Patent application number | Description | Published |
20090066794 | Security System - A security system includes at least first and second monitoring units, each having a motion sensor for detecting motion, a camera for obtaining visual data, a transmitter, a receiver, and a processor in data communication with the motion sensor, camera, transmitter, and receiver. The security system includes means for outputting visual data from the first unit camera when the first unit motion sensor detects motion more recently than the second unit motion sensor detects motion. The security system includes programming for outputting the visual data from the second unit camera when the second unit motion sensor detects motion more recently than the first unit motion sensor detects motion. The system includes a telephone interface for transmitting visual data captured by a respective camera. A unit's camera is only activated when its associated motion detector detects motion and is deactivated when another unit's motion detector detects motion more recently. | 03-12-2009 |
20090100739 | Fishing Net - A fishing net includes a hoop having a net defining a catch area and having an array of illumination elements on the hoop. A bracket connects first and second ends of the hoop and defines a passage therebetween. The fishing net includes a handle coupled to the bracket and movable through the passage between use and storage configurations. A lantern is coupled to a distal end of the handle relative to the hoop, the lantern being movable between retracted, extended, and offset configurations relative to the handle. The fishing net includes a flexible shaft having a light element and that is movable between a retracted configuration in the handle and an extended configuration extending from the handle adjacent the hoop for illuminating a specific area. | 04-23-2009 |
Patent application number | Description | Published |
20090066794 | Security System - A security system includes at least first and second monitoring units, each having a motion sensor for detecting motion, a camera for obtaining visual data, a transmitter, a receiver, and a processor in data communication with the motion sensor, camera, transmitter, and receiver. The security system includes means for outputting visual data from the first unit camera when the first unit motion sensor detects motion more recently than the second unit motion sensor detects motion. The security system includes programming for outputting the visual data from the second unit camera when the second unit motion sensor detects motion more recently than the first unit motion sensor detects motion. The system includes a telephone interface for transmitting visual data captured by a respective camera. A unit's camera is only activated when its associated motion detector detects motion and is deactivated when another unit's motion detector detects motion more recently. | 03-12-2009 |
20090100739 | Fishing Net - A fishing net includes a hoop having a net defining a catch area and having an array of illumination elements on the hoop. A bracket connects first and second ends of the hoop and defines a passage therebetween. The fishing net includes a handle coupled to the bracket and movable through the passage between use and storage configurations. A lantern is coupled to a distal end of the handle relative to the hoop, the lantern being movable between retracted, extended, and offset configurations relative to the handle. The fishing net includes a flexible shaft having a light element and that is movable between a retracted configuration in the handle and an extended configuration extending from the handle adjacent the hoop for illuminating a specific area. | 04-23-2009 |
Patent application number | Description | Published |
20090094250 | Ensuring data integrity on a dispersed storage grid - An improved system is disclosed for ensuring the integrity of data stored on a dispersed data storage network. Checksums are used to ensure integrity of both data segments and data slices. Checksums appended to data slices are checked by receiving slice servers to ensure that no errors occurred during transmission. Slice servers also periodically recalculate checksums for stored data slices to ensure that data slices have not been corrupted during storage. Checksums appended to data segments are checked when data segments are read from the storage network. | 04-09-2009 |
20090094320 | File system adapted for use with a dispersed data storage network - A file system interface to a dispersed data storage network is disclosed. The disclosed interface accepts read and write commands from a file system resident on a user's computer and generates network commands that are forwarded to slice servers that form the storage component of the dispersed data storage network. The slice servers then fulfill the read and write commands. | 04-09-2009 |
20100023524 | Block based access to a dispersed data storage network - A block-based interface to a dispersed data storage network is disclosed. The disclosed interface accepts read and write commands from a file system resident on a user's computer and generates network commands that are forwarded to slice servers that form the storage component of the dispersed data storage network. The slice servers then fulfill the read and write commands. | 01-28-2010 |
20100268966 | Efficient and secure data storage utilizing a dispersed data storage system - A method of securely storing data to a dispersed data storage system is disclosed. A data segment is arranged along the columns or rows of an appropriately sized matrix. Data slices are then created based on either the columns or the rows so that no consecutive data is stored in a data slice. Each data slice is then stored in a separate storage node. | 10-21-2010 |
20110072115 | BLOCK BASED ACCESS TO A DISPERSED DATA STORAGE NETWORK - A computer includes a data transform algorithm, a data dispersal algorithm, and a network port. The data transform algorithm performs a data transformation on a data block to produce a transformed data block. The data dispersal algorithm performs a data dispersal function on the transformed data block to produce a plurality of data slices, wherein each of the plurality of data slices includes less than all data contained in the transformed data block. The network port is operable to transmit a plurality of write commands to a plurality of slice servers, wherein each of the plurality of write commands includes a corresponding one of the plurality of data slices. The network port is further operable to receive verification of storage of at least some of the plurality of data slices from at least some of the plurality of slice servers. | 03-24-2011 |
20140101184 | FILE SYSTEM ADAPTED FOR USE WITH A DISPERSED DATA STORAGE NETWORK - A computer a network interface and a central processing unit. The network interface communicates with a network. The central processing unit (CPU) is operable to receive a networked file system access request packet and to identify a root directory based on the networked file system access request packet. The CPU then identifies a file directory based on the root directory and the networked file system access request packet. The CPU then identifies file object metadata based on the file directory and identifies a set of slice servers based on the file object metadata and the networked file system access request packet. The CPU then issues, via the network interface, a set of commands to a set of slice servers regarding the networked file system access request packet. | 04-10-2014 |
Patent application number | Description | Published |
20140013455 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A system comprising a platform protected by an always-on always-available security system is described. The system, in one embodiment, includes a core logic component to provide logic to move the platform to an armed mode upon receipt of an arming command, a battery access controller to prevent access to a battery of the platform, when the platform is in the armed mode, a disarming logic to receive a disarming command from a user, the disarming command causing the battery access controller to provide the access to the battery, such that when the platform is disarmed the battery can be accessed, whereby the system prevents removal of the battery when the platform is in the armed mode to ensure that the platform remains powered to perform a security action when needed. | 01-09-2014 |
20140020121 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A platform including a security system is described. The security system comprises, in one embodiment, a multi-state system having a plurality of modes, available whenever the platform has a source of power. The modes comprise an unarmed mode, in which the security system is not protecting the platform, an armed mode, in which the platform is protected, the armed mode reached from the unarmed mode, after an arming command, and a suspecting mode, in which the platform is suspecting theft, the suspecting mode reached from the armed mode, when a risk behavior is detected. | 01-16-2014 |
Patent application number | Description | Published |
20090209216 | REFLECTOR FOR WIRELESS TELEVISION TRANSMISSIONS - One embodiment of the invention relates to a system for enhancing reception of radio-frequency (RF) signals by an audio-video device such as a high-definition television. The system comprises an audio-video device including a radio-frequency (RF) receiver to receive incoming EF signals, and an RF reflective element. The RF reflective element is positioned to reflect RF signals towards the audio-video device. The RF reflective element is at least partially imbedded with RF reflective materials to reflect undetected, RF signals destined for the audio-video device back to the RF receiver. | 08-20-2009 |
20090271203 | Voice-activated remote control service - A method of remotely controlling operation of a controlled device involves receiving a telephone call from an owner via a telephone network; authenticating the telephone call to establish that the owner is authorized to control the controlled device; interpreting a voice command from the owner that issues instructions to the controlled device; identifying the controlled device based upon the authentication and identification by the owner of the controlled device; converting the voice command to one or more data packets capable of interpretation by the controlled device to execute the command; and delivering the one or more data packets to the controlled device via the Internet. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 10-29-2009 |
20100325656 | Speculative video on demand - A method of transmitting a Video-on-Demand (VOD) program involves at a service provider head-end, separating VOD program data into first and second parts; transmitting the first part over a communication network to a recipient receiver for storage at a storage device as cached speculative data, where the transmitting is carried out as a data push when the communication network has available bandwidth to permit such transmitting and without regard for any order having been received for the VOD program to be sent to the receiver; receiving an order for the VOD program to be sent to the receiver; and streaming the second part to the receiver for reassembly into the VOD program at the receiver by combining the second part as it is streamed with the cached speculative data. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 12-23-2010 |
20110242439 | APPARATUS FOR PROVIDING TELEVISION AND CONTROL UNIT MOUNT - An apparatus for providing a television and control unit mount. The apparatus comprises a television display, a control unit, and a mount. The mount attaches the television display to a wall and provides a base for the control unit when the television display is coupled to a pedestal mount. | 10-06-2011 |