Patent application number | Description | Published |
20120149304 | SYSTEM FOR PROXIMITY BASED AD-HOC DATA SHARING ACROSS DEVICES WITH INTUITIVE INTERFACES - A system for transferring data between devices with user via a short range wireless communication system is disclosed. The system may include a first device configured to activate an intuitive interface on the first device having a system for proximity based ad-hoc data sharing between the first device with an intuitive interface and at least a second device with an intuitive interface. Once, the first device is determined to be within range of a second device with proximity based ad-hoc data sharing, data may be received by the intuitive interface on the first device and data may be sent from the intuitive interface on the first device to an intuitive interface on the second device using an intuitive interface on the first device without relying on an external communication network. The data may be transferred with a single click to the receiving device in a paste-to format. | 06-14-2012 |
20120151033 | MOBILE BOTNET MITIGATION - Mitigation of bot networks in wireless networks and/or on mobile devices is provided. A botnet detection component is provided that inspects data traffic and data flows on the wireless network to identify mobile devices that are suspected of behaving as bots. A traffic profile of the suspected bot behavior can be generated and forwarded to the mobile devices that are suspected of behaving as bots. The mobile device can correlate data traffic on the device to the traffic profile in order to identify applications responsible for the suspected bot behavior, and remove the identified applications. | 06-14-2012 |
20120233694 | MOBILE MALICIOUS SOFTWARE MITIGATION - Mitigation of malicious software in wireless networks and/or on mobile devices is provided. A mobile malicious software mitigation component is provided that obtains an internet protocol address that is exhibiting malicious software behavior, a profile of the malicious software behavior, and a time of the malicious software behavior. The malicious software mitigation component can determine an identity of a mobile device that was assigned the internet protocol address during the time it was exhibiting malicious software behavior, and transmit the profile to the mobile device. In addition, the malicious software mitigation component determine if the duration of the assignment of the internet protocol address to the mobile device is sufficient for positive identification. | 09-13-2012 |
20120311107 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS TO REDUCE LATENCY - Methods and apparatus to configure virtual private mobile networks for latency are disclosed. A disclosed example method includes provisioning logically a virtual private mobile network within a wireless network to reduce latency of a communication associated with a latency sensitive application, determining a mobile device is communicatively coupling to the wireless network via the latency sensitive application, and coupling the mobile device to the virtual private mobile network to reduce latency of the communication associated with the latency sensitive application. | 12-06-2012 |
20120317641 | PEER-TO-PEER (P2P) BOTNET TRACKING AT BACKBONE LEVEL - A method, computer-readable medium, and system for analyzing backbone traffic to determine compromised hosts from among hosts on a network are provided. The backbone traffic includes data flows. Each of the data flows is analyzed to determine peer-to-peer data flows from among the data flows. Each of the peer-to-peer data flows is one of the data flows having a source address and a destination address that are each unassociated with a domain name. The peer-to-peer data flows are analyzed to determine the compromised hosts from among the hosts. Each of the compromised hosts is interconnected with another of the compromised hosts via at least one of the peer-to-peer data flows. | 12-13-2012 |
20120331545 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY - Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network. | 12-27-2012 |
20130054763 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS WITH VIRTUAL PRIVATE NETWORKS - Methods and apparatus to configure virtual private mobile networks with virtual private networks are disclosed. A disclosed example method includes logically provisioning, for a client, the virtual private mobile network to process wireless network communications associated with the client that correspond to a specified address space of the client, provisioning at least a portion of a server within a cloud computing data center to host resources for the client, and configuring at least a portion of an edge router of the cloud computing data center to transmit the wireless network communications between the portion of the server and the virtual private mobile network. | 02-28-2013 |
20130298197 | DEVICE-BASED AUTHENTICATION FOR SECURE ONLINE ACCESS - Methods, systems, and computer-readable media for providing device-based authentication for secure online access are provided. An authentication request is received from an online service. The authentication request may be associated with a login request received by the online service from a user. The authentication request may further indicate a list of device identifiers for computing devices connected to a provider network and previously designated by the user as authorized to access the online service. Communication logs collected from the provider network are analyzed to determine whether the login request originated from one of the authorized computing devices based on the list of device identifiers. If it is determined that the login request originated from one of the authorized computing devices, an indication is returned to the online service that the login request was received from an authorized computing device. | 11-07-2013 |
20160057149 | Device-Based Authentication For Secure Online Access - Methods, systems, and computer-readable media for providing device-based authentication for secure online access are provided. An authentication request is received from an online service. The authentication request may be associated with a login request received by the online service from a user. The authentication request may further indicate a list of device identifiers for computing devices connected to a provider network and previously designated by the user as authorized to access the online service. Communication logs collected from the provider network are analyzed to determine whether the login request originated from one of the authorized computing devices based on the list of device identifiers. If it is determined that the login request originated from one of the authorized computing devices, an indication is returned to the online service that the login request was received from an authorized computing device. | 02-25-2016 |
Patent application number | Description | Published |
20140014987 | METHODS AND APPARATUSES FOR SHIFTING CHROMATICITY OF LIGHT - The present disclosure relates to shifting a chromaticity of light generated from a light-emitting device. A light-emitting device may incorporate an optical element (e.g., filter) so that light emitted from a light-generating surface having an initial chromaticity may be altered. The optical element may shift the chromaticity of emitted light having the initial chromaticity to a final chromaticity that is different from the initial chromaticity. Thus, the chromaticity of emitted light from the manufactured LEDs that would otherwise be unacceptable for having chromaticity coordinates that fall outside of a desired chromaticity bin is shifted so as to have chromaticity coordinates that fall within suitable parameters. Accordingly, a number of the manufactured LEDs that would normally be discarded may be salvaged. | 01-16-2014 |
20160073479 | MODULAR ILLUMINATION DEVICE AND ASSOCIATED SYSTEMS AND METHODS - A modular illumination device, and associated systems and methods, are provided. In some cases, a hub is provided. The hub can, optionally, be configured to receive at least one module via an interface. The hub can comprise an optional fitting configured to be mounted in a light socket, an optional networking component, and/or an optional illumination source. In some cases, the hub can be coupled to a module such that an external surface of the module occupies a relatively large percentage of the external surface area of the coupled hub and module and/or such that a substantially smooth surface is formed between the hub and module. In some cases, the hub can be coupled to a module having a relatively large volume. Also disclosed are covers configured to at least partially enclose wall-mounted electric switches, systems for retrofitting electric switches, and methods of retrofitting electric switches. | 03-10-2016 |
Patent application number | Description | Published |
20120077966 | POLYNUCLEOTIDE AND POLYPEPTIDE SEQUENCE AND METHODS THEREOF - The present disclosure relates to a field of recombinant DNA therapeutics. It involves the bio-informatics design, synthesis of artificial gene for human insulin precursor including leader peptide coding sequence, cloning in an expression vector and expression in an organism, preferably | 03-29-2012 |
20140051842 | POLYNUCLEOTIDE AND POLYPEPTIDE SEQUENCE AND METHODS THEREOF - The present disclosure relates to a field of recombinant DNA therapeutics. It involves the bio-informatics design, synthesis of artificial gene for human insulin precursor including leader peptide coding sequence, cloning in an expression vector and expression in an organism, preferably | 02-20-2014 |
20140057318 | POLYNUCLEOTIDE AND POLYPEPTIDE SEQUENCE AND METHODS THEREOF - The present disclosure relates to a field of recombinant DNA therapeutics. It involves the bio-informatics design, synthesis of artificial gene for human insulin precursor including leader peptide coding sequence, cloning in an expression vector and expression in an organism, preferably | 02-27-2014 |
Patent application number | Description | Published |
20120230206 | PLACEMENT OF WIRELESS REPEATERS IN A WIRELESS COMMUNICATION NETWORK - The position of wireless repeaters within a wireless communication network can affect the throughput and performance of the wireless communication network. A wireless repeater and/or an access point associated with the wireless communication network can be configured to determine the optimal position of the wireless repeater based on throughput achieved on communication links between the access point, the repeater, and/or the client stations. The throughput achieved on communication links between the access point, the repeater, and/or the client stations can be determined by exchanging training packets, receiving acknowledgement messages in response to the training packets, and subsequently analyzing the received acknowledgement messages. Furthermore, the throughput achieved on communication links between the access point, the repeater, and/or the client stations can also be analyzed to determine whether each of the client stations should associate with the access point or the wireless repeater. | 09-13-2012 |
20120271902 | SELECTING FORWARDING DEVICES IN A WIRELESS COMMUNICATION NETWORK - A forwarding device can establish a communication link with both a source device and a destination device to extend the communication range of the source device by forwarding data from the source device to the destination device. A coordinating device can be configured to identify a forwarding client through which to communicate with a client station that is inaccessible to the coordinating device via a direct communication link, based on the throughput achieved on communication links between the coordinating device, the inaccessible client, and accessible clients. The throughput achieved on the communication links can be determined by exchanging training packets, receiving acknowledgement messages in response to the training packets, and subsequently analyzing the received acknowledgement messages. Based on the calculated throughputs, one of the accessible clients can be designated as the forwarding client with respect to the coordinating device and the inaccessible client. | 10-25-2012 |
20120320919 | AUTOMATIC PATH SELECTION FOR HYBRID COMMUNICATION NETWORKS - A hybrid network device can implement functionality for automatic path selection and modification in a hybrid communication network. The hybrid network device can select an initial network interface from a plurality of network interfaces for transmitting a packet stream. In response to determining that the medium utilization of the initial network interface exceeds the medium utilization threshold, the hybrid network device can identify one or more packet streams originating from the initial network interface to shift to corresponding one or more alternate network interfaces. The hybrid network device can attempt to reduce the medium utilization of the initial network interface below the medium utilization threshold while maintaining the medium utilization of the one or more alternate network interfaces below the corresponding medium utilization thresholds. The hybrid network device can shift the one or more packet streams from the initial network interface to the corresponding one or more alternate network interfaces. | 12-20-2012 |
20120320924 | COORDINATED BACK-OFF MECHANISM FOR PATH SELECTION IN HYBRID COMMUNICATION NETWORKS - A coordinated back-off mechanism for automatic path selection for minimizing race conditions in hybrid communication networks is disclosed. A network device determines a stream medium utilization associated with packet streams for each priority class and network interface of a plurality of communication devices (including the network device). For each priority class and network interface, the communication devices are ranked according to the stream medium utilization. In response to determining that a medium utilization of a network interface exceeds a corresponding medium utilization threshold, the network device determines whether one of its network interfaces originates a packet stream with the greatest stream medium utilization value for a selected priority class. If so, path selection operations are executed to reduce the medium utilization associated with network interface below the medium utilization threshold. Otherwise, a back-off period is calculated based on the ranking associated with the network device for the selected priority class. | 12-20-2012 |
Patent application number | Description | Published |
20100114838 | PRODUCT RELIABILITY TRACKING AND NOTIFICATION SYSTEM AND METHOD - Methods and apparatus are provided for tracking product reliability. A product removal database having removal data stored therein that are associated with one or more products is periodically accessed at a user-specified periodicity. An aircraft flight-hours database having time-in-flight data stored therein that are associated with each product is periodically accessed at the user-specified periodicity. One or more user-selected algorithms are executed, using at least a portion of the periodically accessed removal data, to determine if the criterion for a user-specified reliability parameter is met or not. If it is determined that the criterion for the user-selected reliability parameter is not met, then an alert is transmitted to a preset destination. | 05-06-2010 |
20100198635 | SYSTEM AND METHOD FOR PRODUCT DEPLOYMENT AND IN-SERVICE PRODUCT RISK SIMULATION - Methods and systems are provided for predicting the reliability of a plurality of products that will be deployed during a product deployment period comprising a plurality of time intervals. The method comprises retrieving historical product removal data from a product removal data source, retrieving historical product shipment data from a product shipment data source, identifying a plurality of Weibull parameters based on at least a portion of retrieved product removal data and product shipment data, and performing a plurality of product deployment simulations, wherein each product deployment simulation includes predicting a lifespan for each of the plurality of products and determining reliability metrics for uniform time intervals during the product deployment period. | 08-05-2010 |
20100318553 | PRODUCT FIX-EFFECTIVENESS TRACKING AND NOTIFICATION SYSTEM AND METHOD - Methods and apparatus are provided for tracking the effectiveness of a modification that has been installed into a product in response to an issued modification notice. A product removal database having removal data stored therein that are associated with one or more products is periodically accessed at a user-specified periodicity. One or more user-selected fix-effectiveness algorithms are executed to determine if at least a portion of the periodically accessed removal data matches one or more user-specified keywords that correlate to the modification. If it is determined that at least a portion of the periodically accessed removal data matches the one or more user-specified keywords, then an alert is transmitted to a preset destination. | 12-16-2010 |