Patent application number | Description | Published |
20090189530 | METHOD AND APPARATUS FOR LIGHT INTENSITY CONTROL - The present invention provides a method and apparatus for optical feedback control for an illumination device, wherein the control signal for each array of one or more light-emitting elements corresponding to a particular colour, is independently configured using a modification signal whose frequency is different for each colour. Electronic filters whose center frequencies are substantially equal to the modification signal frequencies of the drive currents for the light-emitting elements are used to discriminate between the radiant flux corresponding to each of the different colours of light-emitting elements, from a sample of the mixed radiant flux output collected by one or more optical sensors. The output of an individual electronic filter is substantially directly proportional to the radiant flux output of the light-emitting elements of the associated colour, which together with the desired luminous flux and chromaticity of the output light, the controller can use to adjust the control signals. | 07-30-2009 |
20100014676 | PRIVACY MANAGEMENT FOR TRACKED DEVICES - A device, method, system and computer readable medium for the protection of private data while permitting the monitoring or tracking of electronic devices that are shared for both business and private purposes. | 01-21-2010 |
20100115417 | CONDITIONAL WINDOW CAPTURE - A device, method, system and computer readable medium are disclosed for the remote, intelligent capture of screenshots and keystrokes which can subsequently be transmitted with reduced bandwidth requirements. | 05-06-2010 |
20100194567 | LOCATION DEPENDENT MONITORING FOR STOLEN DEVICES - A system and method for controlling the surveillance conducted by lost or stolen electronic devices dependent upon the location of such electronic devices is provided. A data repository contains data that specifies, for each of a plurality of geographic regions (e.g. legal jurisdictions), a set of surveillance methods that are permissible in the respective region. At least some of the geographic regions have different respective sets of permissible surveillance methods than others. A computer system is operable to communicate with the devices over a computer network, and programmed to use received information regarding a location of a potentially lost or stolen device, in combination with the data in the computer data repository, to cause the potentially lost or stolen device to initiate surveillance according to the set of permissible surveillance methods (and/or other actions) corresponding to the location. | 08-05-2010 |
20120105228 | CODED WARNING SYSTEM FOR LIGHTING UNITS - The application discloses a method and apparatus for providing a desired warning signal for a lighting unit. A coded warning system is provided employing a detection module ( | 05-03-2012 |
20120150264 | SKIN RADIATION APPARATUS AND METHOD - A skin radiation apparatus comprises: —a photon radiation unit ( | 06-14-2012 |
20120169249 | SYSTEMS AND APPARATUS FOR AUTOMATICALLY DERIVING AND MODIFYING PERSONAL PREFERENCES APPLICABLE TO MULTIPLE CONTROLLABLE LIGHTING NETWORKS - Systems and methods for deriving and modifying personal preferences related to at least one controllable lighting network are disclosed. The systems include a processor that can be used in conjunction with a personal communication device and a preferences database. The processor is used to detect an identifier for a user, a plurality of adjustments to the at least one controllable lighting network requested by the user, and a context corresponding to each of the plurality of adjustments. The processor in some such systems has an associated local memory to store the plurality of adjustments, corresponding contexts, and the identifier of the associated user. The processor is further used to analyze the plurality of lighting adjustments and the corresponding contexts. Based on the analysis, the processor identifies a correlation between the plurality of adjustments and the contexts, and create at least one personal preference rule associated with the user identifier based on the correlation. The preferences database in some such systems is used to store the rules and the plurality of adjustments. | 07-05-2012 |
20120184299 | SYSTEMS AND METHODS FOR MANAGING INTERACTION WITH CONTROLLABLE LIGHTING NETWORKS - Systems and methods for managing interaction with controllable lighting networks are disclosed. Particularly, a user's input regarding the user's preferred level of interaction with a controllable lighting network is used in conjunction with memories and processors, to selectively allow the controllable lighting network access to the user's personal data such as the user's identity or the user's personal lighting preferences. A user's preferred level of interaction with a controllable lighting network is also used, in conjunction with personal mobile electronic communication devices, to allow the user to control lighting within controllable lighting networks. | 07-19-2012 |
20120217880 | OBJECT-SENSING LIGHTING NETWORK AND CONTROL SYSTEM THEREFOR - Disclosed herein is an object-sensing lighting network and an intelligent control system therefore. The control system dynamically determines the at least one lighting fixture's relationship to a plurality of other lighting fixtures. The light output level of a light source of the at least one lighting fixture is based at least partially on the at least one lighting fixture's relationship to the other lighting fixtures. | 08-30-2012 |
20130101264 | METHODS AND APPARATUS FOR CAPTURING AMBIENCE - A mobile ambience capturing device ( | 04-25-2013 |
20130241729 | LOCATION DEPENDENT MONITORING FOR STOLEN DEVICES - A system and method for controlling the surveillance conducted by lost or stolen electronic devices dependent upon the location of such electronic devices is provided. A data repository contains data that specifies, for each of a plurality of geographic regions (e.g. legal jurisdictions), a set of surveillance methods that are permissible in the respective region. At least some of the geographic regions have different respective sets of permissible surveillance methods than others. A computer system is operable to communicate with the devices over a computer network, and programmed to use received information regarding a location of a potentially lost or stolen device, in combination with the data in the computer data repository, to cause the potentially lost or stolen device to initiate surveillance according to the set of permissible surveillance methods (and/or other actions) corresponding to the location. | 09-19-2013 |
20140156545 | Automated Generation Of Affidavits And Legal Requisitions Including Mobile Device Identification - Approaches for a server, upon receiving notification that a device has been stolen, composing a legal requisition document. An identification of the device is received or otherwise obtained. A legal requisition template for use in a particular jurisdiction where the device was stolen is retrieved. Upon consulting a database which stores information about police departments of a plurality of jurisdictions, the legal requisition document is composed using the template, the identification, and data retrieved from the database. The server may electronically send the legal requisition document to a police department associated with the particular jurisdiction. Advantageously, information about the activity of a device reported stolen may be obtained before the device is factory reset. | 06-05-2014 |
20140182002 | PROCESS FOR CAPTURING AND TRANSMITTING WINDOW SCREEN DISPLAY DATA - A process is disclosed for capturing screenshots on an electronic device of a user, and for transmitting representations of the captured screenshots to a monitoring system for storage. The captured screenshot data may, for example, be used to recover a device that is lost or stolen. | 06-26-2014 |
20140278923 | CONSUMER CONTROLLED TRACKING OF AD INTERACTIONS LEADING TO PURCHASES - A system is disclosed that records a user's interactions with online ads, and that detects associations between these interactions and subsequent purchases (such as in-store purchases). The system may include a mobile application that tracks the ad interactions and purchase events. Users control whether the associations between the purchases and ad interactions are divulged to an ad serving entity or any other entity. In return for divulging the associations, the user may be offered compensation. The system enables the ad serving entity to bill the advertiser on a pay-per-purchase basis, and enables advertisers to obtain clear performance indicators for their ads. | 09-18-2014 |
20140278941 | CONSUMER CONTROLLED TRACKING OF AD INTERACTIONS LEADING TO PURCHASES - A system is disclosed that records a user's interactions with online ads, and that detects associations between these interactions and subsequent purchases (such as in-store purchases). The system may include a mobile application that tracks the ad interactions and purchase events. Users control whether the associations between the purchases and ad interactions are divulged to an ad serving entity or any other entity. In return for divulging the associations, the user may be offered compensation. The system enables the ad serving entity to bill the advertiser on a pay-per-purchase basis, and enables advertisers to obtain clear and specific performance indicators for their ads. | 09-18-2014 |
Patent application number | Description | Published |
20100325056 | System and method for facilitating property comparisons - A system and method allowing a user to quickly receive a ranked comparison of homes for sale based on default criteria or criteria of the user's choice. An interactive website is provided into which a home buyer can enter details of several properties under consideration for purchase and receive a ranked comparison list in order of best value for money. Homebuyers may change the weightings of the criteria according to their preferences. An alternate home price is calculated for the homes ranked below first such that they have the same perceived value per dollar as the top ranked home. Finally, there is an option for the homebuyer to share results with the online community. | 12-23-2010 |
20110057797 | ALERT FOR REAL-TIME RISK OF THEFT OR LOSS - Devices, methods, systems and a computer readable medium for the provision of alerts to electronic devices in response to real-time, location based analysis of the risk of theft or loss of such devices are provided. A continually updated database of locations of thefts, losses and/or stolen or lost electronic devices is accessed in order to provide the alerts to the electronic devices. | 03-10-2011 |
20110115621 | MULTIPLE DEVICE LOSS STATUS RETRIEVAL WITHOUT ID PROVISION - A system is disclosed that enables multiple electronic devices to be tracked in the case of theft or loss without the need for monitoring or tracking the devices prior to the loss or theft. The system operates by sending bulk status information regarding the lost/stolen statuses of multiple devices to one of these devices. The receiving device then decodes the bulk status information to determine its own lost/stolen status. If the status reveals that the device is currently reported as lost or stolen, the device initiates an appropriate security action, such as the transmission of its location to a monitoring center. | 05-19-2011 |
20110305025 | LED-BASED LAMPS AND THERMAL MANAGEMENT SYSTEMS THEREFOR - Disclosed herein is a lamp including an LED-based light source ( | 12-15-2011 |
20110316451 | SYSTEMS AND APPARATUS FOR THE LIGHT-BASED COMMUNICATION OF SERVICE ORDERS AND PERSONAL OBJECTS IDENTIFICATION - Light-based systems for communicating information associated with service orders and/or the identification of personal objects are disclosed. A personal mobile electronic communication device is used in conjunction with a communication network and a lighting controller to communicate service orders by lighting with one or more individually controllable luminaries in a lighting network. A personal mobile electronic communication device is, alternatively or additionally, used in conjunction with a communication network, a memory, and a lighting controller controlling to indicate by lighting whether there is an association between the personal mobile electronic communication device and a personal item. | 12-29-2011 |
20120003991 | METHOD AND SYSTEM FOR TRACKING MOBILE ELECTRONIC DEVICES WHILE CONSERVING CELLULAR NETWORK RESOURCES - A system and associated methods are disclosed for tracking mobile electronic devices while conserving cellular network resources used for such tracking. The tracking may be performed for purposes of facilitating recovery of lost or stolen devices. To conserve network resources, different telephone numbers may be assigned depending upon the location of each device and the time of each call, and individual calls may be made only after a determination has been made that a telephone call is required. A determination that a telephone call is required may be made depending upon whether a protected electronic device had been reported lost or stolen, and/or whether an internet communication between the protected electronic device and a monitoring center has been made within a selected previous period of time. A dynamic schedule permits reserved telephone call slots to be freed up if not needed so that they can be used for devices that need the communication time. | 01-05-2012 |
20120013072 | Puzzle with Polycubes of Distributed and Low Complexity for Building Cube and Other Shapes - An assembly puzzle comprising different polycubes that can be arranged to form a cube comprising sixty-four unit cubes. Included in the puzzle are polycubes of a sufficiently distributed complexity to allow meaningful hints to be given without actually providing a solution. Furthermore, the polycubes can be arranged in different configurations to build a wide variety of shapes other than a cube. | 01-19-2012 |
20120034934 | SYSTEMS AND APPARATUS FOR LIGHT-BASED SOCIAL COMMUNICATIONS - Light-based systems for communicating information associated with the formation of social connections are disclosed. One or more lighting controllers controlling individually controllable luminaires are used in conjunction with communication networks in order to identify and form remote light-based social connections. Additionally, visualization controllers are used in conjunction with visualization infrastructures, visualization actuators, localization systems and identification systems to visually identify proximally present potential social connections. | 02-09-2012 |
20120165907 | LIGHT TREATMENT SYSTEM - The invention relates to a light treatment system ( | 06-28-2012 |
20120253432 | LIGHT TREATMENT SYSTEM - The invention relates to a light treatment system ( | 10-04-2012 |
20140132390 | INTELLIGENT LIGHTING NETWORK FOR GENERATING LIGHT AVATARS - Disclosed is an intelligent lighting network for facilitating operation of a lighting system including at least one controllable light source and configured to generate light representing light avatars uniquely associated one or more users of a plurality of users. The light avatar is a light pattern suitable to represent the user and/or convey information about the user to other users. | 05-15-2014 |
20140164766 | PRIVACY MANAGEMENT FOR TRACKED DEVICES - A system is disclosed that protects private data of users while permitting the monitoring or tracking of electronic devices that are shared for both business and private purposes. The electronic devices may be configured to selectively encrypt location data, and/or other types of data, before such data is transmitted to a monitoring center. For example, data collected or generated on a user device outside of work hours may be encrypted with a private key of the device's user prior to transmission to the monitoring center, so that the data is not accessible to the employer. Data collected or generated during work hours may be transmitted without such encryption. | 06-12-2014 |
20140197952 | ALERT FOR REAL-TIME RISK OF THEFT OR LOSS - Devices, methods, systems and a computer readable medium for the provision of alerts to electronic devices in response to real-time, location based analysis of the risk of theft or loss of such devices are provided. A continually updated database of locations of thefts, losses and/or stolen or lost electronic devices is accessed in order to provide the alerts to the electronic devices. | 07-17-2014 |
20140285343 | ALERT FOR REAL-TIME RISK OF THEFT OR LOSS - A computer process is disclosed for assessing the risk of theft or loss of electronic devices in particular locations. The risk assessments may be based on data regarding reported theft and/or loss events, and based on data regarding current locations of user devices. The risk assessments may be used to generate location-based alerts. | 09-25-2014 |
20140292528 | SYSTEMS AND APPARATUS FOR THE LIGHT-BASED COMMUNICATION OF SERVICE ORDERS AND PERSONAL OBJECTS IDENTIFICATION - Light-based systems for communicating information associated with service orders and/or the identification of personal objects are disclosed. A personal mobile electronic communication device is used in conjunction with a communication network and a lighting controller to communicate service orders by lighting with one or more individually controllable luminaires in a lighting network. A personal mobile electronic communication device is, alternatively or additionally, used in conjunction with a communication network, and a lighting controller controlling an illumination proximate to the personal mobile electronic communication device such that the illumination proximate to the personal mobile electronic communication device visually indicates the service order. | 10-02-2014 |
Patent application number | Description | Published |
20140060045 | TURBO COMPOUNDING HYBRID GENERATOR POWERTRAIN - A turbo compounding internal combustion engine system includes an internal combustion engine and one or more valves for controlling a flow of an exhaust gas of the internal combustion engine. The system also includes a controller configured to monitor an operation mode of the internal combustion engine and responsively control the one or more valves and a turbine configured to selectively receive the exhaust gas from the internal combustion engine and to convert exhaust energy into a mechanical power. The system further includes a clutched gear drive selectively coupled to the turbine and the internal combustion engine, wherein the clutched gear drive is configured to provide the mechanical power generated by the turbine to the internal combustion engine. | 03-06-2014 |
20140298799 | EXHAUST MANIFOLD - An exhaust manifold for at least a portion of an internal combustion engine having a defined number of combustion chambers includes a plurality of inlet ports and four outlet ports. A first pair of the four outlet ports are disposed in gas flow communication with a first subset of the plurality of inlet ports, and a second pair of the four outlet ports different from the first pair are disposed in gas flow communication with a second subset of the plurality of inlet ports different from the first subset. | 10-09-2014 |
20140360459 | Reduced Torque Variation for Engines with Active Fuel Management - In one exemplary embodiment, a method for active fuel management in an engine having a plurality of cylinders is provided, the method including stopping a fuel flow into a first set of the plurality of cylinders, the stopping causing a deactivation of the first set of cylinders and continuing injection of fuel into a second set of the plurality of cylinders to provide power while the first set of cylinders are deactivated. The method also includes injecting gas into the first set of the plurality of cylinders when each of the first set of cylinders are at bottom dead center, the injected gas increasing a cylinder pressure in each of the first set of cylinders that reduces an amplitude of first order torque variations during operation of the engine while the first set of cylinders are deactivated. | 12-11-2014 |
20150034408 | TURBOCHARGING SYSTEM - An internal combustion engine includes a cylinder block defining a cylinder and a cylinder head mounted to the block. The cylinder head supplies air and fuel to the cylinder for combustion therein. The engine also includes an exhaust manifold operatively connected to the cylinder head and having a first outlet and a second outlet configured to exhaust post-combustion gasses from the cylinder. The engine also includes a turbocharging system configured to pressurize an airflow for delivery thereof to the cylinder. The turbocharging system includes a low-flow turbocharger driven by the post-combustion gasses from the first outlet to pressurize the airflow and a high-flow turbocharger driven by the post-combustion gasses from the second outlet to pressurize the airflow. The turbocharging system additionally includes a flow control device for selectively directing the post-combustion gasses to the low-flow and high-flow turbochargers. A vehicle employing such an engine is also disclosed. | 02-05-2015 |
Patent application number | Description | Published |
20110247061 | COMPUTATION TO GAIN ACCESS TO SERVICE - Access to some aspect of a service may be limited until a user has invested in performing some amount of computation. Legitimate users typically have excess cycles on their machines, which can be used to perform computation at little or no cost to the user. By contrast, computation is expensive for for-profit internet abusers (e.g., spammers). These abusers typically use all of their computing resources to run “bots” that carry out their schemes, so computation increases the abuser's cost by forcing him or her to acquire new computing resources or to rent computer time. Thus, the providers of free services (e.g., web mail services, blogging sites, etc.), can allow newly registered users to use some limited form of the service upon registration. However, in order to make more extensive use of the service, the user can be asked to prove his legitimacy by investing in some amount of computation. | 10-06-2011 |
20110252476 | EARLY DETECTION OF POTENTIAL MALWARE - Evidence of attempted malware attacks may be used to identify the location and nature of future attacks. A failed attack may cause a program to crash. Crash data may be sent to an analyzer for analysis. The analysis may reveal information such as the identity of the program that is being exploited, the specific way in which the program is being exploited, and the identity or location of the source of the attack. This information may be used to identify potential sources of attack and to identify the same type of attack from other sources. When the source and/or nature of an attempted attack is known, remedial action may be taken. Filters may warn users who are attempting to visit sites from which attacks have been attempted, and the makers of programs that are being exploited can be notified so that those program makers can release updates. | 10-13-2011 |