Patent application number | Description | Published |
20100325562 | METHOD OF AND APPARATUS FOR DESCRIBING, PROMOTING, PUBLISHING, AGGREGATING, DISTRIBUTING AND ACCESSING LIVE CONTENT INFORMATION - A live content information system is used to register, promote and distribute true live content, pseudo-live content and on-demand content. The live content information system associates a registration number with the content. The live content is integrated into an overall presentation that includes auxiliary content. Snapshots or a portion of the content is integrated into a promotional viewer and distributed to advertise the content. The live primary content and auxiliary content are integrated and distributed within a live content viewer. The live primary content and auxiliary content are distributed from the appropriate sources to be displayed at the end user's computer system within the live content viewer. The live content information system also allows a producer of live content to be connected to one or more sponsors who will pay money for sponsoring the distribution of live content. The live content information system also allows live content to be quickly and easily interchanged between a producer of the live content and a partner such as a syndicator, distributor, affiliate and sponsor. | 12-23-2010 |
20120252484 | LOCATION-BASED NETWORK RADIO PRODUCTION AND DISTRIBUTION SYSTEM - A location-based radio system including a storage database and a computing device coupled with the storage database. The computing device includes an application that determines a location of a listener computing device that is accessing a radio station and plays audio content associated with one or more locations on the listener computing device if the location of the listener computing device corresponds to the one or more locations associated with the audio content. | 10-04-2012 |
20120253492 | AUDIO COMMENTING SYSTEM - An audio commenting system including a storage database, one or more network-accessible locations and a computing device all coupled together via a network. The computing device comprises a processor and an application executed by the processor configured to input audio data from an audio recording mechanism or a memory device, store the audio data at a unique address on the storage database and provide the unique address to a user such that the address is able to be inserted into at least one of the network-accessible locations. | 10-04-2012 |
20120253493 | AUTOMATIC AUDIO RECORDING AND PUBLISHING SYSTEM - A device, system and method for automatic audio recording and publishing. An electronic device having an audio recording ability includes an audio sharing program that enables a user to input a single command to execute the program and begin recording audio with the electronic device without the need for further input to the device. As a result, a user is able to quickly capture their thoughts or other audio related to an event before the moment has passed. After another single command, preset time period or trigger action such as ending the recording or hanging up, the sharing program automatically publishes the recorded audio according to one or more preselected or default settings. In particular, the user is able to preselect one or more media outlets to which the audio should be published as well as the format and time at which the audio should be published. | 10-04-2012 |
20120253795 | AUDIO COMMENTING AND PUBLISHING SYSTEM - An audio commenting and publishing system including a storage database, media content and a computing device all coupled together via a network. The computing device comprises a processor and an application executed by the processor configured to input audio data that a user wishes to associate with the media content from an audio recording mechanism or a memory device. The application is then able to store the audio data on the storage database and use the network address of the audio data along with the network address of the media content to publish the audio data and the media content such that a view is able to hear and access them concurrently at a network-accessible location. | 10-04-2012 |
20120254753 | AUTOMATED SYSTEM FOR COMBINING AND PUBLISHING NETWORK-BASED AUDIO PROGRAMMING - An audio combining system including a storage database, one or more audio sources and a computing device coupled together via a network. The computing device comprises a processor and an application executed by the processor configured to import audio data comprising a plurality of audio files and metadata describing the audio files from the one or more audio sources, associate the audio files into a plurality of groups based on one or more characteristics of the audio files, transmit the audio data to a storage database and storing the audio data on the storage database and present the plurality of groups to a user for selection, wherein upon selection the audio files comprising the selected group are played in a set order to the user. | 10-04-2012 |
Patent application number | Description | Published |
20120065501 | Renal Injury Inhibiting Devices, Systems, and Methods Employing Low-Frequency Ultrasound or Other Cyclical Pressure Energies - Improved devices, systems, and methods treatment of patients can be used to help mitigate injury to the kidneys by applying cyclical mechanical pressure energy at low intensities. The energy often be selectively directed from non-invasive transducers disposed outside the patients. The energy will typically comprise low frequency ultrasound energy, shock wave energy, or the like, and may induce the generation and/or release of nitric oxide, thereby enhancing perfusion and ameliorating tissue damage. Superimposed micro and macro duty cycles may help avoid thermal and other injury to tissues of the patient during treatment. Bilateral treatments are facilitated by a support structure that orients at least one transducer toward each kidney. | 03-15-2012 |
20120065552 | Macro/Micro Duty Cycle Devices, Systems, and Methods Employing Low-Frequency Ultrasound or Other Cyclical Pressure Energies - Improved devices, systems, and methods treatment of patients can be used to help mitigate injury to the kidneys by applying cyclical mechanical pressure energy at low intensities. The energy often be selectively directed from non-invasive transducers disposed outside the patients. The energy will typically comprise low frequency ultrasound energy, shock wave energy, or the like, and may induce the generation and/or release of nitric oxide, thereby enhancing perfusion and ameliorating tissue damage. Superimposed micro and macro duty cycles may help avoid thermal and other injury to tissues of the patient during treatment. Bilateral treatments are facilitated by a support structure that orients at least one transducer toward each kidney. | 03-15-2012 |
20140180085 | Renal Injury Inhibiting Devices, Systems, and Methods Employing Low-Frequency Ultrasound or Other Cyclical Pressure Energies - Improved devices, systems, and methods treatment of patients can be used to help mitigate injury to the kidneys by applying cyclical mechanical pressure energy at low intensities. The energy often be selectively directed from non-invasive transducers disposed outside the patients. The energy will typically comprise low frequency ultrasound energy, shock wave energy, or the like, and may induce the generation and/or release of nitric oxide, thereby enhancing perfusion and ameliorating tissue damage. Superimposed micro and macro duty cycles may help avoid thermal and other injury to tissues of the patient during treatment. Bilateral treatments are facilitated by a support structure that orients at least one transducer toward each kidney. | 06-26-2014 |
Patent application number | Description | Published |
20090307125 | METHODS AND INVESTMENT INSTRUMENTS FOR PERFORMING TAX-DEFERRED REAL ESTATE EXCHANGES - Methods and investment instruments for investing in real estate are described wherein a portfolio of investment real estate is divided into a plurality of tenant-in-common deeds of predetermined denominations, and which are subject to a master agreement and master lease to form “deedshares.” Holders of the deedshares receive a guaranteed income stream from the master lease and yearly depreciation, without having to maintain or manage the real estate. The holders of deedshares are subject, under the master agreement, to a mechanism that enables the master tenant to purchase, or arrange for the purchase of the deedshares at fair market value (or some other calculable value) at the end of a specified term. Because the deedshares qualify as interests in investment real estate, they are eligible for tax-deferred treatment under § 1031 of the Internal Revenue Code. | 12-10-2009 |
20110184850 | METHODS AND INVESTMENT INSTRUMENTS FOR PERFORMING TAX-DEFERRED REAL ESTATE EXCHANGES - Methods and investment instruments for investing in real estate are described wherein a portfolio of investment real estate is divided into a plurality of tenant-in-common deeds of predetermined denominations, and which are subject to a master agreement and master lease to form “deedshares.” Holders of the deedshares receive a guaranteed income stream from the master lease and yearly depreciation, without having to maintain or manage the real estate. The holders of deedshares are subject, under the master agreement, to a mechanism that enables the master tenant to purchase, or arrange for the purchase of the deedshares at fair market value (or some other calculable value) at the end of a specified term. Because the deedshares qualify as interests in investment real estate, they are eligible for tax-deferred treatment under §1031 of the Internal Revenue Code. | 07-28-2011 |
20120185412 | METHODS AND INVESTMENT INSTRUMENTS FOR PERFORMING TAX-DEFERRED REAL ESTATE EXCHANGES - Methods and investment instruments for investing in real estate are described wherein a portfolio of investment real estate is divided into a plurality of tenant-in-common deeds of predetermined denominations, and which are subject to a master agreement and master lease to form “deedshares.” Holders of the deedshares receive a guaranteed income stream from the master lease and yearly depreciation, without having to maintain or manage the real estate. The holders of deedshares are subject, under the master agreement, to a mechanism that enables the master tenant to purchase, or arrange for the purchase of the deedshares at fair market value (or some other calculable value) at the end of a specified term. Because the deedshares qualify as interests in investment real estate, they are eligible for tax-deferred treatment under §1031 of the Internal Revenue Code. | 07-19-2012 |
20130282619 | METHODS AND INVESTMENT INSTRUMENTS FOR PERFORMING TAX-DEFERRED REAL ESTATE EXCHANGES - Methods and investment instruments for investing in real estate are described wherein a portfolio of investment real estate is divided into a plurality of tenant-in-common deeds of predetermined denominations, and which are subject to a master agreement and master lease to form “deedshares.” Holders of the deedshares receive a guaranteed income stream from the master lease and yearly depreciation, without having to maintain or manage the real estate. The holders of deedshares are subject, under the master agreement, to a mechanism that enables the master tenant to purchase, or arrange for the purchase of the deedshares at fair market value (or some other calculable value) at the end of a specified term. Because the deedshares qualify as interests in investment real estate, they are eligible for tax-deferred treatment under §1031 of the Internal Revenue Code. | 10-24-2013 |
Patent application number | Description | Published |
20100112178 | HIGH PROTEIN CRISPY FOOD PRODUCT AND METHOD FOR PREPARING THE SAME - The present disclosure generally relates to a high protein crispy poultry food product and method for preparing the same. The snack chip can contain chicken or turkey and have a fat content of between 0-20% by weight. The snack chips can be formed from dough containing 30-100% by weight of chicken or turkey and having a protein content equal to, or above 3% by weight. The dough can also have a moisture content of approximately 20-70% by weight. To achieve the targeted moisture content, dry dough products, such as corn masa, potatoes, or rice, can be mixed with the turkey or chicken. Add back, or partial drying can also be used to reduce the moisture content. Dry ice can also be added to the dough to sufficiently cool the dough to prevent it from sticking to the rollers. | 05-06-2010 |
20130309393 | HIGH PROTEIN CRISPY FOOD PRODUCT AND METHOD FOR PREPARING THE SAME - The present disclosure generally relates to a high protein crispy poultry food product and method for preparing the same. The snack chip can contain chicken or turkey and have a fat content of between 0-20% by weight. The snack chips can be formed from dough containing 30-100% by weight of chicken or turkey and having a protein content equal to, or above 3% by weight. The dough can also have a moisture content of approximately 20-70% by weight. To achieve the targeted moisture content, dry dough products, such as corn masa, potatoes, or rice, can be mixed with the turkey or chicken. Add back, or partial drying can also be used to reduce the moisture content. Dray ice can also be added to the dough to sufficiently cool the dough to prevent it from sticking to the rollers. | 11-21-2013 |
Patent application number | Description | Published |
20090231338 | Method and Apparatus for Surface Inflation Using Surface Normal Constraints - Method and apparatus for the interactive enhancement of 2D art with 3D geometry. A surface inflation tool may be used to create a 3D shape by inflating the surface that interpolates the input boundaries. The surface inflation tool may, for example, obtain a closed 2D boundary as input, triangulate the area within the boundary to generate an initial surface, and inflate the surface while maintaining a fixed boundary. Using surface normal values and/or mean curvature values specified at boundary vertices as constraints, the tool may control the inflated surface efficiently using a single linear system. Embodiments handle both smooth and sharp position constraints. Position constraint vertices may also have constraints specified for controlling the inflation of a local surface. | 09-17-2009 |
20130124149 | System and Method for Creating Editable Feature Curves for a Multi-Dimensional Model - Various embodiments of a method and apparatus for creating editable feature curves for a multi-dimensional model represented by a tessellated mesh are described. A mesh representation of a multi-dimensional model may not support intuitive modification of the model. The mesh representing the multi-dimensional model may be analyzed to extract feature curves that define the characteristics of the multi-dimensional model. Such feature curves may provide an intuitive mechanism for modifying the multi-dimensional model. The model may be modified by changing the constraints of the feature curves defining the model's characteristics. For example, a constraint may be modified to change the angle of the surface on either side of a location on a feature curve. A compressed representation of a multi-dimensional model may include the feature curves that define the shape of multi-dimensional model and a set of boundary curves that represent disjoint regions of the multi-dimensional model. | 05-16-2013 |
20130127847 | System and Method for Interactive Image-based Modeling of Curved Surfaces Using Single-view and Multi-view Feature Curves - Various embodiments of an interactive system and methods for generating an image-based 3D model of an object from multiple images captured from different viewpoints of the object are described. A user may identify feature curves for the object by outlining the feature curves on a display of the images. The user may outline a feature curve in multiple images which depict the feature curve from different viewpoints. 3D shape constraints for the model may be generated dependent on the identified feature curves and camera parameters for the images. The user may also outline multiple single-view feature curves, such as silhouette curves, in single images. A 3D surface approximation for the model may be generated from the single-view feature curves. The 3D shape constraints and the 3D surface approximation may be used to generate a polygonal mesh which represents the surface of the 3D model of the object. | 05-23-2013 |
Patent application number | Description | Published |
20120260081 | Adjusting Device Performance Based on Processing Profiles - Adjusting processor performance based on processing profiles. The method may determine that a process has entered a processing state after an idle state. In response to entering the processing state the processing time of the processor may be monitored. In response to the processing time exceeding a first threshold of time, the performance of the processor may be increased from a first level to a second level. In response to the processing time exceeding a second threshold time, the performance of the processor may be decreased from the second level to a third level. | 10-11-2012 |
20120260083 | Adjusting Device Performance over Multiple Time Domains - Adjusting processor performance based on processing profiles. The method may determine that a process has entered a processing state after an idle state. In response to entering the processing state the processing time of the processor may be monitored. In response to the processing time exceeding a first threshold of time, the performance of the processor may be increased from a first level to a second level. In response to the processing time exceeding a second threshold time, the performance of the processor may be decreased from the second level to a third level. In response to the processing time exceeding a third threshold time, the performance of the processor may be increased from the third level to a fourth level. In response to the processing time exceeding a fourth threshold time, the performance of the processor may be decreased from the fourth level to a fifth level. | 10-11-2012 |
20130290572 | CLIENT DEVICE CONFIGURATION BASED ON INFORMATION STORED BY HOST DEVICE - A host device can enable operation with a client device based on stored or cached enumeration information. The enumeration information can be initially received from the client device during a first configuration process, and stored or cached in volatile and/or non-volatile storage accessible by the host device. During subsequent configuration processes, operation with the client device can be enabled based on the stored or cached enumeration information. Operation between the host device and the client device can be facilitated through a communication protocol, such as the universal serial bus (USB) protocol. A host device and client device can be connected via a traditional USB or USB High Speed Inter-Chip (HSIC) connection. | 10-31-2013 |
20140070774 | CASCADING POWER FOR ACCESSORIES - Methods, systems, and apparatuses for charging a host device from a charging source through an accessory are described. Upon detecting an input power signal from the charging source, an accessory may send an identification request to the host device and authenticate the host device based on the identification information received from the host device. Upon authenticating the host device, the accessory may enable a power path between the charging source and the host device to supply a charging current to charge the host device. | 03-13-2014 |
20140075169 | ACCESSORY BOOTING OVER USB - Methods, systems, and apparatuses for booting an accessory with an accessory firmware image received from a host device are described. When the host device detects a connection between the accessory and the host device, the host device may send a request for an accessory identifier to the accessory. The accessory may send an accessory identifier to the host device in response. The host device may select an accessory firmware image that is suitable for the accessory, and may transmit the accessory firmware image to the accessory. The accessory firmware image may include information that the accessory can use to enable the accessory to exchange application data with the host device. | 03-13-2014 |
20140082383 | PREDICTING USER INTENT AND FUTURE INTERACTION FROM APPLICATION ACTIVITIES - Techniques for power management of a portable device are described herein. According to one embodiment, a user agent of an operating system executed within a portable device is configured to monitor activities of programs running within the portable device and to predict user intent at a given point in time and possible subsequent user interaction with the portable device based on the activities of the program. Power management logic is configured to adjust power consumption of the portable device based on the predicted user intent and subsequent user interaction of the portable device, such that remaining power capacity of a battery of the portable device satisfies intended usage of the portable device. | 03-20-2014 |
20140362768 | Non-Waking Push Notifications - In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience. | 12-11-2014 |
20140364104 | Push Notification Initiated Background Updates - In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience. | 12-11-2014 |
20140366041 | Dynamic Adjustment of Mobile Device Based on User Activity - In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience. | 12-11-2014 |
20140366042 | Initiating Background Updates Based on User Activity - In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience. | 12-11-2014 |
Patent application number | Description | Published |
20090177783 | Pairing and storage access scheme between a handheld device and a computing system - A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service. | 07-09-2009 |
20090215398 | Methods and Systems for Establishing Communications Between Devices - At least certain embodiments of the disclosures relate to establishing communications between devices with a first connection. A second connection is established between the devices to transfer data between the devices and/or alter configurations of the devices. In one embodiment, a method includes establishing a first connection between a first device and a second device with a first networking standard and associated first network. The method further includes establishing a second connection between the first device and the second device with a second networking standard and associated second network based on the first connection providing information to at least one of the first and second devices regarding the second network. The method further includes transferring data between the first and second devices using the second networking standard. In one embodiment, the first networking standard is a Bluetooth networking standard and the second networking standard is a WiFi networking standard. | 08-27-2009 |
20090257595 | Single Security Model In Booting A Computing Device - A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component. | 10-15-2009 |
20090259855 | Code Image Personalization For A Computing Device - A method and apparatus for personalizing a software component to be executed in particular environment are described herein. According to an aspect of the invention, in response to an executable code image representing a software component to be installed in an electronic device, the executable code image is encrypted using an encryption key. The encryption key is then wrapped with a UID that uniquely identifies the electronic device, where the UID is embedded within a secure ROM of the electronic device. The wrapped encryption key and the encrypted executable code image are then encapsulated into a data object to be stored in a storage of the electronic device, such that when the electronic device is subsequently initialized for operation, the executable code image can only be recovered using the UID of the electronic device to retrieve a decryption key in order to decrypt the executable code image. | 10-15-2009 |
20090295461 | DEVICE CONFIGURATION - A process and apparatus for configuring one or more integrated circuits within a device in a manufacturing process is described. In an exemplary process, a device is manufactured by assembling a chip onto a board such as a printed circuit substrate and the chip is fused from power routed across the board to the chip. The power source for the fusing can be generated from the internal power supply on the board or received on a test point on the board itself or a connection interface (e.g. a USB interface) coupled to the board. In an exemplary apparatus, a device comprises a chip with a plurality of fuses that are used to configure the device and a board coupled to the chip, with the board capable of routing power from the board to the chip and the power is used to blow one or more of the plurality of fuses. | 12-03-2009 |
20120151106 | PAIRING AND STORAGE ACCESS SCHEME BETWEEN A HANDHELD DEVICE AND A COMPUTING SYSTEM - A method is described that involves detecting the presence of a pairing partner. Prior to establishing a paired relationship with the pairing partner, a user is prompted to verify himself/herself. In response to the user properly verifying himself/herself, the paring partner is paired with. The pairing includes invoking a remote storage protocol that contemplates a network between the partners to establish on a first of the partners access to non volatile storage resources for general use. The non volatile storage resources are located on a second of the partners. The second of the partners is a handheld device that provides wireless cell phone service, wireless Internet service and music playback service. | 06-14-2012 |
20120166781 | SINGLE SECURITY MODEL IN BOOTING A COMPUTING DEVICE - A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention, software components are to be executed in sequence in order to establish an operating environment of a device. For each software component, a security code is executed to authenticate and verify an executable code image associated with each software component using one or more keys embedded within a secure ROM (read-only memory) of the device and one or more hardware configuration settings of the device. The security code for each software component includes a common functionality to authenticate and verify the executable code image associated with each software component. In response to successfully authenticating and verifying the executable code image, the executable code image is then executed in a main memory of the device to launch the associated software component. | 06-28-2012 |
20120311357 | MULTI-LEVEL THERMAL MANAGEMENT IN AN ELECTRONIC DEVICE - An electronic device is configured to manage heat in the device using a multi level thermal management process. When the temperature of the device reaches a level that requires the device to take action to adjust its thermal behavior, a system level controller identifies a component in the device as being active and that can be controlled to adjust heat generation in the device. Once an active component is identified, a component level controller sets an activity limit for the identified active component that is at or above a minimum activity limit of the component and prevents the component from operating above this activity limit. Other embodiments are also described and claimed. | 12-06-2012 |
Patent application number | Description | Published |
20140040126 | MANAGING DEVICES ASSOCIATED WITH A DIGITAL WALLET ACCOUNT - Managing user devices associated with a digital wallet account comprises associating, using one or more computing devices, one or more user computing devices with a digital wallet account of a user, each of the associated one or more user computing devices being activated to conduct financial transactions with a merchant utilizing the digital wallet account; presenting the associated user computing devices in a list of associated user computing devices; receiving a request to deactivate a particular user computing device from the list of associated user computing devices; deactivating the particular user computing device, the deactivation being sufficient to prevent the user computing device from conducting transactions with a merchant utilizing the digital wallet account; and presenting a deactivated status of the particular user computing device. | 02-06-2014 |
20140040130 | MERCHANT CATEGORY CODES IN A PROXY CARD TRANSACTION - Transmitting category codes to payment instruments in proxy card transactions comprises receiving a first payment request to authorize a proxy card transaction, the first payment request identifying a proxy account of a user for payment of the transaction and a merchant category code associated with the merchant; selecting a financial account associated with the proxy account to fund the transaction; communicating a second payment request to authorize the transaction to a financial account system associated with the selected financial account, the second payment request comprising the merchant category code associated with the merchant; receiving an authorization for the transaction from the financial account system to fund the transaction using the selected financial account; and communicating an authorization for the transaction to the merchant computing device in response to receiving the authorization for the transaction from the financial account system to fund the transaction using the selected financial account. | 02-06-2014 |
20140040131 | MATCHING REFUNDS TO PAYMENT INSTRUMENTS EMPLOYED IN A PROXY CARD TRANSACTION - Matching refunds to the appropriate payment instrument employed in a proxy card transaction comprises receiving a first payment authorization request for a transaction between a merchant and a user, the payment authorization request comprising an identification of an account of the user and an identifier for the transaction, the user account having associated therewith a plurality of payment instruments available for conducting payment transactions; determining a particular payment instrument with which to conduct the transaction; associating the transaction identifier with the particular payment instruments utilized in the transaction; receiving a first refund instruction to refund all or a portion of a payment amount of the transaction, the first refund instruction comprising the transaction identifier; determining the particular payment instrument associated with the transaction identifier provided in the first refund instruction; and initiating the refund to the particular payment instrument determined to be associated with the transaction identifier. | 02-06-2014 |
20140136408 | KNOW YOUR CUSTOMER (KYC) - Receiving a first set of customer identification and verification data. The first set of data is a proper subset of the data required for access to all the features of a computer-implemented account. Providing to the customer access to a first set of one or more features corresponding to the first set of data. Receiving a customer request for access to an additional feature of the account outside the first set of one or more features. Requesting a second set of customer identification and verification data, wherein the second set of data corresponds to the certain data required for access to the additional feature. Receiving the requested second set of data. Providing to the customer access to the additional feature. | 05-15-2014 |
20140149292 | MERCHANT CATEGORY CODES IN A PROXY CARD TRANSACTION - Transmitting category codes to payment instruments in proxy card transactions comprises receiving a first payment request to authorize a proxy card transaction, the first payment request identifying a proxy account of a user for payment of the transaction and a merchant category code associated with the merchant; selecting a financial account associated with the proxy account to fund the transaction; communicating a second payment request to authorize the transaction to a financial account system associated with the selected financial account, the second payment request comprising the merchant category code associated with the merchant; receiving an authorization for the transaction from the financial account system to fund the transaction using the selected financial account; and communicating an authorization for the transaction to the merchant computing device in response to receiving the authorization for the transaction from the financial account system to fund the transaction using the selected financial account. | 05-29-2014 |
20140172533 | LOYALTY ACCOUNT IDENTIFICATION - Using identifiers on user payment instruments to identify user loyalty accounts comprises a method to store a loyalty account list associated with a user, the loyalty account list comprising one or more user loyalty accounts; associate an identifier with the loyalty account list; receive information identifying a user loyalty account associated with a merchant, the information comprising an account number for the user loyalty account and an identity of the merchant; associate the user loyalty account with the loyalty account list; receive a request for information identifying a user loyalty account associated with a merchant, the request comprising the identifier received by the merchant from a user payment instrument and an identity of the merchant; determine the user loyalty account associated with the merchant; and provide the information identifying a user loyalty account associated with a merchant. | 06-19-2014 |
20140257958 | MERCHANT INCENTIVE PROGRAMS ON PROXY CARD SYSTEMS - Selecting an alternate payment instrument after a proxy card payment transaction comprises associating the proxy card account comprising with a plurality of financial accounts that can be selected for funding financial transactions; associating a merchant account with a merchant, the merchant account comprising an incentive program; associating the user proxy card account with the incentive program; receiving a payment authorization request; accessing the user proxy card account based on the identification of the user proxy card account; determining that the user proxy card account is associated with the merchant's incentive program; when the item information in the transaction data meets at least one rule in the set of rules for obtaining the incentive, applying the incentive to the user proxy account associated with the merchant's incentive program; and communicating a notification of the applied incentive to a user associated with the user proxy card account. | 09-11-2014 |
20150019417 | UPDATING A DIGITAL WALLET FROM FINANCIAL ACCOUNT ISSUER - A digital wallet provider system provides an interface specification to a financial account issuer. Using the interface specification, the financial account issuer system provides user financial account information directly to the digital wallet provider system without requiring the user to enter the user's financial account information. Once the digital wallet provider system receives the user's financial account information from the financial account issuer system, the digital wallet provider system verifies the identity of the user and the completeness of the financial account information received from the financial account issuer system. The digital wallet provider then updates the user's digital wallet account, on behalf of the user, to include the user's financial account. | 01-15-2015 |
Patent application number | Description | Published |
20110145567 | METHOD AND SYSTEM TO COMBINE MULTIPLE DIGITAL CERTIFICATES USING THE SUBJECT ALTERNATIVE NAME EXTENSION - A method for forming a digital certificate includes receiving contact information associated with the digital certificate. The contact information includes at least a name, a mailing address, and an email address. The method also includes receiving billing information associated with the digital certificate and receiving a Certificate Signing Request (CSR) for the digital certificate. The method further includes receiving a first name for use in forming the digital certificate and receiving a second name for use in forming the digital certificate. Moreover, the method includes receiving an indication of a vendor of web server software, receiving an indication of a service period for the digital certificate, and forming the digital certificate. The first name is stored in a Subject field of the digital certificate and the second name is stored in the SubjectAltName extension of the digital certificate. | 06-16-2011 |
20110145569 | METHOD AND SYSTEM FOR PROVISIONING MULTIPLE DIGITAL CERTIFICATES - A method of provisioning a first digital certificate and a second digital certificate based on an existing digital certificate includes receiving information related to the existing digital certificate. The existing digital certificate includes a first name listed in a Subject field and a second name listed in a SubjectAltName extension. The method also includes receiving an indication from a user to split the existing digital certificate and extracting the first name from the Subject field and the second name from the SubjectAltName extension of the existing digital certificate. The method further includes extracting the public key from the existing digital certificate, provisioning the first digital certificate with the first name listed in a Subject field of the first digital certificate and the public key, and provisioning the second digital certificate with the second name listed in a Subject field of the second digital certificate and the public key. | 06-16-2011 |
20110153479 | Alternative Approach to Deployment and Payment for Digital Certificates - A method for managing payment of digital certificates includes receiving a request to issue a digital certificate to a subscriber, capturing and saving payment information of the subscriber, performing a first authentication and verification of the subscriber at a first time, and performing at least one additional authentication and verification of the subscriber at least once every authentication period. A long-lived certificate is issued to the subscriber provided the subscriber is authenticated and verified. The long-lived certificate is valid for an expiration period. However, the long-lived certificate is revoked if (1) the additional authentications and verification produce invalid results, or (2) if payment is not received during a payment period. The authentication period is shorter than the expiration period and there are at least a first and a second authentication period within the expiration period. The expiration period is longer than the authentication period. | 06-23-2011 |
20110154027 | METHOD AND SYSTEM FOR CO-TERMINATION OF DIGITAL CERTIFICATES - A method of renewing a plurality of digital certificates includes receiving, at a first time, a request from a user to renew a first digital certificate and determining an expiration date for the first digital certificate. The method also includes receiving, at a second time, a request from the user to renew a second digital certificate and determining an expiration date for the second digital certificate. The expiration date for the second certificate is later than the expiration date for the first certificate. The method further includes determining a new expiration date occurring after the first time and the second time and renewing the first digital certificate. An expiration date for the renewed first digital certificate is equal to the new expiration date. Moreover, the method includes renewing the second digital certificate. An expiration date for the renewed second digital certificate is equal to the new expiration date. | 06-23-2011 |
20110208962 | STREAMLINED PROCESS FOR ENROLLMENT OF MULTIPLE DIGITAL CERTIFICATES - The enrollment process for purchasing multiple digital certificates configured using different cryptographic algorithms or hashing algorithms is streamlined. A certificate purchaser wishing to purchase two or more certificates is prompted to provide answers to common enrollment questions, such as the purchaser's contact information, payment details, web sever software, and the like, using a simplified and streamlined enrollment process. Each certificate is optionally configured using a different hashing algorithm. | 08-25-2011 |
20130138953 | COMBINING MULTIPLE DIGITAL CERTIFICATES - A method for forming a digital certificate includes receiving contact information associated with the digital certificate. The contact information includes at least a name, a mailing address, and an email address. The method also includes receiving billing information associated with the digital certificate and receiving a Certificate Signing Request (CSR) for the digital certificate. The method further includes receiving a first name for use in forming the digital certificate and receiving a second name for use in forming the digital certificate. Moreover, the method includes receiving an indication of a vendor of web server software, receiving an indication of a service period for the digital certificate, and forming the digital certificate. The first name is stored in a Subject field of the digital certificate and the second name is stored in the SubjectAltName extension of the digital certificate. | 05-30-2013 |
20130145155 | PROVISIONING MULTIPLE DIGITAL CERTIFICATES - A method of provisioning a first digital certificate and a second digital certificate based on an existing digital certificate includes receiving information related to the existing digital certificate. The existing digital certificate includes a first name listed in a Subject field and a second name listed in a SubjectAltName extension. The method also includes receiving an indication from a user to split the existing digital certificate and extracting the first name from the Subject field and the second name from the SubjectAltName extension of the existing digital certificate. The method further includes extracting the public key from the existing digital certificate, provisioning the first digital certificate with the first name listed in a Subject field of the first digital certificate and the public key, and provisioning the second digital certificate with the second name listed in a Subject field of the second digital certificate and the public key. | 06-06-2013 |
Patent application number | Description | Published |
20090006679 | Data Flow Control and Bridging Architecture Enhancing Performance of Removable Data Storage Systems - A data flow control and bridging architecture that enhances the performance of removable data storage systems. In one implementation, the present invention provides a bypass bus implementation where the data transfer phase associated with select commands occurs directly between the host computing system and the target removable data storage unit. In one implementation, the present invention further provides a data flow and bridging architecture that emulates a removable media interface, such as the ATAPI interface, to the host computing system, and translates these commands for a target removable storage unit that implements a fixed media interface, such as the ATA interface. In yet another implementation, the present invention provides a data flow and bridging architecture that supports the serial ATA interface. | 01-01-2009 |
20100318698 | Data Flow Control and Bridging Architecture Enhancing Performance of Removable Data Storage Systems - A data flow control and bridging architecture that enhances the performance of removable data storage systems. In one implementation, the present invention provides a bypass bus implementation where the data transfer phase associated with select commands occurs directly between the host computing system and the target removable data storage unit. In one implementation, the present invention further provides a data flow and bridging architecture that emulates a removable media interface, such as the ATAPI interface, to the host computing system, and translates these commands for a target removable storage unit that implements a fixed media interface, such as the ATA interface. In yet another implementation, the present invention provides a data flow and bridging architecture that supports the serial ATA interface. | 12-16-2010 |
20110302341 | Data Flow Control and Bridging Architecture Enhancing Performance of Removable Data Storage Systems - A data flow control and bridging architecture that enhances the performance of removable data storage systems. In one implementation, the present invention provides a bypass bus implementation where the data transfer phase associated with select commands occurs directly between the host computing system and the target removable data storage unit. In one implementation, the present invention further provides a data flow and bridging architecture that emulates a removable media interface, such as the ATAPI interface, to the host computing system, and translates these commands for a target removable storage unit that implements a fixed media interface, such as the ATA interface. In yet another implementation, the present invention provides a data flow and bridging architecture that supports the serial ATA interface. | 12-08-2011 |
Patent application number | Description | Published |
20100099174 | Method and Apparatus for Providing Power Management in Data Communication Systems - A blood glucose meter having a compact housing, a display unit disposed on the housing, the display unit including a display light source to illuminate the display unit, an input unit disposed on the housing, the input unit configured to provide input functions for the blood glucose meter, and a power source provided within the housing for providing power to the blood glucose meter, where the housing includes a port integrated on said housing configured to receive a blood glucose test strip, and corresponding methods of measuring blood glucose meter is provided. | 04-22-2010 |
20100137698 | Method and Apparatus for Providing Power Management in Data Communication Systems - A blood glucose meter having a compact housing, a display unit disposed on the housing, the display unit including a display light source to illuminate the display unit, an input unit disposed on the housing, the input unit configured to provide input functions for the blood glucose meter, and a power source provided within the housing for providing power to the blood glucose meter, where the housing includes a port integrated on said housing configured to receive a blood glucose test strip, and corresponding methods of measuring blood glucose meter is provided. | 06-03-2010 |
20100312085 | Method and Apparatus for Providing Power Management in Data Communication Systems - A blood glucose meter having a compact housing, a display unit disposed on the housing, the display unit including a display light source to illuminate the display unit, an input unit disposed on the housing, the input unit configured to provide input functions for the blood glucose meter, and a power source provided within the housing for providing power to the blood glucose meter, where the housing includes a port integrated on said housing configured to receive a blood glucose test strip, and corresponding methods of measuring blood glucose meter is provided. | 12-09-2010 |
Patent application number | Description | Published |
20090084902 | THERMAL PROTECTION SYSTEM WITH STAGGERED JOINTS - The thermal protection system disclosed herein is suitable for use with a spacecraft such as a reentry module or vehicle, where the spacecraft has a convex surface to be protected. An embodiment of the thermal protection system includes a plurality of heat resistant panels, each having an outer surface configured for exposure to atmosphere, an inner surface opposite the outer surface and configured for attachment to the convex surface of the spacecraft, and a joint edge defined between the outer surface and the inner surface. The joint edges of adjacent ones of the heat resistant panels are configured to mate with each other to form staggered joints that run between the peak of the convex surface and the base section of the convex surface. | 04-02-2009 |
20110036953 | METHODS AND APPARATUS FOR AN INTEGRATED INSTRUMENTATION MODULE FOR A THERMAL PROTECTION SYSTEM - An integrated instrumentation system includes a body comprising a thermal protection system (TPS) material (e.g., an ablatable material), one or more sensors embedded within the body, and a processor (e.g., an FPGA or the like) communicatively coupled to the plurality of sensors. The processor is configured to acquire sensor signals from the plurality of sensors and produce digital sensor data associated therewith. The sensors may include, for example, recession sensors, pressure transducers, thermocouples, and accelerometers. | 02-17-2011 |
20140041231 | MECHANICALLY FASTENED LARGE PRESSURIZED VEHICLE STRUCTURE - A first part, a second part, and a seal ring are fastened together to form a pressure structure configured for a spacecraft structure of a spacecraft, wherein the first part and the second part are each formed from a single workpiece. | 02-13-2014 |