Patent application number | Description | Published |
20110173560 | Electronic Form User Interfaces - A system and method validating entry of data into a structured data file in real-time is described. The system and method also described a real-time validation tool that enables a developer to create custom validation rules. These custom validation rules can include preset validation rules, which the real-time validation tool enables a developer to create in an easy-to-use way. | 07-14-2011 |
20110246868 | CORRELATION, ASSOCIATION, OR CORRESPONDENCE OF ELECTRONIC FORMS - Determining correspondence, association, and/or correlation between nodes of electronic forms based on schemas of those forms is described. Importing, merging, and/or annotating data from one electronic form into another electronic form based on correspondence, association, and/or correlation between nodes is also described. | 10-06-2011 |
20110271103 | Generic File Protection Format - A file may contain an unencrypted and an encrypted portion. The unencrypted portion may contain a layout section that may point to a published license, metadata, and a contents section, where the contents section is in the encrypted portion. The encrypted portion may contain the contents section which may act as a directory for one or more included files that may be compressed and stored in the encrypted portion. When the file is opened by a receiver, the receiver may read the published license and communicate with a security server to establish access rights and receive at least one key for decrypting at least a portion of the encrypted portion of the file. The receiver may then gain access to the included files. | 11-03-2011 |
20130238967 | Correlation, Association, or Correspondence of Electronic Forms - Determining correspondence, association, and/or correlation between nodes of electronic forms based on schemas of those forms is described. Importing, merging, and/or annotating data from one electronic form into another electronic form based on correspondence, association, and/or correlation between nodes is also described. | 09-12-2013 |
20130339288 | DETERMINING DOCUMENT CLASSIFICATION PROBABILISTICALLY THROUGH CLASSIFICATION RULE ANALYSIS - A classification application identifies patterns and evidences within representative documents. The application constructs a classification rule according to an entity and an affinity determined from the patterns and evidences. The application processes the representative documents with the classification rule to evaluate whether the rules meet acceptance requirements. Subsequent to a successful evaluation, the application identifies confidence levels for patterns and evidences within other documents. | 12-19-2013 |
20140020045 | DATA DETECTION AND PROTECTION POLICIES FOR E-MAIL - Systems and/or methods for deploying and implementing data loss prevention (DLP) policy definition that may encapsulate the requirements, control objectives and directives, and/or the definitions of sensitive data types as stipulated directly or indirectly by the regulatory policy are disclosed. In one embodiment, DLP policies may be identified by an organization to run on top of a set of electronic file systems (e.g., email systems, file systems, web servers and the like). Organizations and their administrators may implement a set of DLP policy instance which are derived from DLP policy templates. DLP policy templates may comprise both structure and meaning—and may acquire a given DLP policy by the replacement of parameterized expressions with desired parameter values. In another embodiment, the state of the DLP policy instance may change according to the lifecycle of the policy instance deployment. | 01-16-2014 |
20140075184 | TRUST SERVICES FOR SECURING DATA IN THE CLOUD - Embodiments are directed to securing data in the cloud, securely encrypting data that is to be stored in the cloud and to securely decrypting data accessed from the cloud. In one scenario, an instantiated trust service receives information indicating that a trust server is to be instantiated. The trust service instantiates the trust server, which is configured to store key references and encrypted keys. The trust service receives the public key portion of a digital certificate for each publisher and subscriber that is to have access to various specified portions of encrypted data. A data access policy is then defined that specifies which encrypted data portions can be accessed by which subscribers. | 03-13-2014 |
20140075196 | SECURELY FILTERING TRUST SERVICES RECORDS - Embodiments are directed to securely filtering trust services records. In one scenario, a client computer system receives at least one of the following trust services records: a trust services certificate, a principal certificate, a group certificate and a trust services policy. The client computer system performs a time validity check to validate the trust services record's timestamp, performs an integrity check to validate the integrity of the trust services record and performs a signature validity check to ensure that the entity claiming to have created the trust services record is the actual creator of the trust services record. The client computer system then, based on the time validity check, the integrity check and the signature validity check, determines that the trust services record is valid and allows a client computer system user to perform a specified task using the validated trust services record. | 03-13-2014 |
20140101713 | DATA MAPPING USING TRUST SERVICES - Embodiments are directed to mapping encryption policies to user data stored in a database using a policy column uniform resource identifier (URI). In one scenario, a computer system receives the following: a database schema name that identifies the name of a specified schema within a relational database in which user data is stored, a table name that identifies a specified table within the relational database, a column name that identifies a specified column in the specified table and a namespace identifier that identifies a set of relational databases. The computer system also receives an indication that identifies which type of encryption is to be applied when encrypting the column of data specified by the column name. The computer system then generates a policy column URI that includes a hierarchical string comprising the namespace identifier, the database schema name, the table name and the column name. | 04-10-2014 |
20140115327 | TRUST SERVICES DATA ENCRYPTION FOR MULTIPLE PARTIES - In one scenario, a computer system accesses a first principal's public key to generate a group private key that is encrypted using the first principal's public key. The generated group private key provides access to data keys that are used to encrypt data resources. The computer system accesses a second principal's public key to encrypt the generated group private key using the second principal's public key and encrypts at least one of the data keys using a group public key, where the data key allows access to encrypted data resources. The first principal then decrypts the group private key using the first principal's private key, decrypts the data key using the decrypted group private key and accesses the data resource using the decrypted data key. The second principal also performs these functions with their private key to access the data resource. | 04-24-2014 |
20140351884 | DATA MAPPING USING TRUST SERVICES - Embodiments are directed to mapping encryption policies to data stored in a database using a policy identifier, and to accessing data stored in a database using a policy identifier. In one scenario, a computer system receives an indication that identifies which type of encryption is to be applied when encrypting a specified portion of data stored in a database. The database has a database schema identified by a database schema identifier, where the database schema defines relationships for data stored in the database. The computer system then accesses a namespace that identifies a set of databases in which the specified portion of data is accessed in the same manner. The computer system also generates a policy identifier, which contains information including the namespace and the database schema identifier. | 11-27-2014 |
Patent application number | Description | Published |
20090132453 | SYSTEMS AND METHODS FOR PRIORITIZING MOBILE MEDIA PLAYER FILES - Disclosed are embodiments of systems and methods for prioritizing mobile media player files by providing for the automated addition and/or deletion of media items for a mobile media player. In some embodiments, a statistical method may be provided for inferring which media items on a mobile media player should be deleted based on, for example, user taste data. In some embodiments, new media items may be loaded onto a user's mobile media player by creating one or more playlists from a playlist builder. The playlist(s) may be created by using user taste data. Rankings may also be created to determine an order for deletion of the media items currently on a mobile media player and/or for addition of new media items to the device. | 05-21-2009 |
20090222392 | DYMANIC INTERACTIVE ENTERTAINMENT - Disclosed are various embodiments of systems and methods for generating composite mediasets from mediasets, each comprising media items, associated with a plurality of users. In some embodiments, individual and/or group recommendations are provided for creating a group playlist by aggregating user taste data for a plurality of users in a group. In other embodiments, systems and methods are provided which allow for sharing and playing of a group playlist by users in a group, each of which has a media playback device. In still other embodiments, systems and methods are provided for dynamically building a composite playlist that may be updated as users enter and/or leave the group. One example of an interactive entertainment application also is described for use at a venue to entertain live guests with music selections that are dynamically influenced by the guests' individual tastes. | 09-03-2009 |
20100161595 | RECOMMENDER SYSTEM FOR IDENTIFYING A NEW SET OF MEDIA ITEMS RESPONSIVE TO AN INPUT SET OF MEDIA ITEMS AND KNOWLEDGE BASE METRICS - Systems and methods are disclosed for identifying a new set of media items in response to an input set (or “query set”) of media items and knowledge base metrics. The system uses a knowledge base consisting of a collection of mediasets. Various metrics among media items are considered by analyzing how the media items are grouped to form the mediasets in the knowledge base. Such association or “similarity” metrics are preferably stored in a matrix form that allows the system to efficiently identify a new set of media items that complements the input set of media items. | 06-24-2010 |
20100268680 | SYSTEMS AND METHODS FOR PRIORITIZING MOBILE MEDIA PLAYER FILES - Disclosed are embodiments of systems and methods for prioritizing mobile media player files by providing for the automated addition and/or deletion of media items for a mobile media player. In some embodiments, a statistical method may be provided for inferring which media items on a mobile media player should be deleted based on, for example, user taste data. In some embodiments, new media items may be loaded onto a user's mobile media player by creating one or more playlists from a playlist builder. The playlist(s) may be created by using user taste data. Rankings may also be created to determine an order for deletion of the media items currently on a mobile media player and/or for addition of new media items to the device. | 10-21-2010 |
20100313167 | SYSTEM FOR BROWSING THROUGH A MUSIC CATALOG USING CORRELATION METRICS OF A KNOWLEDGE BASE OF MEDIASETS - A system and method to navigate through a media item catalog using correlation metrics (FIGS. | 12-09-2010 |
20110099521 | SYSTEM FOR BROWSING THROUGH A MUSIC CATALOG USING CORRELATION METRICS OF A KNOWLEDGE BASE OF MEDIASETS - A system and method to navigate through a media item catalog and generate recommendations using behavioral metrics such as correlation metrics (FIGS. | 04-28-2011 |
20110213776 | SYSTEM FOR BROWSING THROUGH A MUSIC CATALOG USING CORRELATION METRICS OF A KNOWLEDGE BASE OF MEDIASETS - A system and method to navigate through a media item catalog and generate recommendations using behavioral metrics such as correlation metrics (FIGS. | 09-01-2011 |
20110251995 | SYSTEMS AND METHODS FOR PRIORITIZING MOBILE MEDIA PLAYER FILES - Disclosed are embodiments of systems and methods for prioritizing mobile media player files by providing for the automated addition and/or deletion of media items for a mobile media player. In some embodiments, a statistical method may be provided for inferring which media items on a mobile media player should be deleted based on, for example, user taste data. In some embodiments, new media items may be loaded onto a user's mobile media player by creating one or more playlists from a playlist builder. The playlist(s) may be created by using user taste data. Rankings may also be created to determine an order for deletion of the media items currently on a mobile media player and/or for addition of new media items to the device. | 10-13-2011 |
20120233193 | SYSTEM FOR BROWSING THROUGH A MUSIC CATALOG USING CORRELATION METRICS OF A KNOWLEDGE BASE OF MEDIASETS - A system and method to navigate through a media item catalog and generate recommendations using behavioral metrics such as correlation metrics (FIGS. | 09-13-2012 |
20130080455 | RECOMMENDER SYSTEM FOR IDENTIFYING A NEW SET OF MEDIA ITEMS RESPONSIVE TO AN INPUT SET OF MEDIA ITEMS AND KNOWLEDGE BASE METRICS - Systems and methods are disclosed for identifying a new set of media items in response to an input set (or “query set”) of media items and knowledge base metrics. The system uses a knowledge base consisting of a collection of mediasets. Various metrics among media items are considered by analyzing how the media items are grouped to form the mediasets in the knowledge base. Such association or “similarity” metrics are preferably stored in a matrix form that allows the system to efficiently identify a new set of media items that complements the input set of media items. | 03-28-2013 |
20130191318 | RECOMMENDER SYSTEM FOR IDENTIFYING A NEW SET OF MEDIA ITEMS RESPONSIVE TO AN INPUT SET OF MEDIA ITEMS AND KNOWLEDGE BASE METRICS - Systems and methods are disclosed for identifying a new set of media items in response to an input set (or “query set”) of media items and knowledge base metrics. The system uses a knowledge base consisting of a collection of mediasets. Various metrics among media items are considered by analyzing how the media items are grouped to form the mediasets in the knowledge base. Such association or “similarity” metrics are preferably stored in a matrix form that allows the system to efficiently identify a new set of media items that complements the input set of media items. | 07-25-2013 |
20140237361 | DYNAMIC INTERACTIVE ENTERTAINMENT VENUE - Disclosed are various embodiments of systems and methods for generating composite mediasets from mediasets, each comprising media items, associated with a plurality of users. In some embodiments, individual and/or group recommendations are provided for creating a group playlist by aggregating user taste data for a plurality of users in a group. In other embodiments, systems and methods are provided which allow for sharing and playing of a group playlist by users in a group, each of which has a media playback device. In still other embodiments, systems and methods are provided for dynamically building a composite playlist that may be updated as users enter and/or leave the group. One example of an interactive entertainment application also is described for use at a venue to entertain live guests with music selections that are dynamically influenced by the guests' individual tastes. | 08-21-2014 |
Patent application number | Description | Published |
20100049232 | COLLAPSIBLE LANCING DEVICE - A lancing device for use with a removable lancet having a sharp tip. The lancet includes a housing. The lancing device can include a handle connected to the housing for movement between a storage position, where the housing and handle are configured to be compactly stowed, and a use position, where the housing and handle are configured to be grasped by a user to perform the piercing operation. The lancing device can include an opening formed in the housing and a tray that is moveable with respect to the housing between an open position, where the lancet can be installed on or removed from the tray, and a closed position, where the lancet can be utilized to perform a piercing operation. The lancing device can include a structure moveable with respect to the housing between a first position, where a first piercing aperture is defined, and a second position, where a second piercing aperture is defined, where the second piercing aperture is larger than the first piercing aperture. | 02-25-2010 |
20100049233 | LANCET HAVING INTEGRATED DRIVE MECHANISM - A lancet for use with a lancing device is provided. The lancet includes a lancet body and a drive mechanism attached to the lancet body. A needle projects from an end of the lancet body. The drive mechanism is operative in response to insertion of the lancet in the lancing device to bias the lancet toward a pricking position. | 02-25-2010 |
20120022565 | COLLAPSIBLE LANCING DEVICE - Disclosed herein are embodiments of lancing devices for use with a lancet having a lancet body and a sharp tip covered by a removable cap. One lancing device comprises a housing having a first end and a second end opposite the first end, a drawer received within the housing at the first end and movable between an open position and a closed position, the drawer having a drawer face and a drawer body, the drawer body configured to receive the lancet, and a decapping arm disposed within the housing and connected to the housing via a pivot at the second end of the housing, the decapping arm movable about the pivot between a storage position and a decapping position. | 01-26-2012 |