Patent application number | Description | Published |
20100093310 | DEVICE AUTHENTICATION WITHIN DEPLOYABLE COMPUTING ENVIRONMENT - A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g., user identification ticket). | 04-15-2010 |
20120131652 | HARDWARE-BASED CREDENTIAL DISTRIBUTION - This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile. | 05-24-2012 |
20120227098 | SHARING USER ID BETWEEN OPERATING SYSTEM AND APPLICATION - One or more techniques and/or systems are disclosed for authenticating a user of an application using an operating system. A user can log onto their device, such as at power-up, using a cloud-based ID registered to an online identity service. The user can be authenticated with the operating system on the user's device, using the cloud-based identity for the user, where the operating system may contact the online identity service to authenticate the user. When the user activates an application on the device it may request authentication of the user from the operating system, and an authentication token for the user's cloud-based identity is provided to the application. The application then uses the authentication token to authenticate the user for the application, as long as the application supports the use of the cloud-based ID of the user. In this manner, a subsequent manual user log-in operation is not required. | 09-06-2012 |
20120254946 | ESTABLISHING PRIVILEGES THROUGH CLAIMS OF VALUABLE ASSETS - A service accessible by a set of entities may be provided to each entity at a different service level (e.g., with a different set of privileges) based on the privilege level of the entity. However, many users may attempt to perform malicious activities through the service, and may do so with impunity if the penalties of detection are inconsequential. Instead, privilege levels of entities may be established based on the claims of assets having identifiable value. Such claims may be established by submitting an asset identifier to the service, such as proof of a software license identified by the submission of a license key purchased at a substantial cost. The penalties of malicious activities performed by such users may include the invalidation of such asset identifiers. Establishing the privilege levels of respective entities in this manner raises the penalties, and hence the deterrence, of attempted malicious use of the service. | 10-04-2012 |
20120304260 | PROTECTION FROM UNFAMILIAR LOGIN LOCATIONS - In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface | 11-29-2012 |
20120321087 | CONTROLLING ACCESS TO PROTECTED OBJECTS - A device operated by a user may store an object to which access is to be regulated, which may be achieved by encrypting the object with an encryption key and sending the key to a server having a key store. When a user of the device requests access to the object, the server may authenticate the user (e.g., according to a credential submitted by the user) and verify a trust identifier of the device (e.g., authorization to access the object through the device, and/or the integrity of the device), before sending to the device a ticket granting access to the key. The device may send the ticket to the server, receive the key from the server, decrypt the stored encrypted object, and provide the object to the user. This mechanism promotes rapid access upon request and efficient use of the server, and enables remote revocation of access. | 12-20-2012 |
20130067243 | Secure Data Synchronization - Techniques for secure data synchronization are described. In one or more implementations, techniques may be employed to conserve high cost data storage by storing larger portions of encrypted data in low cost storage, while storing relatively smaller encryption keys in higher cost storage. A device that is granted access to the encryption keys can retrieve the encrypted data from the low cost storage and use the encryption keys to decrypt the encrypted data. | 03-14-2013 |
20130212652 | DEVICE AUTHENTICATION WITHIN DEPLOYABLE COMPUTING ENVIRONMENT - A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g., user identification ticket). | 08-15-2013 |
20140059664 | Hardware-Based Credential Distribution - This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile. | 02-27-2014 |
20140250491 | SYSTEMS AND METHODS FOR CLOUD DATA SECURITY - Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider (“SSP”) configured to perform or provide one or more security-related services or functions with respect to or on behalf of some other system or service. The other system or service may be, for example, a cloud-based system that provides network-accessible services. The SSP allows a user of the cloud-based service to provide and manage one or more security-related services, such as data storage, encryption, decryption, key management, and the like. By using and controlling the SSP, the user can be confident that his or her data is being securely represented and stored, even though it is being operated upon by a cloud-based service that is not under the user's control. | 09-04-2014 |
20160080426 | SYSTEMS AND METHODS FOR CLOUD DATA SECURITY - Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider (“SSP”) configured to perform or provide one or more security-related services or functions with respect to or on behalf of some other system or service. The other system or service may be, for example, a cloud-based system that provides network-accessible services. The SSP allows a user of the cloud-based service to provide and manage one or more security-related services, such as data storage, encryption, decryption, key management, and the like. By using and controlling the SSP, the user can be confident that his or her data is being securely represented and stored, even though it is being operated upon by a cloud-based service that is not under the user's control. | 03-17-2016 |
20160127337 | SYSTEMS AND METHODS FOR CLOUD DATA SECURITY - Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider (“SSP”) configured to perform or provide one or more security-related services or functions with respect to or on behalf of some other system or service. The other system or service may be, for example, a cloud-based system that provides network-accessible services. The SSP allows a user of the cloud-based service to provide and manage one or more security-related services, such as data storage, encryption, decryption, key management, and the like. By using and controlling the SSP, the user can be confident that his or her data is being securely represented and stored, even though it is being operated upon by a cloud-based service that is not under the user's control. | 05-05-2016 |
Patent application number | Description | Published |
20120005459 | PROCESSOR HAVING INCREASED PERFORMANCE AND ENERGY SAVING VIA MOVE ELIMINATION - Methods and apparatuses are provided for increasing processor performance and energy saving via eliminating physical data movement to accomplish a move instruction. The apparatus comprises a first plurality of available physical registers mapped to a second plurality of logical registers, including a source logical register and a destination logical register. A renaming unit remaps the destination logical register to the same physical register mapping as the source logical register in response to a move instruction. In this way, the move instruction is effectively executed without moving data between physical registers. A method is provided for increasing processor performance and energy saving via eliminating physical data movement to accomplish a move instruction. The method comprises determining a mapping of a logical source register and a logical destination register to physical registers of a processor and then remapping the logical destination register to the same physical register mapping as the logical source register to affect an equivalent of the move instruction with actual data movement between physical registers. | 01-05-2012 |
20120159225 | PROCESSOR WITH POWER CONTROL VIA INSTRUCTION ISSUANCE - Methods and apparatuses are provided for controlling power consumption in a processor (or computational unit thereof). The method comprises monitoring power consumption in a processor (or computational unit) and determining that the power consumption of the processor (or computational unit) exceeds a threshold. Thereafter, instruction issuance if modified (such as by slowing or ceasing instruction issuance) within the processor (or computational unit) until the power consumption is below the threshold. The apparatus comprises a power consumption monitor for determining when power consumption within the processor exceeds a threshold. Upon that determination, a scheduler begins modify instruction issuance to one or more execution units until the power consumption is below the threshold. The modification of instruction issuance can be to slow instruction issuance or cease instruction issuance for a time period or until the power consumption is below the threshold. | 06-21-2012 |
20120173854 | PROCESSOR HAVING INCREASED EFFECTIVE PHYSICAL FILE SIZE VIA REGISTER MAPPING - Methods and apparatuses are provided for an efficient technique for processing registers having a known value while improving processor performance. The apparatus comprises a processor having a plurality of physical registers available for use in computations and a decoder for determining that a logical register contains a known value. A renaming unit maps the logical register containing the known value to an address outside an address range for the plurality of physical registers once the known value is determined. Thereafter, scheduling and execution units perform computations using the known value without storing the known value in one of the plurality of physical registers. The method comprises determining that a logical register of a processor has a known value and then mapping that logical register to a physical register address outside an expected range of physical register addresses; which indicates that the logical register represents the known value. Thereafter the processor processes any instruction using the known value without storing the known value in a physical register. | 07-05-2012 |
20120191954 | PROCESSOR HAVING INCREASED PERFORMANCE AND ENERGY SAVING VIA INSTRUCTION PRE-COMPLETION - Methods and apparatuses are provided for achieving increased performance and energy saving via instruction pre-completion without having to schedule instruction execution in processor execution units. The apparatus comprises an operational unit for determining whether an instruction can be completed without scheduling use of an execution unit of the processor and units within the operational unit capable of employing alternate or equivalent processes or techniques to complete the instruction. In this way, the instruction is completed without scheduling use of the execution unit of the processor. The method comprises determining that an instruction can be completed without scheduling use of an execution unit of a processor and then pre-completing the instruction without use of one or more the execution units. | 07-26-2012 |
20120191956 | PROCESSOR HAVING INCREASED PERFORMANCE AND ENERGY SAVING VIA OPERAND REMAPPING - Methods and apparatuses are provided for achieving increased processor performance and energy saving via reordering operand mapping as opposed to the actual operand data. The apparatus comprises a plurality of physical registers available for use storing operands and includes a unit capable of mapping logical registers to the plurality of physical registers. A multiplexer then reorders the operands by reordering the mapping of logical registers to the plurality of physical registers, which increases processor performance and energy saving by reordering narrow registers instead of wide registers. The method comprises mapping logical registers storing to physical registers storing operands in a processor and then reordering the mapping to achieve the equivalent of reordering the operands without reordering the operands from the physical registers in the processor. | 07-26-2012 |
20120226891 | PROCESSOR WITH INCREASED EFFICIENCY VIA CONTROL WORD PREDICTION - Methods and apparatuses are provided for increased efficiency in a processor via control word prediction. The apparatus comprises an operational unit capable of determining whether an instruction will change a first control word to a second control word for processing dependent instructions. Execution units process the dependent instructions using a predicted control word and compare the second control word to the predicted control word. A scheduling unit causes the execution units to reprocess the dependent instructions when the predicted control word does not match the second control word. The method comprises determining that an instruction will change a first control word to a second control word and processing the dependent instructions using a predicted control word. The second control word is compared to the predicted control word and the dependent instructions are reprocessed using the second control word when the predicted control word does not match the second control word. | 09-06-2012 |
Patent application number | Description | Published |
20120166769 | PROCESSOR HAVING INCREASED PERFORMANCE VIA ELIMINATION OF SERIAL DEPENDENCIES - Methods and apparatuses are provided for achieving increased performance via elimination of serial dependencies in instructions or instruction sequences. The apparatus comprises an operational unit for determining whether an instruction will cause dependencies during completion in an execution unit. Responsive to that determination the instruction is replaced with an alternative instruction for completion in the execution unit. In this way, the alternative instruction is completed without causing dependencies in the execution unit. The method comprises determining that an instruction will cause dependencies during completion in a processor and replacing the instruction with an alternative instruction for completion in the processor. | 06-28-2012 |
20130007418 | FLUSH OPERATIONS IN A PROCESSOR - Methods and apparatuses are provided for flush operations in a processor. The apparatus comprises an out-of-order execution unit for processing instructions issued in-order from an instruction decoder for first and second threads and being configured to identify an errored instruction in a first thread. A retire unit includes a retire queue for receiving completed instructions from the out-of-order execution unit, the retire unit being configured retire older in-order first thread instructions until the errored instruction would be the next instruction to be retired, and then flushing the errored instruction and all later in-order first thread instructions from the retire queue. The method comprises determining that an errored instruction is being processed by an out-of-order execution unit of a processor and continuing to process to completion instructions earlier in-order from the errored instruction until the completion of the errored instruction. Following completion of the errored instruction, it is flushed along with all instructions later in-order than the errored instruction to recover the processor to a pre-error state. | 01-03-2013 |
20130262541 | Method and circuitry for square root determination - A method, performed by a processor, of determining a square root using a single processor cycle per iteration is described. The method includes, in a single cycle: obtaining, from a stored lookup table, a quotient digit and a square of the quotient digit; retrieving a current solution; and determining a new solution using the current solution and the quotient digit. Circuitry configured to perform the method is described. | 10-03-2013 |
20140325187 | SINGLE-CYCLE INSTRUCTION PIPELINE SCHEDULING - A method includes allocating a first single-cycle instruction to a first pipeline that picks single-cycle instructions for execution in program order. The method further includes marking at least one source register of the first single-cycle instruction as ready for execution in the first pipeline in response to all older single-cycle instructions allocated to the first pipeline being ready and eligible to be picked for execution. An apparatus includes a decoder to decode a first single-cycle instruction and to allocate the first single-cycle instruction to a first pipeline. The apparatus further includes a scheduler to pick single-cycle instructions for execution by the first pipeline in program order and to mark at least one source register of the first single-cycle instruction as ready for execution in the first pipeline in response to determining that all older single-cycle instructions allocated to the first pipeline are ready and eligible. | 10-30-2014 |
20150121040 | PROCESSOR AND METHODS FOR FLOATING POINT REGISTER ALIASING - Methods, devices, and systems for accessing packed registers are presented. A state of the packed registers may be tracked and it may be determined whether the register is directly accessible based on the state. If the register is not directly accessible, an action may be performed which allows the register to be accessed directly. The action may include injecting at least one uop for reorganizing the physical storage of the register such that it is directly accessible. The action may include aligning the data with the least significant bit of a physical register or otherwise aligning the data with the datapath. The action may also include changing the state of the packed registers. | 04-30-2015 |
Patent application number | Description | Published |
20110040760 | Estimating Social Interest in Time-based Media - Social media content items are mapped to relevant time-based media events. These mappings may be used as the basis for multiple applications, such as ranking of search results for time-based media, automatic recommendations for time-based media, prediction of audience interest for media purchasing/planning, and estimating social interest in the time-based media. Social interest in time-based media (e.g., video and audio streams and recordings) segments is estimated through a process of data ingestion and integration. The estimation process determines social interest in specific events represented as segments in time-based media, such as particular plays in a sporting event, scenes in a television show, or advertisements in an advertising block. The resulting estimates of social interest also can be graphically displayed. | 02-17-2011 |
20110041080 | Displaying Estimated Social Interest in Time-based Media - Social media content items are mapped to relevant time-based media events. These mappings may be used as the basis for multiple applications, such as ranking of search results for time-based media, automatic recommendations for time-based media, prediction of audience interest for media purchasing/planning, and estimating social interest in the time-based media. Social interest in time-based media (e.g., video and audio streams and recordings) segments is estimated through a process of data ingestion and integration. The estimation process determines social interest in specific events represented as segments in time-based media, such as particular plays in a sporting event, scenes in a television show, or advertisements in an advertising block. The resulting estimates of social interest also can be graphically displayed. | 02-17-2011 |
20120192227 | Cross Media Targeted Message Synchronization - Social media content items and references to events that occur therein are aligned with the time-based media events they describe. These mappings may be used as the basis for sending messages to populations of authors of content items, where the populations are determined based on whether the author has written a content item that refers to a specific TV show or advertisement. TV streams are monitored to detect when and where a specific advertisement for a particular advertiser is shown. Concurrently, social media streams are monitored for content items that refer to or are about specific TV shows and advertisements. Responsive to a specific advertisement being detected as being shown during a specific TV show, a message associated with the advertisement is sent to the authors of the content items associated with that TV show or advertisement. The messages can be transmitted while the advertisement is being shown. | 07-26-2012 |
20120215903 | Generating Audience Response Metrics and Ratings From Social Interest In Time-Based Media - Social media content items are mapped to relevant time-based media events. These mappings are used as the basis for calculating metrics based upon the mappings, and ratings of the time-based media there from. Audience response metrics (ARMs) are calculated from the mappings, which provide an indication of audience engagement or response. In addition, ARMs provide information about the virality, depth, and breadth of the response by the viewing audience. The calculated metrics are stored and are used to generate ratings for the time-based media. The ratings may be published in whole or in part, e.g., as part of a ratings system. | 08-23-2012 |
20130018896 | Topic and Time Based Media Affinity Estimation - An affinity server estimates an affinity between two different time based media events (e.g., TV, radio, social media content stream), between a time based media event and a specific topic, or between two different topics, where the affinity score represents an intersection between the populations of social media users who have authored social media content items regarding the two different events and/or topics. The affinity score represents an estimation of the real world affinity between the real world population of people who have an interest in both time based media events, both topics, or in a time based media event and a topic. One possible threshold for including a social media user in a population may be based on a confidence score that indicates the confidence that one or more social media content items authored by the social media user are relevant to the topic or event in question. | 01-17-2013 |
20130086489 | DISPLAYING ESTIMATED SOCIAL INTEREST IN TIME-BASED MEDIA - Social media content items are mapped to relevant time-based media events. These mappings may be used as the basis for multiple applications, such as ranking of search results for time-based media, automatic recommendations for time-based media, prediction of audience interest for media purchasing/planning, and estimating social interest in the time-based media. Social interest in time-based media (e.g., video and audio streams and recordings) segments is estimated through a process of data ingestion and integration. The estimation process determines social interest in specific events represented as segments in time-based media, such as particular plays in a sporting event, scenes in a television show, or advertisements in an advertising block. The resulting estimates of social interest also can be graphically displayed. | 04-04-2013 |
20130263166 | Social Networking System Targeted Message Synchronization - Targeted messages are sent to users of social networking system (SNS) based on the detection of airings of advertisements in time-based media. This approach allows advertisers to leverage their investment in, for example, television advertising by sending advertisements to SNS users who have likely seen the advertisements within shows that they have expressed interest in the context of a SNS. Time-based media streams are analyzed to detect the airings of advertisements within those streams. In one embodiment, SNS content items are received regarding individual users. Based on references in those content items between users and their interests, targeted messages may be sent to users. In another embodiment, targeted messages are sent to SNS users based on the airing of advertisements and targeting criteria provided by advertisers. | 10-03-2013 |
20130305280 | Web Identity to Social Media Identity Correlation - An identification server correlates the web browsing behavior of individuals with their use of social media systems. Based on these behaviors, web identifiers (referred to as identities or IDs) may be matched to social media identifiers; these matches being determined, stored, and output as a confidences that the web identity of the user corresponds to a social media identity. Each web identity may be associated with one or more social media identities. The identity correlations between web identities and social media identities may be used along with other alignments to provide information regarding the time-based media (e.g., advertisements) a user may have likely been exposed to, and to provide targeted advertisements. | 11-14-2013 |
20130305282 | Topic to Social Media Identity Correlation - An identification server correlates the web browsing behavior of individuals with their use of social media systems. Based on these behaviors, web identifiers (referred to as identities or IDs) may be matched to social media identifiers; these matches being determined, stored, and output as a confidences that the web identity of the user corresponds to a social media identity. Each web identity may be associated with one or more social media identities. The identity correlations between web identities and social media identities may be used along with other alignments to provide information regarding the time-based media (e.g., advertisements) a user may have likely been exposed to, topics the user is interested in, and to provide targeted advertisements. | 11-14-2013 |
20130346330 | GENERATING AUDIENCE RESPONSE METRICS AND RATINGS FROM SOCIAL INTEREST IN TIME-BASED MEDIA - Social media content items are mapped to relevant time-based media events. These mappings are used as the basis for calculating metrics based upon the mappings, and ratings of the time-based media there from. Audience response metrics (ARMs) are calculated from the mappings, which provide an indication of audience engagement or response. In addition, ARMs provide information about the virality, depth, and breadth of the response by the viewing audience. The calculated metrics are stored and are used to generate ratings for the time-based media. The ratings may be published in whole or in part, e.g., as part of a ratings system. | 12-26-2013 |
20140052740 | TOPIC AND TIME BASED MEDIA AFFINITY ESTIMATION - An affinity server estimates an affinity between two different time based media events (e.g., TV, radio, social media content stream), between a time based media event and a specific topic, or between two different topics, where the affinity score represents an intersection between the populations of social media users who have authored social media content items regarding the two different events and/or topics. The affinity score represents an estimation of the real world affinity between the real world population of people who have an interest in both time based media events, both topics, or in a time based media event and a topic. One possible threshold for including a social media user in a population may be based on a confidence score that indicates the confidence that one or more social media content items authored by the social media user are relevant to the topic or event in question. | 02-20-2014 |
20150052543 | Cross Media Targeted Message Synchronization - Social media content items and references to events that occur therein are aligned with the time-based media events they describe. These mappings may be used as the basis for sending messages to populations of authors of content items, where the populations are determined based on whether the author has written a content item that refers to a specific TV show or advertisement. TV streams are monitored to detect when and where a specific advertisement for a particular advertiser is shown. Concurrently, social media streams are monitored for content items that refer to or are about specific TV shows and advertisements. Responsive to a specific advertisement being detected as being shown during a specific TV show, a message associated with the advertisement is sent to the authors of the content items associated with that TV show or advertisement. The messages can be transmitted while the advertisement is being shown. | 02-19-2015 |
20150193437 | TOPIC AND TIME BASED MEDIA AFFINITY ESTIMATION - An affinity server estimates an affinity between two different time based media events (e.g., TV, radio, social media content stream), between a time based media event and a specific topic, or between two different topics, where the affinity score represents an intersection between the populations of social media users who have authored social media content items regarding the two different events and/or topics. The affinity score represents an estimation of the real world affinity between the real world population of people who have an interest in both time based media events, both topics, or in a time based media event and a topic. One possible threshold for including a social media user in a population may be based on a confidence score that indicates the confidence that one or more social media content items authored by the social media user are relevant to the topic or event in question. | 07-09-2015 |
20160027065 | Web Identity to Social Media Identity Correlation - An identification server correlates the web browsing behavior of individuals with their use of social media systems. Based on these behaviors, web identifiers (referred to as identities or IDs) may be matched to social media identifiers; these matches being determined, stored, and output as a confidences that the web identity of the user corresponds to a social media identity. Each web identity may be associated with one or more social media identities. The identity correlations between web identities and social media identities may be used along with other alignments to provide information regarding the time-based media (e.g., advertisements) a user may have likely been exposed to, and to provide targeted advertisements. | 01-28-2016 |
20160071120 | Generating Audience Response Metrics and Ratings from Social Interest In Time-Based Media - Social media content items are mapped to relevant time-based media events. These mappings are used as the basis for calculating metrics based upon the mappings, and ratings of the time-based media there from. Audience response metrics (ARMs) are calculated from the mappings, which provide an indication of audience engagement or response. In addition, ARMs provide information about the virality, depth, and breadth of the response by the viewing audience. The calculated metrics are stored and are used to generate ratings for the time-based media. The ratings may be published in whole or in part, e.g., as part of a ratings system. | 03-10-2016 |
20160124925 | Automated Social Message Stream Population - A messaging system automatically populates a stream of messages using only a seed selected by the requesting account holder. In one embodiment, the seed includes the streams of one or more of the “top” accounts of the messaging system. Here, “top” is according to any one of a number of different metrics stored in the messaging system. With knowledge of the seed, the messaging system automatically populates a stream for the requesting account holder, without requiring any other input. As a result, an account holder is provided with a fully functioning stream with very little effort or knowledge required on their part. | 05-05-2016 |
Patent application number | Description | Published |
20130198269 | DNS Outage Avoidance Method for Recursive DNS Servers - This disclosure describes systems, methods, and apparatus to protect users of the Internet from DNS outages. In particular, an outage avoidance system is provided that includes query processing, outage avoidance processing, and a local cache, all configured to extend the TTL of expired answers to DNS queries or to ignore the expiration of an answer's TTL value, and thereby provide the expired answer in response to a client request when a DNS server is unable to obtain an answer from a remote DNS server. | 08-01-2013 |
20130204978 | Data Sharing Method for Recursive DNS Servers - This disclosure describes systems, methods, and apparatus for sharing DNS answers between DNS server systems within a DNS cluster, between proxy servers, and/or between DNS server systems of different DNS clusters. When a DNS answer is obtained by a DNS server system, the answer can be shared with peer DNS server systems within a same DNS cluster or with DNS server systems having a logical relation to the first DNS server system (e.g., geographic relationship), but being in different DNS clusters. Proxy servers may also mediate communication between a client and the DNS clusters. These proxies can also include the ability to share DNS answers between each other. | 08-08-2013 |
20130290563 | ANSWER AUGMENTATION SYSTEM FOR AUTHORITATIVE DNS SERVERS - This disclosure describes systems, methods, and apparatus for forward and reverse DNS translation of IPv6 IP addresses. For a PTR request where the authoritative DNS server does not have a domain name associated with the IP address in the request, a DNS answer augmentation system can generate an IP address on the fly using one or more algorithms that take information about the request as an input. Similarly, for an AAAA request where the authoritative DNS server does not have an IP address associated with the domain name in the request, the DNS answer augmentation system can generate a domain name on-the-fly using one or more algorithms that take information about the request as an input. The DNS answer augmentation system can reside between a client or a DNS server and an authoritative DNS server or be a part of the authoritative DNS server. | 10-31-2013 |
20140040388 | SYSTEM FOR MANAGING E-MAIL TRAFFIC - According to a first embodiment of the invention, if an e-mail sender attempts to make too many connections within a predetermined period of time, the excess connections are automatically rejected. According to a second embodiment of the invention, an agreement is established between an e-mail sender and an e-mail recipient that states when the sender may send e-mail messages to the recipient. According to a third embodiment of the invention, trend data reflecting an amount of e-mail sent by a sender is collected. The trend data can be used to establish a rate limit for the sender. According to a fourth embodiment of the invention, separate rate limits are established for authenticated and unauthenticated mail from addresses. According to a fifth embodiment of the invention, a sender may have a rate at which their e-mail is transmitted reduced if they exceed predetermined rate limits. | 02-06-2014 |
20140244725 | DNS Outage Avoidance Method for Recursive DNS Servers - This disclosure describes systems, methods, and apparatus to protect users of the Internet from DNS outages. In particular, an outage avoidance system is provided that includes query processing, outage avoidance processing, and a local cache, all configured to extend the TTL of expired answers to DNS queries or to ignore the expiration of an answer's TTL value, and thereby provide the expired answer in response to a client request when a DNS server is unable to obtain an answer from a remote DNS server. | 08-28-2014 |
20150350137 | SYSTEM FOR MANAGING E-MAIL TRAFFIC - According to a first embodiment of the invention, if an e-mail sender attempts to make too many connections within a predetermined period of time, the excess connections are automatically rejected. According to a second embodiment of the invention, an agreement is established between an e-mail sender and an e-mail recipient that states when the sender may send e-mail messages to the recipient. According to a third embodiment of the invention, trend data reflecting an amount of e-mail sent by a sender is collected. The trend data can be used to establish a rate limit for the sender. According to a fourth embodiment of the invention, separate rate limits are established for authenticated and unauthenticated mail from addresses. According to a fifth embodiment of the invention, a sender may have a rate at which their e-mail is transmitted reduced if they exceed predetermined rate limits. | 12-03-2015 |
Patent application number | Description | Published |
20090254009 | VACUUM COAGULATION & DISSECTION PROBES - A surgical device integrating a suction mechanism with a coagulation mechanism is provided for improving lesion creation capabilities. The device comprises an elongate member having an insulative covering attached about means for coagulating soft tissue. Openings through the covering expose regions of the coagulation-causing elements and are coupled to lumens in the elongate member which are routed to a vacuum source. A fluid source to passively transport fluid along the contacted soft tissue surface may be provided in order to push the maximum temperature deeper into tissue. | 10-08-2009 |
20090312783 | DISSECTING CANNULA AND METHODS OF USE THEREOF - Methods and devices described herein facilitate improved access of locations within the body by providing a variety of dissection modes on a single access device. | 12-17-2009 |
20100152850 | DEVICES, SYSTEMS AND METHODS FOR MATERIAL FIXATION - Devices, systems and methods for fixation of tendon to bone are described. An exemplary surgical implant is a modified bone anchor that is able to grasp the tendon and hold it firmly in a bone tunnel. Once deployed, the anchor delivers lateral compression to the tendon, providing direct tendon to bone compression to facilitate healing. The anchor has different versions which allow it to be attached to the tendon prior to insertion into the bone tunnel, or be inserted between tendon arms when the surgical procedure dictates. The resulting tendon to bone compression allows for the firm fixation in a manner markedly simpler than traditional techniques. A modification of this anchor can also allow the anchor to grasp and hold suture. This variation facilitates the technique for knotless rotator cuff repair. | 06-17-2010 |
20100179524 | METHOD AND DEVICES FOR PERFORMING BIATRIAL COAGULATION - Methods and devices described herein facilitate improved treatment of body organs. | 07-15-2010 |
20100217249 | METHOD AND DEVICES FOR COAGULATION OF TISSUE - Methods and devices described herein facilitate improved treatment of body organs. | 08-26-2010 |
20100262138 | METHODS OF COAGULATING TISSUE - An embodiment of the invention includes a surgical device for coagulating soft tissue such as atrial tissue in the treatment of atrial fibrillation, atrial flutter, and atrial tachycardia; tendon or ligament shrinkage; or articular cartilage removal. The surgical device integrates a suction mechanism with the coagulation mechanism improving the lesion creation capabilities of the device. The surgical device comprises an elongate member having an insulative covering attached about conductive elements capable of coagulating soft tissue when radiofrequency or direct current energy is transmitted to the conductive elements. Openings through the insulative covering expose regions of the conductive elements and are coupled to lumens in the elongate member which are routed to a vacuum source. Suction causes the soft tissue to actively engage the opening thus the integrated, exposed conductive elements to facilitate the coagulation process and ensure the lesions created are consistent, continuous, and transmural. The embodiments of the invention can also incorporate cooling mechanisms associated with the conductive elements and coupled to a fluid source to passively transport fluid along the contacted soft tissue surface to cool thus pushing the maximum temperature deeper into tissue. | 10-14-2010 |
20110137311 | VACUUM COAGULATION PROBES - An embodiment of the invention includes a surgical device for coagulating soft tissue such as atrial tissue in the treatment of atrial fibrillation, atrial flutter, and atrial tachycardia; tendon or ligament shrinkage; or articular cartilage removal. The surgical device integrates a suction mechanism with the coagulation mechanism improving the lesion creation capabilities of the device. The surgical device comprises an elongate member having an insulative covering attached about conductive elements capable of coagulating soft tissue when radiofrequency or direct current energy is transmitted to the conductive elements. Openings through the insulative covering expose regions of the conductive elements and are coupled to lumens in the elongate member which are routed to a vacuum source. Suction causes the soft tissue to actively engage the opening thus the integrated, exposed conductive elements to facilitate the coagulation process and ensure the lesions created are consistent, continuous, and transmural. The embodiments of the invention can also incorporate cooling mechanisms associated with the conductive elements and coupled to a fluid source to passively transport fluid along the contacted soft tissue surface to cool thus pushing the maximum temperature deeper into tissue. | 06-09-2011 |
20110282344 | VACUUM COAGULATION PROBES - Methods for using a surgical device integrating a suction mechanism with a coagulation mechanism for improving lesion creation capabilities. The device comprises an elongate member having an insulative covering attached about means for coagulating soft tissue with at least one diagnostic element coupled to an energy transfer element of the device. Openings through the covering expose regions of the coagulation-causing elements and are coupled to lumens in the elongate member which are routed to a vacuum source and a fluid source to passively transport fluid along the contacted soft tissue surface in order to push the maximum temperature deeper into tissue. | 11-17-2011 |
20110313286 | SUBXYPHOID EPICARDIAL ABLATION - Methods and devices described herein facilitate ablation patterns on the heart within a pericardial sac and without opening or deflating the lungs. | 12-22-2011 |
20120179150 | VACUUM COAGULATION & DISSECTION PROBES - A surgical device integrating a suction mechanism with a coagulation mechanism is provided for improving lesion creation capabilities. The device comprises an elongate member having an insulative covering attached about means for coagulating soft tissue. Openings through the covering expose regions of the coagulation-causing elements and are coupled to lumens in the elongate member which are routed to a vacuum source. A fluid source to passively transport fluid along the contacted soft tissue surface may be provided in order to push the maximum temperature deeper into tissue. | 07-12-2012 |
20120271299 | METHOD AND DEVICES FOR COAGULATION OF TISSUE - Methods and devices described herein facilitate improved treatment of body organs. | 10-25-2012 |
20120310268 | DISSECTING CANNULA AND METHODS OF USE THEREOF - Methods and devices described herein facilitate improved access of locations within the body by providing a variety of dissection modes on a single access device. | 12-06-2012 |
20130018370 | VACUUM COAGULATION PROBES - Methods for using a surgical device integrating a suction mechanism with a coagulation mechanism for improving lesion creation capabilities. The device comprises an elongate member having an insulative covering attached about means for coagulating soft tissue. Openings through the covering expose regions of the coagulation-causing elements and are coupled to lumens in the elongate member which are routed to a vacuum source and a fluid source to passively transport fluid along the contacted soft tissue surface in order to push the maximum temperature deeper into tissue. | 01-17-2013 |
20130090532 | DIAPHRAGM ENTRY FOR POSTERIOR SURGICAL ACCESS - Methods and devices described herein facilitate improved treatment of body organs. | 04-11-2013 |
20130131673 | VACUUM COAGULATION PROBES - A surgical device integrating a suction mechanism with a coagulation mechanism is provided for improving lesion creation capabilities. The device comprises an elongate member having an insulative covering attached about means for coagulating soft tissue. Openings through the covering expose regions of the coagulation-causing elements and are coupled to lumens in the elongate member which are routed to a vacuum source. A fluid source to passively transport fluid along the contacted soft tissue surface may be provided in order to push the maximum temperature deeper into tissue. | 05-23-2013 |
20130261618 | VACUUM COAGULATION PROBES - Methods for using a surgical device integrating a suction mechanism with a coagulation mechanism for improving lesion creation capabilities. The device comprises an elongate member having an insulative covering attached about means for coagulating soft tissue. Openings through the covering expose regions of the coagulation-causing elements and are coupled to lumens in the elongate member which are routed to a vacuum source and a fluid source to passively transport fluid along the contacted soft tissue surface in order to push the maximum temperature deeper into tissue. | 10-03-2013 |
20140031820 | METHOD AND DEVICES FOR PERFORMING BIATRIAL COAGULATION - Methods and devices described herein facilitate improved treatment of body organs. | 01-30-2014 |
20150112145 | DIAPHRAGM ENTRY FOR POSTERIOR SURGICAL ACCESS - Methods and devices described herein facilitate improved treatment of body organs. | 04-23-2015 |
20150196316 | DISSECTING CANNULA AND METHODS OF USE THEREOF - Methods and devices described herein facilitate improved access of locations within the body by providing a variety of dissection modes on a single access device. | 07-16-2015 |
20150250537 | METHODS TO PREVENT STRESS REMODELING OF ATRIAL TISSUE - Methods and devices are disclosed herein for therapeutically treating atrial tissue to lessen the effects of mechanical stress on atrial tissue, where reducing mechanical stress in the portion of atrial tissue reduces formation of at least one arrhythmia substrate. In one example, the devices and methods are suitable for minimally invasive surgery. More particularly, methods and devices described herein permit creating an ablation pattern on an organ while reducing excessive trauma to a patient. | 09-10-2015 |
20150250538 | METHODS OF COAGULATING TISSUE - An embodiment of the invention includes a surgical device for coagulating soft tissue such as atrial tissue in the treatment of atrial fibrillation, atrial flutter, and atrial tachycardia; tendon or ligament shrinkage; or articular cartilage removal. The surgical device integrates a suction mechanism with the coagulation mechanism improving the lesion creation capabilities of the device. The surgical device comprises an elongate member having an insulative covering attached about conductive elements capable of coagulating soft tissue when radiofrequency or direct current energy is transmitted to the conductive elements. Openings through the insulative covering expose regions of the conductive elements and are coupled to lumens in the elongate member which are routed to a vacuum source. Suction causes the soft tissue to actively engage the opening thus the integrated, exposed conductive elements to facilitate the coagulation process and ensure the lesions created are consistent, continuous, and transmittal. The embodiments of the invention can also incorporate cooling mechanisms associated with the conductive elements and coupled to a fluid source to passively transport fluid along the contacted soft tissue surface to cool thus pushing the maximum temperature deeper into tissue. | 09-10-2015 |
20150265338 | VACUUM COAGULATION PROBES - A surgical device integrating a suction mechanism with a coagulation mechanism is provided for improving lesion creation capabilities. The device comprises an elongate member having an insulative covering attached about means for coagulating soft tissue. Openings through the covering expose regions of the coagulation-causing elements and are coupled to lumens in the elongate member which are routed to a vacuum source. A fluid source to passively transport fluid along the contacted soft tissue surface may be provided in order to push the maximum temperature deeper into tissue. | 09-24-2015 |
Patent application number | Description | Published |
20080224328 | TEMPORARY CHIP ATTACH USING INJECTION MOLDED SOLDER - An improved method for performing an improved Temporary Chip Attach utilizing an Injection Molded Solder (IMS) process to allow efficient testing of die for creating a Known Good Die Bank. The IMS is applied to the testing substrate to form a column on the substrate. The die to be tested can then be attached to the IMS column with C4 solder. A slight reflow is then applied to the die, allowing some of the C4 to melt, and form an electrical connection with the corresponding IMS column. After testing, the die can be removed along with the C4 from the IMS column or permanently attached the substrate by performing a full reflow of the C4. | 09-18-2008 |
20080225484 | THERMAL PILLOW - Methods, apparatus and assemblies for enhancing heat transfer in electronic components using a flexible thermal pillow. The flexible thermal pillow has a thermally conductive material sealed between top and bottom conductive layers, with the bottom layer having a flexible reservoir residing on opposing sides of a central portion of the pillow that has a gap. The pillow may have roughened internal surfaces to increase an internal surface area within the pillow for enhanced heat dissipation. In an electronic assembly, the central portion of the pillow resides between a heat sink and heat-generating component for the thermal coupling there-between. During thermal cycling, the flexible reservoir of the pillow expands to retain thermally conductive material extruded from the gap, and then contracts to force such extruded material back into the gap. An external pressure source may contact the pillow for further forcing the extruded thermally conductive material back into the gap. | 09-18-2008 |
20090030749 | IMPLEMENTING AN END-OF-LIFE PURCHASE - A system and method of implementing an end-of-life purchase of an item used in manufacturing. A method includes comparing a supply of an article to a demand for the article. The method also includes securing an amount of the article when the supply does not exceed the demand by a predetermined threshold, and waiting a predetermined period of time before repeating the comparing when the supply exceeds the demand by the predetermined threshold. | 01-29-2009 |
20090059057 | Method and Apparatus for Providing a Video Image Having Multiple Focal Lengths - A method and apparatus for providing a video image having multiple focal lengths includes a multi-focal lens system and a drive mechanism capable of moving the multi-focal lens system through a cyclic path. A plurality of optical images are formed as the multi-focal lens system moves through the cyclic path. An image pickup device is capable of converting each of the plurality of optical images into a corresponding image signal. An image processor is operative to preferably form a composite image signal wherein individual elements of the optical images are selected to provide preferred focus characteristics. | 03-05-2009 |
20090140432 | PAD STRUCTURE TO PROVIDE IMPROVED STRESS RELIEF - A semiconductor interconnection comprises a semiconductor device, a substrate adjacent the semiconductor device, and a plurality of spring contacts on the semiconductor device or the substrate. A plurality of solder connections are on the opposite semiconductor device or substrate. Each spring contact comprises a contact surface and a conductive material on the contact surface. Upon assembly of the semiconductor device and the substrate, the conductive material on the plurality of spring contacts makes contact with each of the plurality of solder connections. The conductive material is in a liquid state at manufacturing or operating temperatures of the semiconductor device. Thus, the conductive material could be a solid at room temperature and transition to a liquid state at the semiconductor's manufacturing or operating temperatures. | 06-04-2009 |
20120199182 | SOLAR CELL DEVICE - A solar cell device includes a solar cell. The solar cell includes a first light-capturing element configured to receive photonic energy. The solar cell device also includes a device interface for communicatively coupling an electrically chargeable device with the solar cell to receive electrical energy converted by the solar cell from the photonic energy. The solar cell device also includes a second light-capturing element for receiving and providing photonic energy as a supplemental source of energy to the solar cell. | 08-09-2012 |
20130202922 | POLYMER FUSED BATTERIES - Polymer-fused batteries are provided. The battery includes a casing, an anode coupled to the casing, an electrical source disposed between the casing and the anode, and a fuse over at least a portion of the anode. The polymer fuse comprises an electrically-conductive material formulated to decompose upon contact with a bodily fluid and to provide electrical communication between the anode cap and the electrical source when the polymer fuse is intact. | 08-08-2013 |
20140074543 | IMPLEMENTING AN END-OF-LIFE PURCHASE - A system and method of implementing an end-of-life purchase of an item used in manufacturing. A method includes comparing a supply of an article to a demand for the article. The method also includes securing an amount of the article when the supply does not exceed the demand by a predetermined threshold, and waiting a predetermined period of time before repeating the comparing when the supply exceeds the demand by the predetermined threshold. | 03-13-2014 |
20140371411 | POLYMER COMPOSITION WITH SALIVA LABILE AVERSIVE AGENT - For a polymer composition, a polymerizable aversive agent is chemically coupled to a substrate element. The chemical coupling is labile to saliva. | 12-18-2014 |
20150349321 | POLYMER FUSED BATTERIES - Polymer-fused batteries are provided. The battery includes a casing, an anode coupled to the casing, an electrical source disposed between the casing and the anode, and a fuse. The polymer fuse comprises an electrically-conductive material formulated to decompose upon contact with a bodily fluid. | 12-03-2015 |