Patent application number | Description | Published |
20080225981 | SYSTEM AND METHOD FOR SYNCHRONIZATION, POWER CONTROL, CALIBRATION, AND MODULATION IN COMMUNICATION TRANSMITTERS - A system is provided for processing a communication signal including a baseband amplitude component and a baseband phase component. The system includes an amplitude predictor configured for closed-loop pre-distortion of a baseband amplitude component, an amplitude lookup table configured for open-loop pre-distortion of the baseband amplitude component, and an amplitude interpolator configured to build up the amplitude lookup table during a closed-loop calibration period. The system also includes a phase predictor configured for closed-loop pre-distortion of a baseband phase component, a phase lookup table configured for open-loop pre-distortion of the baseband phase component, and a phase interpolator configured to build up the phase lookup table during a closed-loop calibration period. | 09-18-2008 |
20080225984 | Digital Polar Transmitter - A digital polar transmitter includes a baseband processor configured to receive an input signal and to convert the input signal into a baseband amplitude component and a baseband phase component. The transmitter also includes a phase modulator in communication with the baseband processor. The phase modulator is configured to modulate an RF carrier signal based on the phase component and to generate a phase-modulated RF carrier signal. A power amplifier is provided in communication with the baseband processor and the phase modulator. The power amplifier is configured to amplify the phase-modulated RF carrier signal based on the baseband amplitude component and to generate an amplified RF signal. The transmitter also includes a digital feedback loop in communication with the power amplifier and the baseband processor. The digital feedback loop is configured to detect the amplified RF signal and to provide a digital amplitude feedback signal and a detected phase feedback signal to the baseband processor. | 09-18-2008 |
20090251195 | CALIBRATION TECHNIQUES FOR NON-LINEAR DEVICES - An apparatus may include a non-linear module, a control module, and a calibration module. The non-linear module produces an output signal from an input signal. The control module selects, upon an occurrence of a calibration condition, a calibration operation from two or more calibration operations. Each of the two or more calibration operations may generate one or more correction values for the non-linear module. Further, each of the calibration operations produces the input signal from a pre-input signal. This selected calibration operation is performed by the calibration module. The two or more calibration operations include a first calibration operation and a second calibration operation. The first calibration operation produces the input signal from the pre-input signal according to a predictive technique. The second calibration operation produces the input signal from the pre-input signal according to a non-predictive technique. | 10-08-2009 |
20110085619 | SYSTEM AND METHOD FOR SYNCHRONIZATION, POWER CONTROL, CALIBRATION, AND MODULATION IN COMMUNICATION TRANSMITTERS - A system is provided for processing a communication signal including a baseband amplitude component and a baseband phase component. The system includes an amplitude predictor configured for closed-loop pre-distortion of a baseband amplitude component, an amplitude lookup table configured for open-loop pre-distortion of the baseband amplitude component, and an amplitude interpolator configured to build up the amplitude lookup table during a closed-loop calibration period. The system also includes a phase predictor configured for closed-loop pre-distortion of a baseband phase component, a phase lookup table configured for open-loop pre-distortion of the baseband phase component, and a phase interpolator configured to build up the phase lookup table during a closed-loop calibration period. | 04-14-2011 |
20130279373 | METHOD AND APPARATUS FOR PROVIDING AN INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM TRIGGERING SERVICE - A method and apparatus are described for providing triggering services over multiple access networks. A triggering service server (TSS) architecture includes a triggering identity function (TIF) which maintains a database of device and application identifier mappings across multiple access networks, triggering capabilities and triggering preferences. The TSS also includes a triggering decision function (TDF) that uses information from the TIF and determines how triggers should be performed towards a device and/or an application hosted on a particular device. The TSS also includes triggering gateways (T-GWs) that perform triggering in different domains. A “not-registered-triggerable” state may be used to indicate whether an entity, such as a device, application or user can receive triggers although it is not registered in a specific access network. Methods and apparatus are also described for implementing various unassisted triggering and assisted triggering procedures using wireless transmit/receive units (WTRUs), application servers (ASs) and service capability servers (SCSs). | 10-24-2013 |
20140067902 | METHOD AND APPARATUS FOR USING MULTIPLE UNIVERSAL RESOURCE IDENTIFIERS IN M2M COMMUNICATIONS - A method and apparatus may use multiple URIs (MU) in a single request message for machine-to-machine (M2M) communication networks. Multiple single URI (SU)-type request messages may be received from an application client (e.g. a constrained application protocol (CoAP)/hypertext transfer protocol (HTTP) client) at a (CoAP/HTTP) intermediary node. The multiple SU-type request messages may be aggregated into a single MU-type request message at the intermediary node, and the single MU-type request message may be transmitted to a (CoAP/HTTP) server. A multiple value (MV)-type response message may be received from the (CoAP/HTTP) server. The MV-type response message may be deaggregated into multiple single value (SV)-type response messages. The multiple SV-type response messages may be transmitted to the (CoAP/HTTP) client. | 03-06-2014 |
20140379804 | CONTEXT MANAGEMENT - Systems, methods, and apparatus embodiments are described herein for context information management at the medium access control layer. In one embodiment, a system comprises a plurality of peers which communicate via peer-to-peer communications. In the system, context information may be exchanged at the MAC layer. Examples of context information include, without limitation, location information, mobility information, device capability, user information, an application category, multi-hop information, a channel condition, application information, association identifiers, and device information. Each of the plurality of peers may include a context manager that resides on each peer device. For example, a first context manager that resides on a first peer of the plurality of peers may exchange context information with a second context manager that resides on a second peer of the plurality of peers. In another example embodiment, the first peer, and in particular the first context manager that resides on the first peer, can retrieve the context information from a layer that is different than the MAC layer. | 12-25-2014 |
20150016359 | PEER-TO-PEER COMMUNICATIONS ENHANCEMENTS - An enhanced general superframe structure for peer-to-peer communications in proximity is disclosed, which may be implemented in connection with a variety of different channel access techniques. Additionally, methods are disclosed for enabling multiple P2PNWs in proximity operating under different control schemes, including virtually centralized control, distributed control, and hybrid control, to co-exist. A hyperframe structure is also disclosed, which may comprise two or more superframes, each superframe corresponding to a different one of the corresponding P2PNW control schemes. | 01-15-2015 |
20150019717 | CONTEXT-AWARE PROXIMITY SERVICES - Disclosed herein are a variety of systems, operations, MAC primitives, and procedures for context-aware Peer-to-Peer communications and multi-application Peer-to-Peer communications. An example system for a context-aware Peer-to-Peer communications system may include a physical and Medium Access Control (PHY/MAC) layer and an upper layer above the PHY/MAC layer. The PHY/MAC layer may include at least one of a discovery function, an association function, a data transceiving function, a channel management function, a general scan function, a synchronization function, a power control function, or management and reporting function. The upper layer may be one of a service layer or an application layer. | 01-15-2015 |
20150055640 | METHOD AND APPARATUS FOR SUPPORTING MACHINE-TO-MACHINE COMMUNICATIONS - A method and apparatus for distributed services and data in a machine-to-machine (M2M) communication network are disclosed. A network server, an M2M gateway, and M2M devices include an M2M service capability layer for supporting M2M service capabilities, respectively. Reference points may be defined for interactions between network service capability layers, between gateway service capability layers, between a gateway service capability layer and a device service capability layer of an M2M device, between M2M device applications, and/or between a network, gateway, or device service capability layer and an M2M application. The network server may be split into a control server and a data server at a service capability layer to provide service capabilities for control functions and service capabilities for data functions, respectively. The data server may be configured to interact with another data server to push or pull data or resources either directly or indirectly via the control server. | 02-26-2015 |
20150127733 | CONTEXT-AWARE PEER-TO-PEER COMMUNICATION - Methods and systems are disclosed for determining context information for one or more peers to be used in a peer discovery and/or peer association process(es) and/or to otherwise facilitate P2P proximity communications. For example, a method for determining peer context information may include receiving a context-aware identifier (CAID). The CAID may include one or more items of context information associated with the peer in addition to an indication of an identity of the peer. A first portion of the CAID may be decoded to determine a first item of context information associated with the peer. The first portion of the CAID may be decodable without having to process a payload portion of the message. It may be determined whether to continue processing one or more of the CAID or the message based on the first item of context information. The CAID may be used in discovery and/or association procedure(s). | 05-07-2015 |
20150263833 | Multi-Hop Peer-To-Peer Communications - Frame structures may be designed and channels may be allocated in a manner to support multi-hop for fully distributed and infrastructure-less peer-to-peer communications in proximity. Frame structures may have a dedicated multi-hop period near the end of a superframe. | 09-17-2015 |
20150263880 | CROSS-LAYER CONTEXT MANAGEMENT - In peer-to-peer (P2P) communications, it has been recognized herein that various context information needs to be exchanged between peer devices (PDs) or between different layers/protocols within a peer device (PD). Various embodiments described herein address how to design effective management functions, services, and primitives for context management across and/or within different protocol layers to enable context-aware peer-to-peer communications in proximity. This disclosure proposes multiple embodiments for cross-layer context management in context-aware peer-to-peer communication in proximity. For example, embodiments described herein provide context management to efficiently enable context-aware P2P communications, such as, for example, social networks. | 09-17-2015 |
20150282177 | METHOD AND APPARATUS FOR NEGOTIATING "KEEP-ALIVE" MESSAGE FREQUENCIES OF APPLICATIONS RUNNING ON A MOBILE STATION - A method and apparatus are described for negotiating “keep-alive” message frequencies of applications running on a wireless transmit/receive unit (WTRU). A node may include a negotiation and synchronization function (NSF) configured to collect information including frequencies of keep-alive messages required by application servers for different applications running on the WTRU, and send a keep-alive message frequency negotiation request message to the application servers to negotiate for a more proper frequency for each application on behalf of the WTRU. The node may further include a buffering and caching function (BCF) configured to cache and buffer application specific attributes including an indication of whether each of the applications needs to send periodic keep-alive messages to an associated application server. The node may be a packet data network gateway, a negotiation and caching gateway, or a serving gateway. | 10-01-2015 |
20150312700 | DEVICE INITIATED TRIGGERS - Embodiments contemplate wireless communication that may include sending machine type communication (MTC) application data from a services capability server (SCS) to an MTC user equipment (UE/WTRU) using a device trigger. The device trigger may be used to instruct an MTC device application to initiate communications with an SCS. Embodiments also contemplate that a first device trigger (DT) request may be received from a first wireless transmit/receive unit (WTRU) and a machine-type-communication inter-working function (MTC-IWF) may be determined in response to the first DT request. A second DT request may be sent to the MTC-IWF; and a first DT response may be received from the MTC-IWF. The first DT response may include a first information regarding a second WTRU. | 10-29-2015 |
20150312953 | Reliable Multicast/Broadcast for P2P Communications - Methods and apparatus may be used to provide reliable multicast or broadcast for peer-to-peer (P2P) communications. A wireless transmit/receive unit (WTRU) may receive a medium access control (MAC) data frame. The MAC data frame may indicate a flexible acknowledgement (ACK) type (e.g., a subset of peers, a single peer, location based, context based, and/or packet type based). The MAC data frame may indicate an ACK sequence. The ACK sequence may indicate an ACK transmission sequence among peers. The WTRU may determine whether to send an ACK message based on the flexible ACK type and/or the ACK sequence. The WTRU may receive an ACK message from a peer. The WTRU may send the ACK message when it is determined that the ACK message should be sent. | 10-29-2015 |
20150319759 | APPARATUS AND METHOD OF USING TIME REUSE FRAME STRUCTURES FOR MULTI-HOP COMMUNICATIONS - A system and method of using time reuse frame structures for improving multi-hop communications are disclosed. Namely, the system is networked and includes a superframe structure for multi-hop communication including tiers. The system also includes a computer-implemented device located in an initiator subframe of a first tier frame of the superframe. The device including a non-transitory memory including executable instructions for multi-hop communication and a processor operably coupled thereto for executing the multi-hop communication. The system also includes a second tier frame of the superframe including at least two hopper subframes. Each of the at least two hopper subframes including a contention access period and a contention free period. | 11-05-2015 |
20160044621 | METHOD AND APPARATUS FOR CONTEXT-AWARE SYNCHRONIZATION FOR PEER-TO-PEER COMMUNICATION - Apparatuses, computer readable media, and methods are disclosed for context aware synchronization for peer-to-peer communication. A method may include extracting from a super beacon synchronization information. The method may further include synchronizing with a beacon of an application based on the synchronization information. Another method may include extracting synchronization information from a received beacon, if the received beacon is for a first application. The method may further include if the received beacon is not for a first application, then extracting common beacon synchronization information from the received beacon, scanning for the common beacon based on the extracted common beacon synchronization information, receiving the common beacon, and extracting common channel synchronization information from the common beacon. Another method may include transmitting synchronization information in a data packet to a WTRU, if there is data to be transmitted, and otherwise transmitting synchronization information in a dummy packet to the second WTRU. | 02-11-2016 |
Patent application number | Description | Published |
20110074944 | SYSTEM AND METHODS FOR GENERATING A BRIGHTFIELD IMAGE USING FLUORESCENT IMAGES - A method for generating a brightfield type image, which resembles a brightfield staining protocol of a biological sample, using fluorescent images is provided. The steps comprise acquiring two or more fluorescent images of a fixed area on a biological sample, mapping said fluorescent image into a brightfield color space, and generating a bright field image. Also provided is an image analysis system for generating a brightfield type image of a biological sample using fluorescent images. | 03-31-2011 |
20140185905 | ANALYZING THE EXPRESSION OF BIOMARKERS IN CELLS WITH CLUSTERS - A data set of cell profile data is stored. The cell profile data includes multiplexed biometric image data describing the expression of a plurality of biomarkers. Cell profile data is generated from tissue samples drawn from a cohort of patients having an assessment related to the commonality. Multiple sets of clusters of similar cells are generated from the data set; the proportion of cells in each cluster is examined for an association with a diagnosis, a prognosis, or a response; and a predictive set of clusters is selected based on model performance. One predictive set of clusters is selected based on a comparison of the performance of at least one model of the plurality of sets of clusters. Display techniques that aid in understanding the characteristics of a cluster are disclosed. | 07-03-2014 |
20140314299 | System and Method for Multiplexed Biomarker Quantitation Using Single Cell Segmentation on Sequentially Stained Tissue - Improved systems and methods for the analysis of digital images are provided. More particularly, the present disclosure provides for improved systems and methods for the analysis of digital images of biological tissue samples. Exemplary embodiments provide for: i) segmenting, ii) grouping, and iii) quantifying molecular protein profiles of individual cells in terms of sub cellular compartments (nuclei, membrane, and cytoplasm). The systems and methods of the present disclosure advantageously perform tissue segmentation at the sub-cellular level to facilitate analyzing, grouping and quantifying protein expression profiles of tissue in tissue sections globally and/or locally. Performing local-global tissue analysis and protein quantification advantageously enables correlation of spatial and molecular configuration of cells with molecular information of different types of cancer. | 10-23-2014 |
20150133321 | QUANTITATIVE IN SITU CHARACTERIZATION OF BIOLOGICAL SAMPLES - The present disclosure relates to characterization of biological samples. By way of example, a biological sample may be contacted with a plurality of probes specific for targets in the sample, such as probes for immune markers and segmenting probes. Acquired image data of the sample may be used to segment the images into epithelial and stromal regions to characterize individual cells in the sample based on the binding of the probes. Further, the biological sample may be characterized by a distribution, location, and type of a plurality of the characterized cells. | 05-14-2015 |
20150285720 | METHOD OF FORMALIN BASED TISSUE FIXATION - Disclosed are novel cold fixation methods and reagents comprising contacting a biological sample with a reagent for fixation at a temperature of less than 20° C. where the reagent comprises an aqueous buffer, a water soluble alkylnitrile, C2 to C6 alkyl ester, or combination thereof, and formaldehyde to the aqueous buffer solution and removing the biological sample from contact with the reagent. | 10-08-2015 |
Patent application number | Description | Published |
20090141738 | Reservation-Based Distributed Collision Avoidance Channel Access For Wireless Local Area Networks - Each station on a wireless network comprises memory indicating whether it is in an IN or an OUT state; a reservation store storing reserved time slots of other stations on the network; a backoff counter (BC) value determination engine for selecting an unreserved time slot in the reservation store as the next time slot for a next transmission if in the IN state, and for determining the next time slot according to a predetermined algorithm if in the OUT state; and a medium access engine for initiating a current transmission during a previously reserved time slot and after a first idle interval if in the IN state, and for initiating the current transmission during a previously determined time slot and after a second idle interval shorter than the first idle interval if in the OUT state, the current transmission identifying the next time slot. | 06-04-2009 |
20090175251 | Multiple Wireless Local Area Networks For Reliable Video Streaming - A media center system comprises a first wireless controller operative to communicate with a first set of devices on a first WLAN using a first wireless standard; a first network processor coupled to the first wireless controller and operative to establish wireless communication over a first channel with the first set of devices on the first WLAN; a second wireless controller operative to communicate with a second set of devices on a second WLAN using a second wireless standard, the second wireless controller substantially dedicated for multimedia content delivery; and a second network processor coupled to the second wireless controller and operative to establish wireless communication over a second channel with the second set of devices on the second WLAN, the second channel being different than the first channel. | 07-09-2009 |
20110062563 | NON-VOLATILE MEMORY WITH REDUCED MOBILE ION DIFFUSION - Mobile ion diffusion causes a shift in the threshold voltage of non-volatile storage elements in a memory chip, such as during an assembly process of the memory chip. To reduce or avoid such shifts, a coating can be applied to a printed circuit board substrate or a leader frame to which the memory chip is surface mounted. An acrylic resin coating having a thickness of about 10 μm may be used. A memory chip is attached to the coating using an adhesive film. Stacked chips may be used as well. Another approach provides metal barrier traces over copper traces of the printed circuit board, within a solder mask layer. The metal barrier traces are fabricated in the same pattern as the copper traces but are wider so that they at least partially envelop and surround the copper traces. Corresponding apparatuses and fabrication processes are provided. | 03-17-2011 |
20110075482 | MAINTAINING INTEGRITY OF PRELOADED CONTENT IN NON-VOLATILE MEMORY DURING SURFACE MOUNTING - A non-volatile memory chip package is prepared for surface mounting to a substrate in a solder reflow process by programming erased blocks to higher threshold voltage levels, to improve data retention for blocks which are preloaded with content, such as by an electronic device manufacturer. Following the surface mounting, the previously-erased blocks are returned to the erased state. The threshold voltage of storage elements of the preloaded blocks can change during the surface mounting process due to a global charge effect phenomenon. The effect is most prominent for higher state storage elements which are surrounded by erased blocks, in a chip for which the wafer backside was thinned and polished. The erased blocks can be programmed using a single program pulse without performing a verify operation, as a wide threshold voltage distribution is acceptable. | 03-31-2011 |
20140063502 | Image Intensifier Tube Design for Aberration Correction and Ion Damage Reduction - The disclosure is directed to image intensifier tube designs for field curvature aberration correction and ion damage reduction. In some embodiments, electrodes defining an acceleration path from a photocathode to a scintillating screen are configured to provide higher acceleration for off-axis electrons along at least a portion of the acceleration path. Off-axis electrons and on-axis electrons are accordingly focused on the scintillating screen with substantial uniformity to prevent or reduce field curvature aberration. In some embodiments, the electrodes are configured to generate a repulsive electric field near the scintillating screen to prevent secondary electrons emitted or deflected by the scintillating screen from flowing towards the photocathode and forming damaging ions. | 03-06-2014 |
20160025645 | System and Method for Simultaneous Dark Field and Phase Contrast Inspection - An inspection apparatus for simultaneous dark field (DF) and differential interference contrast (DIC) inspection includes an illumination source and a sample stage configured to secure a sample. The inspection apparatus includes a first sensor, a second sensor and an optical sub-system. The optical sub-system includes an objective, one or more optical elements arranged to direct, through the objective, illumination from the one or more illumination sources to a surface of the sample. The objective is configured to collect a signal from the surface of the sample, wherein the collected signal includes a scattering-based signal and/or a phase-based signal from the sample. The inspection apparatus includes one or more separation optical elements arranged to spatially separate the collected signal into a DF signal and a DIC signal by directing the DF signal and the DIC signal along a DF path and DIC path respectively. | 01-28-2016 |
Patent application number | Description | Published |
20090087866 | HUMAN T2R RECEPTORS FOR RANITIDINE, STRYCHNINE AND DENATONIUM AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter ligands, i.e., acetaminophen, ranitidine, strychnine and denatonium. The present invention further relates to the use of these receptors in assays for identifying ligands that modulate the activation of these taste receptors and which may be used as additives in foods, beverages and medicinals for modifying (blocking) T2R-associated bitter taste. | 04-02-2009 |
20090274632 | Identification of human T2R receptors that respond to bitter compounds that elicit the bitter taste in compositions, and the use thereof in assays to identify compounds that inhibit (block) bitter taste in composition and use thereof - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds present in, e.g., coffee. Also, the invention relates to the discovery of specific compounds and compositions containing that function as bitter taste blockers and the use thereof as bitter taste blockers or flavor modulators in, e.g., coffee and coffee flavored foods, beverages and medicaments. Also, the present invention relates to the discovery of a compound that antagonizes numerous different human T2Rs and the use thereof in assays and as a bitter taste blocker in compositions for ingestion by humans and animals. | 11-05-2009 |
20100304402 | CHIMERIC HUMAN SWEET-UMAMI AND UMAMI-SWEET TASTE RECEPTORS - This invention relates to chimeric taste receptors comprising the extracellular portion of one T | 12-02-2010 |
20110136112 | IDENTIFICATION OF BITTER LIGANDS THAT SPECIFICALLY ACTIVATE HUMAN T2R RECEPTORS AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds. Also, the invention relates to the discovery of specific hT2R9 alleles and their disparate activity in functional assays with the same biter ligands. The invention further relates to the use of these T2R receptors in assays for identifying ligands that modulate the activation of these taste receptors by specific bitter ligands and related compounds. These compounds may be used as additives and/or removed from foods, beverages, cosmetics and medicinals in order to modify (block) T2R-associated bitter taste. Also T2R ligands may be used as therapeutics to treat and modulate T2R associated gastrointestinal and metabolic functions as well as treat gastrointestinal and metabolic diseases such as eating disorders, food sensing, food absorption, obesity, diabetes, Crohn's diseae, celiac disease, et al. | 06-09-2011 |
20110207937 | Compounds that inhibit (block) bitter taste in composition and methods of making same - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds present in, e.g., coffee. Also, the invention relates to the discovery of specific compounds and compositions containing that function as bitter taste blockers and the use thereof as bitter taste blockers or flavor modulators in, e.g., coffee and coffee flavored foods, beverages and medicaments. Also, the present invention relates to the discovery of a compound that antagonizes numerous different human T2Rs and the use thereof in assays and as a bitter taste blocker in compositions for ingestion by humans and animals. | 08-25-2011 |
20110223618 | ASSAYS USING CHIMERIC T1R POLYPEPTIDE - This invention relates to chimeric taste receptors comprising the extracellular portion of one T1R or a variant or fragment thereof, either T1R1 or T1R2, and the transmembrane portion of another T1R or a variant or fragment thereof, either T1R1 or T1R2, preferably associated with a T1R3 polypeptide and a suitable G protein. These chimeric taste receptors and cells which express such chimeric taste receptors are useful in assays for identifying sweet and umami ligands as well in assays for identifying sweet and umami enhancers. Additionally, these chimeric taste receptors and cells which express same can be used to map and determine where specific sweet and umami ligands interact with their respective receptors and to elucidate the mechanism of receptor activation. | 09-15-2011 |
20110281749 | HUMAN T2R RECEPTORS FOR ACETAMINOPHEN, RANITIDINE, STRYCHNINE AND DENATONIUM AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter ligands, i.e., acetaminophen, ranitidine, strychnine and denatonium. The present invention further relates to the use of these receptors in assays for identifying ligands that modulate the activation of these taste receptors and which may be used as additives in foods, beverages and medicinals for modifying (blocking) T2R-associated bitter taste. | 11-17-2011 |
20120015378 | IDENTIFICATION OF BITTER LIGANDS THAT SPECIFICALLY ACTIVATE HUMAN T2R RECEPTORS AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds. The invention further relates to the use of these receptors in assays for identifying ligands that modulate the activation of these taste receptors by these bitter ligands and related compounds and which may be used as additives and/or removed from foods, beverages, cosmetics and medicinals in order to modify (block) T2R-associated bitter taste. | 01-19-2012 |
20120100832 | Authentication of access terminal identities in roaming networks - Various methods of authenticating an access terminal are presented in the case where the access terminal is roaming within a visited network. An access terminal sends a device authentication message to a visited validation server or a home validation server, where the device authentication message includes an access terminal identifier and authentication data generated at least in part using the validation key. In some embodiments, the authentication data may include a digital signature by a validation key associated with the access terminal identifier. Such a signature can be authenticated by either the visited validation server or the home validation server. In other embodiments, the authentication data may include an access terminal authentication token sent to the visited validation server. The visited validation server can authenticate the device authentication message by comparing the access terminal authentication token with an access terminal authentication token obtained from the home validation server. | 04-26-2012 |
20130007857 | Anti-shoulder surfing authentication method - Disclosed is a client device that includes: a user interface to receive a username and a first password associated with a server site visited by a user; a random number generator to generate a random number; and a processor to generate a second password by implementing a function based upon the first password and the random number and to command storage of the random number, the username, and the associated server site. If the user attempts to log onto the server site by inputting their username and the second password, the processor extracts the random number associated with the username and the server site and implements the function based upon the second password and the random number to generate the first password which replaces the second password entered by the user and is submitted to the server site. | 01-03-2013 |
20130132734 | Computing device integrity protection - A method of operating a computer system includes: obtaining, at the computer system, verification-input information associated with each of multiple hardware components of the computer system; cryptographically processing, at the computer system, the verification-input information to obtain a cryptographic result; and determining, at the computer system, whether to allow or inhibit, depending upon a comparison of the cryptographic result with a verification value, further operation of at least one of the hardware components. | 05-23-2013 |
20140302528 | IDENTIFICATION OF BITTER LIGANDS THAT SPECIFICALLY ACTIVATE HUMAN T2R RECEPTORS AND RELATED ASSAYS FOR IDENTIFYING HUMAN BITTER TASTE MODULATORS - The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds. Also, the invention relates to the discovery of specific hT2R9 alleles and their disparate activity in functional assays with the same biter ligands. The invention further relates to the use of these T2R receptors in assays for identifying ligands that modulate the activation of these taste receptors by specific bitter ligands and related compounds. These compounds may be used as additives and/or removed from foods, beverages, cosmetics and medicinals in order to modify (block) T2R-associated bitter taste. Also T2R ligands may be used as therapeutics to treat and modulate T2R associated gastrointestinal and metabolic functions as well as treat gastrointestinal and metabolic diseases such as eating disorders, food sensing, food absorption, obesity, diabetes, Crohn's disease, celiac disease, et al. | 10-09-2014 |
Patent application number | Description | Published |
20080244085 | System and Method of Delaying Connection Acceptance to Support Connection Request Processing at Layer-7 - Techniques for suspending a TCP three-way handshake, offering the partial connection to an L-7 application or module at a proxy to perform further processing, and then allowing the L-7 application or module to instruct the proxy's network kernel to perform various actions are described. In various embodiments these actions may include: silently dropping the connection, verbosely rejecting the connection, accepting and processing the connection locally, or forwarding the connection to another proxy or the original destination. This additional functionality is provided, in one particular embodiment, via extensions to the POSIX socket API. | 10-02-2008 |
20090040926 | System and Method of Traffic Inspection and Stateful Connection Forwarding Among Geographically Dispersed Network Appliances Organized as Clusters - A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows. | 02-12-2009 |
20090046717 | METHODS TO IMPROVE TRANSMISSION CONTROL PROTOCOL (TCP) PERFORMANCE OVER LARGE BANDWIDTH LONG DELAY LINKS - TCP options are provided to address TCP performance problems during data exchanges over large bandwidth long delay communication links. These options address problems such as in sequence tail drops, inaccurate estimations of available bandwidth over a communication link, and slow responses to dynamic changes in link conditions. | 02-19-2009 |
20100027544 | LAYER-2 PACKET RETURN IN PROXY-ROUTER COMMUNICATION PROTOCOL ENVIRONMENTS - A Layer 2 packet return mechanism in a proxy, such as a web cache, operatively associated with a redirecting router. In a particular embodiment, the present invention provides a Layer 2 packet return mechanism in a Web Cache Communication Protocol (WCCP) network environment. In one embodiment, the present invention provides an efficient mechanism allowing a proxy or web cache to recognize WCCP redirected packets, forwarded using Layer 2 forwarding mechanisms, and subsequently to return unprocessed packets to the original forwarding WCCP router using a Layer 2 packet return mechanism. | 02-04-2010 |
20100118869 | Facilitating Transition of Network Operations from IP Version 4 to IP Version 6 - Methods, apparatuses and systems directed to facilitating transitions from IPv4 to IPv6 networks. In particular implementations, the invention facilitates or enables accessibility of network application services between IPv4 and IPv6 hosts, or traversal of network paths including both IPv6 or IPv4 domains. Particular implementations of the invention are directed to selective mapping of network layer addresses between IPv6 and IPv4 protocols and Domain Name System records under one or more policy controls. Other implementations of the invention are directed to a proxy-to-proxy based tunnel architecture allowing hosts implementing a first network layer protocol, such as IPv4, to traverse a network implementing a second network layer protocol, such as IPv6. | 05-13-2010 |
20100281168 | Assymmetric Traffic Flow Detection - Methods, apparatuses and systems directed to detecting, and in some implementations, responding to, asymmetric routing in network deployments. In a particular embodiment, a first process detects asymmetric routing at connection initiation, while the second process can detect asymmetric routing that may after connection initiation. | 11-04-2010 |
20110182291 | Facilitating Transition of Network Operations from IP Version 4 to IP Version 6 - Methods, apparatuses and systems directed to facilitating transitions from IPv4 to IPv6 networks. In particular implementations, the invention facilitates or enables accessibility of network application services between IPv4 and IPv6 hosts, or traversal of network paths including both IPv6 or IPv4 domains. Particular implementations of the invention are directed to selective mapping of network layer addresses between IPv6 and IPv4 protocols and Domain Name System records under one or more policy controls. Other implementations of the invention are directed to a proxy-to-proxy based tunnel architecture allowing hosts implementing a first network layer protocol, such as IPv4, to traverse a network implementing a second network layer protocol, such as IPv6. | 07-28-2011 |
20120226820 | SYSTEM AND METHOD OF TRAFFIC INSPECTION AND STATEFUL CONNECTION FORWARDING AMONG GEOGRAPHICALLY DISPERSED NETWORK APPLIANCES ORGANIZED AS CLUSTERS - A peering relationship among two or more network appliances is established through an exchange of control messages among the network appliances. The peering relationship defines a cluster of peered network appliances, and at each network appliance of the cluster traffic flow state information for all the network appliances of the cluster is maintained. Network traffic associated with traffic flows of the network appliances of the cluster is managed according to the state information for the traffic flows. This managing of the network traffic may include forwarding among the network appliances of the cluster (i.e., to those of the appliances handling the respective flows) at least some of the network traffic associated with one or more of the traffic flows according to the state information for the one or more traffic flows. The traffic flows may be TCP connections or UDP flows. | 09-06-2012 |
20120284416 | Establishing Tunnels Between Selective Endpoint Devices Along Communication Paths - In one embodiment, an intermediary device situated along a communication path between two endpoint devices may receive communication packets sent along the communication path. If the intermediary device receives a connection-initiating packet having a customization indicator and a connection-acknowledgement packet having a customization indicator, then the intermediary device may install a bypass rule. | 11-08-2012 |
20120304277 | System and Method for Building Intelligent and Distributed L2 - L7 Unified Threat Management Infrastructure for IPv4 and IPv6 Environments - A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box data loss prevention engine and on-box authentication engine. One or more of these engines is informed by an on-box dynamic real tie rating system that allows for determined levels of scrutiny to be paid to the network traffic. Security gateways of this type can be clustered together to provide a set of resources for one or more networks, and in some instances as the backbone of a cloud-based service. | 11-29-2012 |
20130080611 | Managing Network Content - In one embodiment, downloading one or more content items; determining which ones of the one or more content items are popular among a plurality of users; categorizing the one or more content items into one or more groups, wherein each group comprises one or more related content items; associating one or more keywords with each group, wherein the one or more keywords describe content of the one or more related content items in the corresponding group; and caching the one or more content items categorized into the one or more groups and the one or more keywords associated with each group. | 03-28-2013 |
20130133032 | System and Method for Capturing Network Traffic - In certain embodiments, a method includes receiving, by a capture device, traffic flows transmitted by a plurality of client devices, each of the traffic flows being associated with one of the plurality of client devices and comprising encrypted data. The method further includes receiving, by the capture device, flow information communicated from a proxy server communicatively coupled to the capture device, the flow information comprising an identification of a particular traffic flow and a session key associated with the particular traffic flow. The method further includes storing, by the capture device, encrypted data of the particular traffic flow identified by the flow information supplied by the proxy server; storing, by the capture device, the session key associated with the particular traffic flow; and discarding, by the capture device, any of the plurality of received traffic flows not identified in the flow information received from the proxy server. | 05-23-2013 |
20130179551 | Split-Domain Name Service - In one embodiment, a method includes receiving an address of a DNS server of a network. A secure communication tunnel is established with a client of the network. The client is notified that requests to the address of the DNS server of the network should not pass through the secure communication tunnel. A request for a DNS lookup of a name of a host of the network is received through the secure communication tunnel. A DNS referral that includes the address of the DNS server of the network is sent to the client. | 07-11-2013 |
20130266020 | Establishing Tunnels Between Selective Endpoint Devices Along Communication Paths - In one embodiment, an intermediary device situated along a communication path between two endpoint devices may receive communication packets sent along the communication path. If the intermediary device receives a connection-initiating packet having a customization indicator and a connection-acknowledgement packet having a customization indicator, then the intermediary device may install a bypass rule. | 10-10-2013 |
20140273950 | Mobile Application Identification and Control through WiFi Access Points - A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones, tablet computers, and the like, that seek to access the Internet (or another network) via the access point and applying network access policies to data communications by those applications according to application, location, context, device and/or user characteristics. | 09-18-2014 |
20140373129 | System and Method for Building Intelligent and Distributed L2 - L7 Unified Threat Management Infrastructure for IPv4 and IPv6 Environments - A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box data loss prevention engine and on-box authentication engine. One or more of these engines is informed by an on-box dynamic real tie rating system that allows for determined levels of scrutiny to be paid to the network traffic. Security gateways of this type can be clustered together to provide a set of resources for one or more networks, and in some instances as the backbone of a cloud-based service. | 12-18-2014 |
20160127906 | Mobile Application Identification and Control through WiFi Access Points - A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones, tablet computers, and the like, that seek to access the Internet (or another network) via the access point and applying network access policies to data communications by those applications according to application, location, context, device and/or user characteristics. | 05-05-2016 |
Patent application number | Description | Published |
20130097415 | Central Processing Unit Monitoring and Management Based On A busy-Idle Histogram - The aspects enable a computing device or microprocessor to adjust the operations of a processor in view of a current processor workload based on a histogram-like data structure. A histogram-like data structure characterizing one of processor busy and/or idle durations or busy/idle ratios is generated at runtime and used to model the processor workload. The processor workload is used to predict future processing requirements and to adjust the processor's operations such that they are commensurate with the processing and workload requirements. The histogram-like data structure may alternatively be used to estimate a current quality of service (QoS) of a communication link so that link management actions may be taken. | 04-18-2013 |
20130097443 | DYNAMIC VOLTAGE AND CLOCK SCALING CONTROL BASED ON RUNNING AVERAGE, VARIANT AND TREND - The aspects enable a computing device or microprocessor to scale the frequency and/or voltage of a processor to an optimal value balancing performance and power savings in view of a current processor workload. Busy and/or idle duration statistics are calculated from the processor during execution. The statistics may include a running average busy and/or idle duration or idle/busy ratio, a variance of the running average and a trend of the running average. Current busy or idle durations or an idle-to-busy ratio may be computed based on collected statistics. The current idle-to-busy ratio may be compared to a target idle-to-busy ratio and the frequency/voltage of the processor may be adjusted based on the results of the comparison to drive the current running average toward the target value. The target value of idle-to-busy ratio may be adjusted based on the calculated variance and/or trend values. | 04-18-2013 |
20130097609 | System and Method for Determining Thermal Management Policy From Leakage Current Measurement - Various embodiments of methods and systems for determining the thermal status of processing components within a portable computing device (“PCD”) by measuring leakage current on power rails associated with the components are disclosed. One such method involves measuring current on a power rail after a processing component has entered a “wait for interrupt” mode. Advantageously, because a processing component may “power down” in such a mode, any current remaining on the power rail associated with the processing component may be attributable to leakage current. Based on the measured leakage current, a thermal status of the processing component may be determined and thermal management policies consistent with the thermal status of the processing component implemented. Notably, it is an advantage of embodiments that the thermal status of a processing component within a PCD may be established without the need to leverage temperature sensors. | 04-18-2013 |
20130301218 | PIEZOELECTRIC ACTIVE COOLING DEVICE - Methods, systems, and devices for providing cooling for a mobile device using piezoelectric active cooling devices. Some embodiments utilize piezoelectric actuators that oscillate a planar element within an air channel to fan air within or at an outlet of the air channel. The air channel may be defined by at least one heat dissipation surface in thermal contact with components of the mobile device that generate excess waste heat. For example, the air channel may include a surface that is in thermal contact with a processor of the mobile computing device. In embodiments, the piezoelectric active cooling device may be used in an air gap between stacked packages in a package on package (PoP) processor package. The described embodiments provide active cooling using low power, can be controlled to provide variable cooling, use highly reliable elements, and can be implemented at low cost. | 11-14-2013 |
20140333281 | METHOD AND DEVICES FOR NON-INTRUSIVE POWER MONITORING - A method and device are disclosed for estimating a power demand level of an active circuit on a power supply line. A ripple amplitude and a ripple frequency associated with operation of the active circuit may be monitored on the power supply line. The ripple amplitude and ripple frequency may be compared with corresponding references. The ripple amplitude and ripple frequency may be associated with an estimated power demand level of the active circuit on the power supply line based on the comparison. A ripple generator generates a controlled ripple on the power supply line for calibration. | 11-13-2014 |
20150229303 | POWER DISTRIBUTION NETWORK (PDN) CONDITIONER - Systems and methods for conditioning a power rail (e.g., reducing voltage droops and/or voltage overshoots on the power rail) are described herein. In one embodiment, a power circuit comprises a capacitor coupled to a high-voltage rail, and a droop slope limiter (DSL) coupled between the high-voltage rail and a power rail. The DSL is configured to detect a downward voltage slope on the power rail, and to control current flow from the high-voltage rail to the power rail through the DSL based on the detected downward voltage slope. | 08-13-2015 |