more second behavioral characteristics may comprise a second subset of the observable behavioral characteristics. | 09-18-2014 |
20140315575 | METHODS AND APPARATUSES FOR USE IN DETERMINING THAT A MOBILE STATION IS AT ONE OR MORE PARTICULAR INDOOR REGIONS - Methods and apparatuses are provided which may be implemented in various devices for to determine or assist in determining that a mobile station is at one or more particular indoor regions and to provide positioning assistance data and/or the like to the mobile station with regard to at least the one or more particular indoor regions. | 10-23-2014 |
20140315580 | METHODS AND APPARATUSES FOR USE IN DETERMINING THAT A MOBILE STATION IS AT ONE OR MORE PARTICULAR INDOOR REGIONS - Methods and apparatuses are provided which may be implemented in various devices for to determine or assist in determining that a mobile station is at one or more particular indoor regions and to provide positioning assistance data and/or the like to the mobile station with regard to at least the one or more particular indoor regions. | 10-23-2014 |
20140315581 | METHODS AND APPARATUSES FOR USE IN DETERMINING THAT A MOBILE STATION IS AT ONE OR MORE PARTICULAR INDOOR REGIONS - Methods and apparatuses are provided which may be implemented in various devices for to determine or assist in determining that a mobile station is at one or more particular indoor regions and to provide positioning assistance data and/or the like to the mobile station with regard to at least the one or more particular indoor regions. | 10-23-2014 |
20140317734 | Adaptive Observation of Behavioral Features on a Mobile Device - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. | 10-23-2014 |
20140331272 | Location based enforcement of mobile policy - Disclosed are systems, apparatus, devices, methods, computer program products, computer media, and other implementations, including a method that includes communicating data representative of one or more location-based restrictions corresponding to a venue area to a mobile device determined to be located within the venue area, and controlling, by at least one venue server, use at the mobile device of services available at the venue area from one or more nodes associated with the venue area based, at least in part, on a determination, by the at least one venue server, of whether the mobile device complies with the location-based restrictions corresponding to the venue area. | 11-06-2014 |
20140335892 | METHODS AND APPARATUSES FOR USE IN PROVIDING NAVIGATION ASSISTANCE DATA TO MOBILE STATIONS - Methods and apparatuses are provided which may be implemented in various devices to provide navigation assistance data and/or the like to a mobile station with regard to at least one of a plurality of different indoor regions. For example, a computing platform of a map inference device may establish encoded metadata for at least a portion of an indoor region based, at least in part, on an electronic map, an access point locator, or some combination thereof, and provide such encoded metadata to a repository device that may provide at least a portion of the encoded metadata to a mobile station. | 11-13-2014 |
20140337862 | Methods, Devices, and Systems for Communicating Behavioral Analysis Information - Methods, systems and devices for communicating behavior analysis information using an application programming interface (API) may include receiving via the API a request to register the second module to access an operation of a behavioral monitoring system of the mobile computing device, and exchanging authentication information between the first module and the second module to accomplish mutual authentication. Aspects may include receiving via the API a request for version identification information that may be used by the server to determine how to interpret, evaluate, or crowd-source information, and exchanging version identification information between the first module and the second module to cause the second module to send the information to the server. Aspects may further include receiving via the API a provision malware model request including a command causing the first module to send a malware or classifier model to a behavioral monitoring system of the mobile computing device. | 11-13-2014 |
20140362773 | LOCAL IP ACCESS SCHEME - Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet. | 12-11-2014 |
20140370875 | CONFIGURING AN IDENTIFIER FOR AN ACCESS POINT - An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server. | 12-18-2014 |
20150082430 | Data Flow Based Behavioral Analysis on Mobile Devices - Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. | 03-19-2015 |
20150082441 | Exploiting Hot Application Programming Interfaces (APIs) and Action Patterns for Efficient Storage of API logs on Mobile Devices for Behavioral Analysis - Methods and devices for detecting suspicious or performance-degrading mobile device behaviors may include performing behavior monitoring and analysis operations to intelligently, dynamically, and/or adaptively determine the mobile device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the behaviors are to be observed. Such behavior monitoring and analysis operations may be performed continuously (or near continuously) in a mobile device without consuming an excessive amount of processing, memory, or energy resources of the mobile device by identifying hot application programming interfaces (APIs) and hot action patterns that are invoked or used most frequently by software applications of the mobile device and storing information regarding these hot APIs and hot action patterns separately and more efficiently. | 03-19-2015 |
Rajarshi Gupta, San Clara, CA US
Patent application number | Description | Published |
---|---|---|
20090316629 | CONCENTRATOR FOR MULTIPLEXING ACCESS POINT TO WIRELESS NETWORK CONNECTIONS - Systems and methodologies are described that facilitate multiplexing communications from multiple downstream access points to one or more mobility management entities (MME). In particular, a concentrator component is provided that can establish a single transport layer connection with an MME along with multiple application layer connections over the single transport layer connection for each of multiple downstream access points and/or related mobile devices. The downstream access points and/or mobile devices can provide identifiers, such as tracking identifiers, to the concentrator component, which can utilize the identifiers to track communications with the MME. In this regard, the MME can send paging messages, and the concentrator component can determine downstream access points related to the paging messages based on a stored association with a tracking identifier in the paging message. | 12-24-2009 |
20110177802 | CONTEXT-AWARE MOBILE INCORPORATING PRESENCE OF OTHER MOBILES INTO CONTEXT - A first mobile device (for example, a cellular telephone) learns of the presence of second mobile devices (for example, other cellular telephones) that are located nearby the first mobile device. A relatively short range wireless communication mechanism (for example, Bluetooth) of the mobile devices may be used to discover other nearby devices automatically by establishing direct mobile-to-mobile communications without use of the cellular telephone functionality of the mobile devices. Regardless of how the presence of other nearby mobiles is detected, information on the presence of these nearby mobiles can be matched with other information on the users of the nearby mobiles such as user class information. The collected information is then used as an input to a context-aware functionality. The context-aware functionality applies a rule that causes the first mobile to be configured in a way that is better suited the situation and/or to who the other nearby cellular telephone users are and what they are doing. | 07-21-2011 |
Rajesh K. Gupta, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20110191610 | ARCHITECTURE TO ENABLE ENERGY SAVINGS IN NETWORKED COMPUTERS - This application includes systems and techniques that permit computers to remain accessible while in a low-power mode. In some implementations, the technique includes receiving at a first computer, via a computer network, information regarding a second computer transitioning to a low-power mode of operation; receiving at the first computer network communications designated for the second computer; processing at the first computer at least a portion of the network communications on behalf of the second computer without transitioning the second computer out of the low-power mode of operation, where the processing comprises processing the at least a portion of the network communications on behalf of the second computer within a virtual machine corresponding to the second computer; and initiating, via the computer network, a transition of the second computer out of the low-power mode of operation when at least one of the network communications satisfies a predetermined condition. | 08-04-2011 |
Rajnish A. Gupta, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20120004278 | LINC RNAS IN CANCER DIAGNOSIS AND TREATMENT - Long non-coding RNAs (lincRNAs), a relatively recently recognized class of widely transcribed genes, are thought to affect chromatin state and epigenetic regulation, but their mechanisms of action and potential roles in human disease are poorly understood. The present invention shows that long non-coding RNAs in the human HOX loci are systematically dysregulated during breast cancer progression, and that expression levels of the lincRNA termed HOTAIR can predict cancer metastasis. Elevated levels of HOTAIR can lead to altered patterns of Polycomb binding to the genome. These findings indicate that lincRNAs have active roles in modulating the cancer epigenome and may be important targets for cancer diagnosis and therapy. | 01-05-2012 |
Ramesh M. Gupta, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20110296516 | INTEGRATED FIREWALL, IPS, AND VIRUS SCANNER SYSTEM AND METHOD - A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners. Further, each of the virtual firewalls, IPSs, and virus scanners is assigned to at least one of a plurality of user and is configured in a user-specific. | 12-01-2011 |
20110296527 | INTEGRATED FIREWALL, IPS, AND VIRUS SCANNER SYSTEM AND METHOD - A system, method and computer program product are provided including a router and a security sub-system coupled to the router. Such security sub-system includes a plurality of virtual firewalls, a plurality of virtual intrusion prevention systems (IPSs), and a plurality of virtual virus scanners. Further, each of the virtual firewalls, IPSs, and virus scanners is assigned to at least one of a plurality of user and is configured in a user-specific. | 12-01-2011 |
Rohit Gupta, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20110141122 | DISTRIBUTED STREAM OUTPUT IN A PARALLEL PROCESSING UNIT - A technique for performing stream output operations in a parallel processing system is disclosed. A stream synchronization unit is provided that enables the parallel processing unit to track batches of vertices being processed in a graphics processing pipeline. A plurality of stream output units is also provided, where each stream output unit writes vertex attribute data to one or more stream output buffers for a portion of the batches of vertices. A messaging protocol is implemented between the stream synchronization unit and the plurality of stream output units that ensures that each of the stream output units writes vertex attribute data for the particular batch of vertices distributed to that particular stream output unit in the same order in the stream output buffers as the order in which the batch of vertices was received from a device driver by the parallel processing unit. | 06-16-2011 |
Roopak Gupta, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20100318418 | ADVERTISING INVENTORY PREDICTION FOR FREQUENCY-CAPPED LINES - Computer-readable media, computer systems, and computing devices for responding to advertising inventory queries that specify frequency caps limiting the number of impressions that are shown to a unique user. Impression logs are retrieved from logging servers and processed to generate a unique user distribution that provides information regarding the numbers of unique users that receive ad impressions at a specified location and during a specified time period. Estimates of frequency-capped capacity to fulfill a booking request and estimates of frequency-capped availability of inventory are computed using the unique user distribution. | 12-16-2010 |
Ruchi Gupta, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20120101873 | METHOD AND APPARATUS FOR DYNAMIC COMMUNICATION-BASED AGENT SKILL ASSESSMENT - In one embodiment, a method includes obtaining information relating to an interaction between an agent associated with a contact center and a customer. The information includes an indicator of a satisfaction level of the customer and/or the agent. The method also includes providing at least the indicator to an expertise assessment arrangement and developing a characterization of an expertise of the agent using the expertise assessment arrangement. Developing the characterization of the expertise includes using the indicator. | 04-26-2012 |
Sachin Gupta, Miliptas, CA US
Patent application number | Description | Published |
---|---|---|
20120072543 | PAUSE AND REPLAY OF MEDIA CONTENT THROUGH BOOKMARKS ON A SERVER DEVICE - A method, apparatus, and system of pause and replay of media content through bookmarks on a server device are disclosed. In one embodiment, a method of a server device includes authenticating a user of a client device, communicating a media content to the client device through a network, processing a pause request of the client device to pause the media content, storing a bookmark location indicating a current playback location of the media content in the client device on the server device, processing a play request of the user to play the media content from the bookmark location (e.g., the play request may be received from a different client device of the user), and communicating the media content from the bookmark location to the user. | 03-22-2012 |
Sanjeev K. Gupta, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20120096425 | Software Map - In one embodiment a method is provided for rendering a software map. The method includes storing, in an electronic database, information associated with a software development project, the information including start and end dates of particular efforts made in connection with the software development project and dates of specific events associated with the software development project, rendering on a display a timeline, and rendering on the display a software map, wherein the software map includes horizontal lines representing the particular efforts that extend between endpoints defined, substantially, by the start and end dates, and that are aligned with a time scale of the timeline, and vertically or substantially vertical extending lines between and connecting pairs of horizontal lines, wherein each vertically or substantially vertically extending line represents one of the specific events associated with the software development project. | 04-19-2012 |
Sayam San Gupta, Oceanside, CA US
Patent application number | Description | Published |
---|---|---|
20090181402 | COMPOSITIONS AND METHODS FOR COUPLING A PLURALITY OF COMPOUNDS TO A SCAFFOLD - Compositions and methods are provided for coupling a plurality of compounds to a scaffold. Compositions and methods are further provided for catalyzing a reaction between at least one terminal alkyne moiety and at least one azide moiety, wherein one moiety is attached to the compound and the other moiety is attached to the scaffold, forming at least one triazole thereby. | 07-16-2009 |
Shalini Gupta, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20120093433 | Dynamic Adjustment of Noise Filter Strengths for use with Dynamic Range Enhancement of Images - Dynamic adjustment of noise filter strengths for use with dynamic range enhancement of images is performed to produce better quality images by adapting dynamically to the image noise profile. Global and local brightness and contrast enhancement (GLBCE) is performed on a digital image to form an enhanced image. The GLBCE applies local gain values to the digital image based on local intensity values. A GLBCE gain versus intensity curve is determined for the enhanced image. A set of noise filter thresholds is adjusted in response to the GLBCE gain versus intensity curve to form a set of dynamically adjusted noise filter thresholds. The enhanced image is noise filtered using the set of dynamically adjusted noise filter thresholds to form a noise filtered enhanced image. | 04-19-2012 |
20120131309 | HIGH-PERFORMANCE, SCALABLE MUTLICORE HARDWARE AND SOFTWARE SYSTEM - Traditionally, providing parallel processing within a multi-core system has been very difficult. Here, however, a system in provided where serial source code is automatically converted into parallel source code, and a processing cluster is reconfigured “on the fly” to accommodate the parallelized code based on an allocation of memory and compute resources. Thus, the processing cluster and its corresponding system programming tool provide a system that can perform parallel processing from a serial program that is transparent to a user. | 05-24-2012 |
20140270364 | PERFORMING OBJECT DETECTION OPERATIONS VIA A GRAPHICS PROCESSING UNIT - In one embodiment of the present invention, a graphics processing unit (GPU) is configured to detect an object in an image using a random forest classifier that includes multiple, identically structured decision trees. Notably, the application of each of the decision trees is independent of the application of the other decision trees. In operation, the GPU partitions the image into subsets of pixels, and associates an execution thread with each of the pixels in the subset of pixels. The GPU then causes each of the execution threads to apply the random forest classifier to the associated pixel, thereby determining a likelihood that the pixel corresponds to the object. Advantageously, such a distributed approach to object detection more fully leverages the parallel architecture of the PPU than conventional approaches. In particular, the PPU performs object detection more efficiently using the random forest classifier than using a cascaded classifier. | 09-18-2014 |
20140270551 | PERFORMING OBJECT DETECTION OPERATIONS VIA A GRAPHICS PROCESSING UNIT - In one embodiment of the present invention, a graphics processing unit (GPU) is configured to detect an object in an image using a random forest classifier that includes multiple, identically structured decision trees. Notably, the application of each of the decision trees is independent of the application of the other decision trees. In operation, the GPU partitions the image into subsets of pixels, and associates an execution thread with each of the pixels in the subset of pixels. The GPU then causes each of the execution threads to apply the random forest classifier to the associated pixel, thereby determining a likelihood that the pixel corresponds to the object. Advantageously, such a distributed approach to object detection more fully leverages the parallel architecture of the PPU than conventional approaches. In particular, the PPU performs object detection more efficiently using the random forest classifier than using a cascaded classifier. | 09-18-2014 |
Shashank Gupta, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20110141906 | TRUNKING FOR FABRIC PORTS IN FIBRE CHANNEL SWITCHES AND ATTACHED DEVICES - N_Ports and F_Ports are provided with logic allowing designation of multiple virtual interfaces on a single host bus adaptor or other Fibre Channel interface, one virtual interface for each VSAN operating on the node interface. Node ports with this additional functionality are referred to as trunking N_Ports or TN_Ports. These ports have a functional design allowing creation of the multiple virtual interfaces as appropriate for the application at hand. This port design also includes logic for communicating with a peer fabric port to initialize and modify the configuration of the virtual interfaces on the TN_Port. A corresponding functional design and communication logic is provided for fabric ports, referred to herein as trunking F_Ports or TF_Ports. | 06-16-2011 |
Shashi Gupta, Tustin, CA US
Patent application number | Description | Published |
---|---|---|
20110129673 | SILVER-COATED BORON NITRIDE PARTICULATE MATERIALS AND FORMULATIONS CONTAINING SAME - In accordance with the present invention, there are provided filled epoxy-based formulations wherein the filler comprises silver-coated boron nitride particulate material. In accordance with a further embodiment of the present invention, there are provided articles comprising particulate boron nitride having a silver coating on at least a portion of the surface thereof. In additional embodiments of the present invention, there are provided methods for the use of invention articles and formulations. | 06-02-2011 |
Shashi K. Gupta, Tustin, CA US
Patent application number | Description | Published |
---|---|---|
20110133330 | LOW TEMPERATURE CURING COMPOSITIONS - The present invention relates to thermosetting resin compositions that include maleimide-, nadimide- or itaconimide-containing compounds and a metal/carboxylate complex and a peroxide, which is curable at a low temperature at relative short period of time, such as less than about 100° C., for instance 55-70° C., over a period of time of about 30 to 90 minutes. The invention further provides methods of preparing such compositions, methods of applying such compositions to substrate surfaces, and packages and assemblies prepared therewith for connecting microelectronic circuitry. | 06-09-2011 |
Soumi Gupta, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20090136915 | Methods and compositions for determining altered susceptibility of HIV-1 to anti-HIV drugs - This invention relates, in part, to methods and compositions for determining altered susceptibility of a human immunodeficiency virus (“HIV”) to the non-nucleoside reverse transcriptase inhibitors (“NNRTIs”) efavirenz (“EFV”), nevirapine (“NVP”), and delavirdine (“DLV”), the nucleoside reverse transcriptase inhibitor AZT, and the integrase strand transfer inhibitors diketo acid 1, diketo acid 2, and L-870,810 by detecting the presence of a mutation or combinations of mutations in the gene encoding HIV reverse transcriptase that are associated with altered susceptibility to the anti-HIV drugs. | 05-28-2009 |
20120003667 | ELECTROPHORETIC TAG-BASED IN VITRO ASSAY TO QUANTIFY DIMERIZATION OF P66 AND P51 SUB-UNITS OF HIV-1 REVERSE TRANSCRIPTASE (RT) - Methods for measuring hetero- and homodimerization of HIV reverse transcriptase (HIV RT) are provided using pairs of tagged probes and cleaving probes. The methods can be used, for example, to screen for modulators of HIV RT dimerization. Also provided are methods of determining whether a compound modulates HIV RT. Further provided are methods of determining whether a compound modulates formation of a complex between a p66 and p51, p66 and p66, or p51 and p55 subunits polypeptides of HIV RT. | 01-05-2012 |
20120135395 | Methods and Compositions for Determining Altered Susceptibility of HIV-1 to Anti-HIV Drugs - This invention relates, in part, to methods and compositions for determining altered susceptibility of a human immunodeficiency virus (“HIV”) to the non-nucleoside reverse transcriptase inhibitors (“NNRTIs”) efavirenz (“EFV”), nevirapine (“NVP”), and delavirdine (“DLV”), the nucleoside reverse transcriptase inhibitor AZT, and the integrase strand transfer inhibitors diketo acid 1, diketo acid 2, and L-870,810 by detecting the presence of a mutation or combinations of mutations in the gene encoding HIV reverse transcriptase that are associated with altered susceptibility to the anti-HIV drugs. | 05-31-2012 |
Surabhi Gupta, Stanford, CA US
Patent application number | Description | Published |
---|---|---|
20080300872 | SCALABLE SUMMARIES OF AUDIO OR VISUAL CONTENT - Providing for browsing a summary of content formed of keywords that can scale to a user-defined level of detail is disclosed herein. Components of a system can include a summarization component that extracts keywords related to the content and associates the keywords with portions thereof, and a zooming component that displays a number of keywords based on a keyword/keyphrase relevance rank and a zoom factor. Additionally, a speech to text component can translate speech associated with the content into text, wherein the keywords are extracted from the translated text. Consequently, the claimed subject matter can present a variable hierarchy of keywords to form a scalable summary of such recorded content. | 12-04-2008 |
Surendra K. Gupta, Laguna Niguel, CA US
Patent application number | Description | Published |
---|---|---|
20110230398 | Apolipoprotein C-II or its active fractions for the prevention or treatment of obesity and related metabolic disorders - Apoliporotein C-II or any active fraction of its amino acid sequence that activates lipoprotein lipase (LPL) in mammals. Increase in activity of LPL can increase expenditure of energy, and therefore an activator of LPL can be an effective agent for the prevention or treatment of obesity or related metabolic disorders, including cardiovascular disease, diabetes and hypertension in mammals including domestic pets and humans. Apolipoprotein C-II or its active fractions can be used as a diet supplement in the form of fortification to a natural product such as milk, cereal, beverage; as a nutritional supplement; or as a therapeutic agent in conventional forms of administration. | 09-22-2011 |
Vaibhav Gupta, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20120140575 | PROCESS TOLERANT LARGE-SWING SENSE AMPLFIER WITH LATCHING CAPABILITY - A process-tolerant large-swing sense amplifier with latching capability includes top-array and bottom-array access. The sense amplifier provides improved tolerance to process variation, reduces design complexity, reduces power consumption, and reduces the physical footprint of the circuit. In addition, the sense amplifier provides write-through functionality through the read data bus. | 06-07-2012 |
Vidyabhusan Gupta, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20100271144 | Clock, Frequency Reference, and Other Reference Signal Generator with Frequency Stability Over Temperature Variation - Exemplary embodiments provide a reference signal generator having a reference or center frequency within a predetermined variance over variations in temperature within a specified range. An exemplary apparatus comprises a reference resonator to generate a first reference signal having a resonant frequency, with the reference resonator having a first temperature dependence; and a plurality of switchable circuits, with at least one switchable circuit providing a second temperature dependence opposing the first temperature dependence to maintain the resonant frequency within a predetermined variance over a temperature variation. A wide variety of switchable circuits are disclosed, including a transistor having an on resistance value greater than a nominal resistance, a resistor coupled to a transistor or other switch, and circuit comprising a first reactance coupled to a first switch, with a second reactance coupled to a resistance and a second switch coupled in series to the second reactance or to the resistance. Various coatings may also be applied to an integrated circuit embodiment, such as a silicone coating on a first surface and a metal layer on a second surface. | 10-28-2010 |
Vinita Gupta, Novato, CA US
Patent application number | Description | Published |
---|---|---|
20080225898 | Method and apparatus for detecting and compensating for jitter in a communications network - Jitter in a clock signal can cause communications faults in communications networks, such as in networks in which downstream nodes use recovered clock signals as timing for upstream communications. An embodiment of the present invention detects and compensates for jitter in a network by recovering a reference clock associated with communications signals between nodes, such as an Optical Line Terminal (OLT) and Optical Network Terminal (ONT) in a Passive Optical Network (PON). A local clock is synchronized with the reference clock. Jitter induced faults may be detected and compensated for by increasing the synchronization rate, then decreasing the synchronization rate until jitter induced faults begin to occur. A loss or change in a rate of communications errors occurring as a function of the synchronization rate may be monitored and reported to a system operator. Compensating for jitter by adjusting the synchronization rate provides for robust communications between network nodes. | 09-18-2008 |
20090010643 | Method and apparatus for identifying faults in a passive optical network - Component malfunctions in passive optical networks (PON) can increase bit error rates and decrease signal-to-noise ratio in communications signals. These faults may cause the receivers of the signals, either the optical line terminal (OLT) or optical network terminals (ONTs), to experience intermittent faults and/or may result in misinterpreted commands that disrupt other ONT's communication, resulting in a rogue ONT condition. Existing PON protocol detection methods may not detect these types of malfunctions. An embodiment of the present invention identifies faults in a PON by transmitting a test series of data patterns via an optical communications path from a first network node to a second network node. The test series is compared to an expected series of data patterns. An error rate may be calculated as a function of the differences between the test series and expected series. The error rate may be reported to identify faults in the PON. | 01-08-2009 |
Vinita Gupta, San Rafael, CA US
Patent application number | Description | Published |
---|---|---|
20090052891 | Method and Apparatus for Reducing Error Rate During Data Transmission in an Optical Communications Network - An apparatus and a method of enhancing data integrity for data transmission over an optical network are disclosed. Upon detecting a low performance condition associated to the optical communications network, an error correcting code (“ECC”) device is activated. The ECC device inserts the ECC to a data stream to form an ECC data stream. Once the ECC data stream reaches to the destination, the ECC device corrects any errors incurred during the transmission, and removes the ECC from the ECC data stream. It should be noted that the ECC device can also be activated by a request from a network operator. | 02-26-2009 |
20090067832 | Method and Apparatus for Verifying Signaling Values in an Optical Distribution Network - An apparatus and a method for verifying optical system performance using a signaling value test are disclosed. After instructing the first optical interface device and the second optical interface device to enter a verification mode, the first optical interface device sends first verification data to the second optical interface device via an optical communications network. In one embodiment, the first optical interface device is an optical line termination (“OLT”) and the second optical interface device is an optical network terminal (“ONT”). Upon composing the first reply message in response to content received by the second optical interface in accordance with the first verification data, the second optical interface device forwards the first reply message to the first optical interface device. | 03-12-2009 |
Vishu Gupta, Atherton, CA US
Patent application number | Description | Published |
---|---|---|
20110087526 | Social Network Economy Using Gift Credits - In a social networking system environment, users can give another user credits, a scarce commodity, as part of commenting on content posted by the other user. These credits can be used as a peer-to-peer recommendation signal, and they can also be used as input to a decision engine that determines what content to display in a highlights section that will be viewed by a wider audience and increasing the likelihood of further engagement with the content. Credits in a social networking system environment have scarcity value. In various embodiments, in order to increase the number of credits in the system, users buy them or an administrator distributes them. In some implementations, the total amount of credits in the system can decrease if a user cashes out the credits for real money. In some implementations, credits can be used to buy virtual or real-world gifts. | 04-14-2011 |
20110125599 | Social License for Interactive Applications and Content - To encourage purchases and use, licenses to certain interactive applications and/or content are able to be given as gifts to others as part of a user purchasing a license for herself. In one implementation, each purchase of a license to an application includes the right to give a license to up to a predefined limit of other people. For example, the purchasing user buys a license for herself and the right to name a number of other people to also receive licenses to the same interactive application or content. | 05-26-2011 |
20130012306 | Social License for Interactive Applications and Content - To encourage purchases and use, licenses to certain interactive applications and/or content are able to be given as gifts to others as part of a user purchasing a license for herself. In one implementation, each purchase of a license to an application includes the right to give a license to up to a predefined limit of other people. For example, the purchasing user buys a license for herself and the right to name a number of other people to also receive licenses to the same interactive application or content. | 01-10-2013 |
20130159123 | CONTENT ACCESS MANAGEMENT IN A SOCIAL NETWORKING SYSTEM FOR LOCALLY STORED CONTENT - A content access management system receives an access determination requested identifying an access rule and a requesting user. The access rule may be created in advance by the content owner at the content access management system. The access rule may allow access to content objects based on the requesting user's biographic information, geographic information, affiliation information, payment information, or any other user characteristic. The user information may be entered by the requesting user at a social networking system interface for purposes unrelated to the content object or content owner. The content access management system retrieves the identified access rule and retrieves requesting user information based on the access rule. An access determination is made based on the retrieved access rule and requesting user information, and is transmitted to the content owner. | 06-20-2013 |
20130159519 | CONTENT ACCESS MANAGEMENT IN A SOCIAL NETWORKING SYSTEM FOR EXTERNALLY STORED CONTENT - A content access management system receives an access determination requested identifying an access rule and a requesting user. The access rule may be created in advance by the content owner at the content access management system. The access rule may allow access to content objects based on the requesting user's biographic information, geographic information, affiliation information, payment information, or any other user characteristic. The user information may be entered by the requesting user at a social networking system interface for purposes unrelated to the content object or content owner. The content access management system retrieves the identified access rule and retrieves requesting user information based on the access rule. An access determination is made based on the retrieved access rule and requesting user information, and is transmitted to the content owner. | 06-20-2013 |
20140012905 | SYSTEMS AND METHODS FOR SHARING OF MEDIA SESSIONS WITHIN A SOCIAL NETWORK - To facilitate the sharing of media sessions by users within a social network. In an embodiment, a social networking system provides, for a second user of a social networking system, a reference about a first media session for a first user of the social networking system. The social networking system receives a request to participate in the first media session from the second user. The social networking system facilitates provision of a second media session for the second user that is synchronized with the first media session. The first media session may include media from at least one of an audio application, a video application, and a gaming application. | 01-09-2014 |