Patent application number | Description | Published |
20120260789 | METHOD AND APPARATUS FOR PROVIDING SENSORY INFORMATION RELATED TO MUSIC - A method and apparatus for providing instructions associated with music, the apparatus comprising an instruction generating component for generating one or more instructions associated with one or more features within the music; and an instruction delivery component attached to or worn by a user for delivering the instructions to the user. | 10-18-2012 |
20140015650 | SYSTEM AND METHOD FOR SOCIAL DANCING - A system and method for enabling social dancing. The system comprising a movement registration module configured to monitor and identify movements by a participant; and a tactile feedback actuator configured to supply tactile feedback to the participant based on a determination by a logic module. The method performed by a computerized device, the method comprising: monitoring movements by a participant; determining feedback in response to the movements; and instructing a tactile feedback actuator to supply the feedback to the participant. | 01-16-2014 |
20140015651 | BODY-WORN DEVICE FOR DANCE SIMULATION - A body-worn device configured in size and shape to be worn by a user, the body-worn device comprising a tactile feedback actuator configured to supply tactile feedback to the user, wherein said tactile feedback actuator configured to supply the feedback based on instructions provided via a communication channel. Optionally, the body-worn device is configured in size and shape to be worn around a torso of the user. Optionally, the tactile feedback actuator is configured to supply the tactile feedback to a back and/or a chest of the user. Optionally, wherein said body-worn device comprises a first and a second tactile feedback actuators, wherein the first tactile feedback actuator is positioned to be in proximity to a chest of the user, and wherein the second tactile feedback actuator is positioned to be in proximity to a back of the user. | 01-16-2014 |
20140204335 | PROGRESSIVE LENSES - A method comprising: performing eye exam to a subject having a first and second eye; determining a prescription for the first and second eyes, the prescription describing focal power for each of the first eye and the second eye for at least three distances; and providing the prescription to a machine that produces progressive glasses that comprise a first and second lenses, wherein the first and second lenses each having at least three focal portions associated with the at least three distances that are located in a same height in the glasses thereby enabling clear vision for the subject in the first eye and the second eye with respect to the at least three distances. | 07-24-2014 |
20150103309 | PROGRESSIVE LENSES - A method comprising: performing eye exam to a subject having a first and second eye; determining a prescription for the first and second eyes, the prescription describing focal power for each of the first eye and the second eye for at least three distances; and providing the prescription to a machine that produces progressive glasses that comprise a first and second lenses, wherein the first and second lenses each having at least three focal portions associated with the at least three distances that are located in a same height in the glasses thereby enabling clear vision for the subject in the first eye and the second eye with respect to the at least three distances. | 04-16-2015 |
20150161908 | METHOD AND APPARATUS FOR PROVIDING SENSORY INFORMATION RELATED TO MUSIC - A method and apparatus for providing instructions associated with music, the apparatus comprising an instruction generating component for generating one or more instructions associated with one or more features within the music; and an instruction delivery component attached to or worn by a user for delivering the instructions to the user. | 06-11-2015 |
Patent application number | Description | Published |
20120218297 | AUGMENTED REALITY PRESENTATIONS - Technology is generally disclosed for augmented-reality presentations. In some embodiments, the technology can receive an indication of a user's sensitivity to an aspect of a presentation, receive general content relating to the presentation, receive overlay content relating to the presentation, combine the received general content and the received overlay content to create the presentation, render the presentation. The overlay content may respond to the user's sensitivity. | 08-30-2012 |
20130097241 | SOCIAL NETWORK REPORTS - Technology is disclosed for generating social networking reports. In various embodiments, the technology receives an identity of a user wherein the identity is associated with a first online social network and does not include a password; collects first information about the user from the first online social network; generates a first report based on the collected first information; and transmits the generated first report. | 04-18-2013 |
20130188828 | PREVENTING CLASSIFICATION OF OBJECT CONTEXTUAL INFORMATION - Technology is disclosed for preventing classification of objects, e.g., in an augmented reality system. The technology can identify a set of objects to be classified, determine whether context information for one or more objects in the identified set of objects to be classified is identified as not to be employed during classifiation, and during classification of two different objects, include context information for one object but not the other. | 07-25-2013 |
20130324239 | STARTING SIMULATION FROM A REAL SITUATION - Technology is disclosed for starting a simulation from a real situation. In various embodiments, the technology receives a parameter corresponding to simulation of a physical entity in a virtual context, receives an attribute corresponding to the physical entity in a physical context, and simulates the physical entity in the virtual context using the attribute as a stimulus. The attribute may identify an actual occurrence during the physical context. | 12-05-2013 |
20140006643 | SCENE-BASED VARIABLE COMPRESSION | 01-02-2014 |
20140041025 | DEFENDING AGAINST BROWSER ATTACKS - In one example the opening of a primary browser to a URL may be detected, a reference browser may then be opened to the same URL, data input to respective data fields on the primary browser may be copied to respectively corresponding data fields on the reference browser, and security on the primary browser may be evaluated based on, at least, the data copied to the reference browser. | 02-06-2014 |
20140143410 | MONITORING A PERFORMANCE OF A COMPUTING DEVICE - Technologies are generally described for systems, methods and devices configured to monitor a performance of a resource of a device. In some examples, a processor may receive an application code. The application code may include at least one application thread configured to implement at least one task for the application code. The application code may be configured to spawn a performance thread. The processor may execute the application thread on the computing device. The application thread may be configured to use at least one resource of the computing device. The processor may further execute the performance thread on the computing device. The performance thread may be configured to calculate a value relating to the resource. | 05-22-2014 |
20140171200 | VIRTUAL AND AUGMENTED REALITY - Technologies are generally described for systems, devices and methods effective to implement virtual and augmented reality. In an example, a first device may send data to a second device. The first device may include a processor and a memory. The processor may receive first image data based on a first real image from a third device. The first real image may include a fourth device image that relates to a fourth device. The processor may receive second image based on a second real image from the fourth device. The processor may send the first image data to the second device. The processor may receive a first request from the second device to receive the second image data. The processor may send a second request to the fourth device for the second image data, receive the second image data, and send the second image data to the second device. | 06-19-2014 |
20140184645 | ENERGY SAVINGS USING AUGMENTED REALITY - Technologies and implementations for energy savings using augmented reality are generally disclosed. | 07-03-2014 |
20140218549 | REMOTELY CONTROLLED CROWD-SOURCED MEDIA CAPTURE - The disclosed technology receives at a second computing device a message from a first computing device comprising at least an indication of a physical motion, a requested motion, or an indication of a camera control operation. The indicated motion can correspond to a physical motion made to the first computing device. The indicated camera control operation can correspond to a camera control operation made at the first computing device. The technology requests to physically move the second computing device if the received message indicates a motion; and controls a digital camera associated with the second computing device if the received message indicates a camera control operation made at the first computing device. | 08-07-2014 |
20140289392 | INSTANCE MONITOR - Methods to facilitate monitoring the execution of a first instance and a second instance, such as multiple instantiations of a program, are generally described. The methods may include generating a first instance and a second instance, appending first monitoring instructions to the first instance to produce a first modified instance and appending second monitoring instructions to the second instance to produce a second modified instance. The first and second monitoring instructions may relate to monitoring an execution of the first instance and the second instance. The processor may further send the first modified instance to a first computing device and send the second modified instance to a second computing device different from the first computing device. The computing devices may provide different computational functionality and/or may split a load in processing the program. | 09-25-2014 |
20140330958 | COMPUTING DEVICE PERFORMANCE MONITOR - Technologies are generally described for systems, devices and methods effective to monitor performance of a computing device. A computing device may receive a specified counting rate. The computing device may count at the specified counting rate to generate a sequence of counting numbers. The computing device may identify a first output of a process, such as results from computations performed on data, and may identify a first counting number when the first output is identified. The computing device may identify a second output of the process, such as additional results from the computations, and may identify a second counting number when the second output is identified. The computing device may then determine whether an alert should be generated based on the first and second counting numbers such as when a difference between the first and second counting numbers exceeds a threshold value. | 11-06-2014 |
20140344362 | RESTRICTION OF POSTING INFORMATION TO SHARING PROCESSORS - Methods and systems effective to restrict posting of information to a sharing processor are generally described. A device may receive a request to post captured information to a sharing processor. The device may receive a restriction request and determine that the restriction request is applicable to the information. In response to determining that the restriction request is applicable to the information, the device may output a privacy message through a user interface of the device. The privacy message may provide an indication that the restriction request is applicable to the information. | 11-20-2014 |
20150029217 | COMPOSITE DISPLAY WITH MULTIPLE IMAGING PROPERTIES - Technologies are generally described for systems and methods effective to output a composite image. In some examples, a processor may be configured to receive first and second display data that relate to a first and second image. The processor may identify an overlap region where the first display overlaps the second display and generate imaging instructions effective to cause the first and second image to be output on the first display and second display, respectively. The processor may further modify the first imaging instructions based on the overlap region to produce a modified first imaging instruction. The processor may send the modified first imaging instruction to the first display so that the first image is output on the first display at a first resolution. The processor may send the second imaging instruction to the second display so that the second image is output on the second display at a second resolution. | 01-29-2015 |
20150070388 | AUGMENTED REALITY ALTERATION DETECTOR - Technologies are generally described for systems and methods effective to detect an alteration in augmented reality. A processor may receive a real image that corresponds to a real object and may receive augmented reality instructions to generate a virtual object. The processor may determine that the virtual object at least partially obscures the real object when the virtual object is rendered on a display. The processor may, upon determining that the virtual object at least partially obscures the real object when the virtual object is rendered on the display, simulate an activity on the real object to produce a first activity simulation and simulate the activity on the virtual object to produce a second activity simulation. The processor may determine a difference between the first and the second activity simulation and modify the augmented reality instructions to generate a modified virtual object in response to the determination of the difference. | 03-12-2015 |
20150150019 | SCHEDULING COMPUTING TASKS FOR MULTI-PROCESSOR SYSTEMS - In an example embodiment, one or more series of executable components may be configured to execute a respective processes, and one or more corresponding scheduling components may be configured to direct migration of each of the corresponding one or more series of executable components to a processing element thereof. | 05-28-2015 |
20150161388 | MEMORY ATTACK DETECTION - Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples, a processor may send a request to the memory device. The request may include a request for information that relates to memory writes to the memory of the memory device. The processor may receive a response from the memory device. The response may include the information that relates to the memory writes. The processor may determine, based on the response, an amount of memory of the memory device written to during an interval of time. The processor may detect the potential attack based on the amount of memory written to and based on the interval of time. The processor may then generate an alert based on the detection of the potential attack. | 06-11-2015 |
20150181632 | LINE OF SIGHT INITIATED HANDSHAKE - Technologies are generally described for systems, devices and methods effective to implement a line of sight initiated handshake. In some examples, a processor in a first communication device may detect a line of sight directed from the first communication device to a second communication device. The first communication device may send a handshake request to the second communication device. The first communication device may receive a handshake acknowledgement from the second communication device. The handshake request and handshake acknowledgement may be effective to create the handshake The first and second communication devices can thereafter share data. | 06-25-2015 |
20150245312 | PRESENCE-BASED DEVICE MODE MODIFICATION - In some examples, a first device may detect the presence of a second device or a particular person and, when a triggering event related to the second device or the particular person applies, the first device may change from a first mode to a second mode. | 08-27-2015 |
20150254904 | VIRTUAL AND AUGMENTED REALITY - Technologies are generally described for systems, devices and methods effective to implement virtual and augmented reality. In an example, a first device may send data to a second device. The first device may include a processor and a memory. The processor may receive first image data based on a first real image from a third device. The first real image may include a fourth device image that relates to a fourth device. The processor may receive second image based on a second real image from the fourth device. The processor may send the first image data to the second device. The processor may receive a first request from the second device to receive the second image data. The processor may send a second request to the fourth device for the second image data, receive the second image data, and send the second image data to the second device. | 09-10-2015 |