Patent application number | Description | Published |
20110076657 | SPORT PERSONAL COACH SYSTEM - A call center system for coaching a player in judgmental aspects of an athletic sport or for practicing judgmental aspects of the sport includes a call center computer having a display and a memory. The system may also include a camera, a telephone, and a position locator system. Either the pictures stored in the memory or pictures taken with the camera are used to provide coaching or practice. Pictures of a golf course, golf course mapping data, or both are stored in a call center system. GPS data indicating the position of a golf ball on a golf course hole is used to provide either an overhead view of the hole and terrain features, pictures of the course at or near the location of the ball, or both, on a golf professional computer display. | 03-31-2011 |
20120214793 | SLEEP AID COMPOSITION AND METHOD - A sleep composition including zolpidem and quetiapine in combination provides a healthy sleep pattern allowing the user to get seven or eight hours sleep. The amount of each ingredient in the combination is lower than the amount usually needed to provide this amount of sleep when the ingredients are being used alone. | 08-23-2012 |
20130059277 | SPORT PERSONAL COACH SYSTEM - A call center system for coaching a player in judgmental aspects of an athletic sport or for practicing judgmental aspects of the sport includes a call center computer having a display and a memory. The system may also include a camera, a telephone, and a position locator system. Either the pictures stored in the memory or pictures taken with the camera are used to provide coaching or practice. Pictures of a golf course, golf course mapping data, or both are stored in a call center system. GPS data indicating the position of a golf ball on a golf course hole is used to provide either an overhead view of the hole and terrain features, pictures of the course at or near the location of the ball, or both, on a golf professional computer display. | 03-07-2013 |
20140045624 | METHOD AND SYSTEM PERMITTING A USER TO PLAY GOLF AGAINST A SELECTED PROFESSIONAL - A method of playing golf in which a user can play against a professional golfer. A first professional (pro) golfer plays a round of golf at a selected golf course, which round is recorded. Later, which time is at least five days but may be a week, a month or more later, a plurality of amateurs play a round of golf at the selected golf course, which rounds re also recorded. The pro round and the amateur rounds are compared, and each of the amateurs is provided a plaque or other memorabilia comparing the scores of the amateurs to the professional. | 02-13-2014 |
Patent application number | Description | Published |
20090298533 | DEVICES AND METHODS FOR INITIATING FUNCTIONS BASED ON MOVEMENT CHARACTERISTICS RELATIVE TO A REFERENCE - Disclosed are devices and methods of an electronic device configured to adaptably process arbitrary conditions to provide a user options for initiating or activating a non-display electronic function of the device. A user is free to determine how to position or orient the device. To determine in real-time, arbitrary conditions of the device, the disclosed devices and methods of an electronic device include determining that the electronic device is at rest and then acquiring a reference in response to determining that the electronic device is at rest. In this way, the device may assume any position or orientation to acquire a reference. Subsequently, subtle movement of the electronic device relative to the acquired reference may be detected to initiate a non-display electronic function of the electronic device. The user therefore may make choices inconspicuously and privately as to which non-display electronic function to initiate. | 12-03-2009 |
20140118520 | SEAMLESS AUTHORIZED ACCESS TO AN ELECTRONIC DEVICE - An electronic device and a method for enabling seamless access to the electronic device are disclosed herein. The method includes assessing, via a first processor, an initial stationary state of the electronic device; and monitoring at least one sensor of the electronic device to determine user interaction with the electronic device. In addition, motion of the electronic device is detected as is any subsequent secondary stationary state within a predetermined time period. An authentication procedure is initialized in the background based on proximity to a user and expiration of the predetermined time period. | 05-01-2014 |
20140351559 | Low Power Management of Multiple Sensor Chip Architecture - A method, device, system, or article of manufacture is provided for low-power management of multiple sensor chip architecture. In one embodiment, a method comprises, at a computing device that includes a first processor, a second processor and a third processor, receiving, at the first processor, first sensor data from a first sensor; determining, at the first processor, a motion state of the computing device using the first sensor data; in response to determining that the motion state corresponds to a predetermined motion state, activating the second processor; receiving, at the second processor, second sensor data from a second sensor; determining, by the second processor, that the motion state corresponds to the predetermined motion state using the second sensor data; and, in response to determining that the motion state corresponds to the predetermined motion state using the second sensor data, sending the motion state to the third processor. | 11-27-2014 |
20140351560 | Low Power Management of Multiple Sensor Integrated Chip Architecture - A method, device, system, or article of manufacture is provided for low-power management of multiple sensor chip architecture. In one embodiment, a method comprises, at a computing device that includes a first processor, a second processor and a third processor, performing, by the second processor, a first scan at a first scan rate for first location data using a sensor; receiving, at the second processor, from the sensor, the first location data; determining, by the second processor, a first location using the first location data; receiving, by the second processor, a modality of the computing device; in response to determining the first location, determining, by the second processor, that the modality corresponds to a predetermined state; and in response to determining that the modality corresponds to the predetermined state, performing, by the second processor, a second scan at a second scan rate for second location data using the sensor. | 11-27-2014 |
20150156647 | Methods and Devices for Path-Loss Estimation - A method on an electronic device for a wireless network is described. A wireless signal is received from a second electronic device. A receive power level indication for the received wireless signal is determined. A path-loss offset for the received wireless signal is determined based on sensor data that indicates a path-loss condition. A path-loss for the received wireless signal is estimated based on the receive power level indication and the path-loss offset. A function is performed based on the path-loss and the path-loss threshold. | 06-04-2015 |
Patent application number | Description | Published |
20140157847 | COMPOSITIONS COMPRISING ESTOLIDE COMPOUNDS AND METHODS OF MAKING AND USING THE SAME - Provided herein are compositions comprising at least one estolide compound of formula: | 06-12-2014 |
20140171671 | CATALYTIC PROCESSES FOR PREPARING ESTOLIDE BASE OILS - Provided herein are processes for preparing estolides and estolide base oils from fatty acid reactants utilizing catalysts. Further provided herein are processes for preparing carboxylic esters from at least one carboxylic acid reactant and at least one olefin. | 06-19-2014 |
20140178547 | COOKING OILS AND FOOD PRODUCTS COMPRISING ESTOLIDES - Cooking and frying oils comprising estolide compounds are described. Also described are methods of making food products comprising cooking or otherwise preparing at least one article of food with a composition comprising at least one estolide compound. | 06-26-2014 |
20150087569 | ESTOLIDE AND LUBRICANT COMPOSITIONS THAT CONTAIN ENE AND DIELS ALDER COMPOUNDS - Provided herein are compositions containing at least one estolide compound and at least one ene and/or Diels Alder compound. In certain embodiments, the addition of at least one ene and/or Diels Alder compound to an estolide-containing composition may improve the cold temperature, viscometric, and/or anti-wear properties of the composition. | 03-26-2015 |
20150144403 | DRILLING AND FRACTURING FLUIDS COMPRISING ESTOLIDE COMPOUNDS - Drilling fluid and fracturing fluid compositions comprising estolide base oils. Exemplary drilling and fracturing fluid comprise an estolide base oil and at least one additive. | 05-28-2015 |
20150197477 | CATALYTIC PROCESSES FOR PREPARING ESTOLIDE BASE OILS - Provided herein are processes for preparing estolides and estolide base oils from fatty acid reactants utilizing catalysts. Further provided herein are processes for preparing carboxylic esters from at least one carboxylic acid reactant and at least one olefin. | 07-16-2015 |
20150208684 | COOKING OILS AND FOOD PRODUCTS COMPRISING ESTOLIDES - Cooking and frying oils comprising estolide compounds are described. Also described are methods of making food products comprising cooking or otherwise preparing at least one article of food with a composition comprising at least one estolide compound. | 07-30-2015 |
20150259620 | COMPOSITIONS COMPRISING ESTOLIDE COMPOUNDS AND METHODS OF MAKING AND USING THE SAME - Provided herein are compositions comprising at least one estolide compound of formula: | 09-17-2015 |
20150376534 | DIELECTRIC FLUIDS COMPRISING ESTOLIDE COMPOUNDS AND METHODS OF MAKING AND USING THE SAME - Provided herein are dielectric fluids comprising at least one estolide compound of formula: | 12-31-2015 |
20160032211 | COMPOSITIONS COMPRISING ESTOLIDE COMPOUNDS AND METHODS OF MAKING AND USING THE SAME - Provided herein are compositions comprising at least one estolide compound of formula: | 02-04-2016 |
20160039739 | HYDROXY ESTOLIDES, POLY-CAPPED ESTOLIDES, AND METHODS OF MAKING THE SAME - Provided herein are poly-capped estolides, including those of the Formula IV | 02-11-2016 |
20160060186 | CONVERSION OF POLYESTER-CONTAINING FEEDSTOCKS INTO HYDROCARBON PRODUCTS - Provided herein are methods of processing polyester-containing feedstocks to provide hydrocarbon products. Exemplary feedstocks include those containing estolide compounds, which may be processed under thermal and/or catalytic conditions to provide at least one hydrocarbon product. | 03-03-2016 |
20160090547 | RECLAMATION OF ESTOLIDE BASE OILS FROM COMPOSITIONS COMPRISING IMMISCIBLE COMPONENTS - Methods and systems for processing a composition comprising an estolide base oil and an immiscible component. In certain embodiments, the process comprises separating an estolide base oil from immiscible components such as water. In certain embodiments, the method comprises one or more of gravity separating, coalescing, and accumulating. | 03-31-2016 |
Patent application number | Description | Published |
20140141688 | Bubble Toy Device - The invention is a bubble toy device for producing air bubbles from bubble solution. The invention contains a fan and fan shroud, to produce and channel an air stream past a dispensing ring into ambient environment. The invention utilizes a pump, a film producing mechanism, attached to the fan shroud with an application bar to apply bubble solution onto a dispensing ring. Upon compression of the invention's trigger, an electric power circuit activates pump and fan motors that deliver bubble solution and blow air through said ring. A separate internal sealed container, with external contacts, wherein a battery compartment for containment of and removably-inserted batteries, which is accessible on the side of the invention's handle and a door is removeably-attached by use of an attaching device, fastener, or screw. The invention can be comprised of another lighting system and/or at least one variety of sound producing devices. | 05-22-2014 |
20140364032 | BUBBLE TOY DEVICE - The invention is a bubble toy device for producing air bubbles from bubble solution. The invention contains a fan for producing a stream of air and a fan shroud to channel the stream of air through a dispensing ring and into an ambient environment. Upon compression of a trigger, an electric circuit is activated which energizes a motor that operates the fan, and also a pump in some embodiments. The pump delivers bubble solution to the dispensing ring, and a trigger activated film producing mechanism attached to the air channel creates a film of bubble solution across the dispensing ring during interaction with an application bar. A separate internal sealed container with external contacts serves as a battery compartment for containment of removably-insertable batteries. This sealed container is accessible on the side of the invention's handle and a door is removeably-attached by use of an attaching device, fastener, or screw. The invention can comprise a lighting system and/or at least one (1) sound producing device. | 12-11-2014 |
Patent application number | Description | Published |
20090095623 | Identification Method for Electrochemical Test Strips - The present invention provides a method and apparatus for creating test strips that may be identified based on differences in electrical conduction or resistance between contact point on the test strip. This is achieved by creating a base test strip with contact points that may be connected to other contact points by an electrical connection. These base test strips may be modified to create a difference in electrical conductivity between contact points, or a contact point may be eliminated. This modification can be used to distinguish different types of test strips based on electrical signature. Additionally, the base test strip may be created such that multiple modifications are possible to distinguish numerous characteristics of test strips. | 04-16-2009 |
20100308837 | Test Strip Coding and Quality Measurement - A test strip and analytical apparatus have pin connections permitting the definition of geographic regions or of particular customers. A test strip made for use in a particular region or for a particular customer will have pin connections matching features of the apparatus made for use in that region or by that customer. Insertion of the strip into the apparatus does not merely turn on the apparatus, but provides the regional or customer coding. Analog switches within the apparatus allow coding of a larger number of distinct regions or customers than would otherwise be possible, all without degrading the quality of the measurements made of the fluid being tested. Conductive paths in the strips permit testing the strips during manufacture so as to detect quality lapses regarding the printing or deposition of the paths. | 12-09-2010 |
20110267028 | Measuring device and methods for use therewith - The ability to switch at will between amperometric measurements and potentiometric measurements provides great flexibility in performing analyses of unknowns. Apparatus and methods can provide such switching to collect data from an electrochemical cell. The cell may contain a reagent disposed to measure glucose in human blood. | 11-03-2011 |
20130175184 | Method and Apparatus for Encoding Test Strips - A test meter for receiving a test strip comprises:
| 07-11-2013 |
20140001046 | Measuring device and methods for use therewith | 01-02-2014 |
20140151222 | Measuring device and methods for use therewith - The ability to switch at will between amperometric measurements and potentiometric measurements provides great flexibility in performing analyses of unknowns. Apparatus and methods can provide such switching to collect data from an electrochemical cell. The cell may contain a reagent disposed to measure glucose in human blood. | 06-05-2014 |
20150083587 | Measuring Device and Methods for Use Therewith - The ability to switch at will between amperometric measurements and potentiometric measurements provides great flexibility in performing analyses of unknowns. Apparatus and methods can provide such switching to collect data from an electrochemical cell. The cell may contain a reagent disposed to measure glucose in human blood. | 03-26-2015 |
20160033441 | MEASURING DEVICE AND METHODS FOR USE THEREWITH - The ability to switch at will between amperometric measurements and potentiometric measurements provides great flexibility in performing analyses of unknowns. Apparatus and methods can provide such switching to collect data from an electrochemical cell. The cell may contain a reagent disposed to measure glucose in human blood. | 02-04-2016 |
20160061763 | METHOD AND APPARATUS FOR ENCODING TEST STRIPS - A test meter for receiving a test strip comprises:
| 03-03-2016 |
Patent application number | Description | Published |
20120278507 | CROSS-NETWORK SYNCHRONIZATION OF APPLICATION S/W EXECUTION USING FLEXRAY GLOBAL TIME - A system and method for implementing cross-network synchronization of nodes on a vehicle bus includes periodically sampling a notion of time from a first network, transmitting a message from the first network to a node on a second network, wherein the message includes the notion of time, and updating a local clock on the second network node based on the notion of time in the message. | 11-01-2012 |
20130111203 | METHOD TO REPLACE BOOTLOADER PUBLIC KEY | 05-02-2013 |
20130111212 | METHODS TO PROVIDE DIGITAL SIGNATURE TO SECURE FLASH PROGRAMMING FUNCTION | 05-02-2013 |
20130111271 | USING A MANIFEST TO RECORD PRESENCE OF VALID SOFTWARE AND CALIBRATION | 05-02-2013 |
20130111582 | SECURITY ACCESS METHOD FOR AUTOMOTIVE ELECTRONIC CONTROL UNITS | 05-02-2013 |
20130268754 | SECURE SOFTWARE FILE TRANSFER SYSTEMS AND METHODS FOR VEHICLE CONTROL MODULES - A server includes an import module that receives a first content file and a first instruction file from a design network. The first instruction file includes a first set of parameters. A job request module, based on the first instruction parameter set, determines a second parameter set and generates a second instruction file comprising the second parameter set. The job request module transmits the first content file and the second parameter set to a signature server. An export module receives a signature file from the signature server. The signature server generates the signature file based on the second instruction file. The export module integrates the signature into the first content file to generate a second content file and downloads the second content file to at least one of a service server, a manufacturing server, and a supplier network. | 10-10-2013 |
20130308794 | MITIGATING THE EFFECTS OF AUDIO INTERRUPTIONS VIA ADAPTIVE AUTOMATED FAST AUDIO PLAYBACK - An audio interruption and buffering playback system includes a primary audio source for reproducing primary audio content and a secondary audio source for reproducing secondary audio content. A processing device detects an interruption event that includes the secondary audio source reproducing secondary audio content having priority over the primary audio source. The processor mutes the output of the primary audio content in response to the interruption event. A buffer buffers the audio content from the primary audio source during the interruption event. The buffered audio content is reproduced by the processor to the user at an accelerated playback speed following the interruption event. | 11-21-2013 |
20140032800 | VEHICLE MESSAGE FILTER - A message filtering system for a communications system in a vehicle enabling communication between various systems and subsystems via a vehicle bus. Electronic devices may be coupled to the bus. Electronic control units (ECUs) may be located therebetween. The ECU may regulate or control the flow of messages between the bus and the electronic devices. Message filters may apply a filter policy to incoming and outgoing messages. In addition, the message filtering system may have an alert policy for violations of the filter policy. In one embodiment, the source identity of outgoing messages may be overwritten by a message filter dedicated to outgoing messages; this message filter may be an application specific integrated circuit. | 01-30-2014 |
20140075094 | METHOD TO IMPLEMENT A BINARY FLAG IN FLASH MEMORY - A system and method for changing a state of a binary flag in a flash memory. The method defines a cell segment including a predetermined number of bits as the binary flag, where each bit is converted to a logical 1 when the memory is erased. The method also defines that an even number of logical 1 bits in the flash cell segment is an even parity and an odd number of logical 1 bits in the flash cell segment is an odd parity, and defines whether an even parity is an ON state of the binary flag or an odd parity is the ON state of the binary flag. The method changes the parity of the binary flag by writing one of the bits in the flash cell segment from a logical 1 to a logical 0 to change the state of the flag. | 03-13-2014 |
20140075197 | METHOD FOR SELECTIVE SOFTWARE ROLLBACK - A system and method for validating a software file to be installed into a controller. The method includes preparing the software file including assigning a software version code to the software file, assigning a security version code to the software file, and signing the software file with the software file version code and the security version code. The signed software file is presented to the controller for installing on the controller and the controller verifies the software file signature to determine if the software file is valid and the security version code is valid. The controller allows the software file to be installed in the controller if both the signed software file is valid and the security version code is valid. | 03-13-2014 |
20140075517 | AUTHORIZATION SCHEME TO ENABLE SPECIAL PRIVILEGE MODE IN A SECURE ELECTRONIC CONTROL UNIT - A system and method for by-passing a security code to allow developmental software to be installed on a production controller without having to authenticate the software. The method includes requesting information from the controller and creating an information ticket in the controller in response to the request that identifies the controller. The information ticket is sent to a secure server that creates an authorization ticket that identifies the controller from the information ticket and creates a security code for the ticket. The authorization ticket is presented to the controller and if the security code is verified by the controller, the controller allows the developmental software to be installed. | 03-13-2014 |
20140075579 | METHOD TO ENABLE DEVELOPMENT MODE OF A SECURE ELECTRONIC CONTROL UNIT - A system and method for installing software on a secure controller without requiring the software to be properly signed. The method includes determining whether a by-pass flag has been set in the controller that identifies whether a file validation procedure is required to install the file and performing a pre-check operation to determine whether predetermined parameters of the file have been satisfied. The method also includes installing the file into a memory in the controller if the pre-check operation has been satisfied. The method further includes determining whether the file has a proper signature and indicating that the signature is proper if the by-pass flag is set and the file does not include a proper signature, and allowing the file to be installed if the signature has been indicated as being proper. | 03-13-2014 |
20140181526 | METHODS AND SYSTEMS FOR BYPASSING AUTHENTICITY CHECKS FOR SECURE CONTROL MODULES - Methods and systems are provided for bypassing an authenticity check for a secure control module. In one embodiment, a method includes: receiving authenticity data from a secure source, wherein the authenticity data includes a signature and an identifier that is unique to the control module; programming the control module with the authenticity data; and bypassing the authenticity check of a control program of the control module based on the authenticity data. | 06-26-2014 |
20150082380 | METHODS AND APPARATUS FOR SECURE COMMUNICATION IN A VEHICLE-BASED DATA COMMUNICATION SYSTEM - A method provides secure communication between a first module and a second module within a vehicle communication network. A first anti-replay counter is provided within the first module, and a second anti-replay counter is provided within the second module. A message is transmitted from the first module to the second module over the vehicle communication network. The message includes a partial counter including only a portion of the contents of the first anti-replay counter, and the message is authenticated based on the partial counter. | 03-19-2015 |
20150084753 | ATTACK RESISTANT THEFT DETERRENT SYSTEM - Systems and methods for theft deterrence of a vehicle are provided. Each of two or more immobilization point devices generate a random number and broadcasts it to all of the other immobilization points devices. Each of the immobilization point devices retains a local copy of its own random number and concatenates the local copy of its own random number with the random numbers of the other of the two or more immobilization point devices from the bus. From the random numbers broadcast on the bus, all of the random numbers are concatenated in a predetermined sequence to form a single challenge, which is transmitted to a remote transponder. Each of the immobilization point devices then compares a single response from the transponder to their local concatenation. When a specific portion of the response from the transponder matches a local concatenation, then enabling the function of the immobilization point device. | 03-26-2015 |
20150135271 | DEVICE AND METHOD TO ENFORCE SECURITY TAGGING OF EMBEDDED NETWORK COMMUNICATIONS - A method for managing communications from a device onboard a vehicle is provided. The method accesses a message transmitted from the device; determines whether the message is permitted; and, when the determining step determines that the message is not permitted, prevents the message from further transmission to an intended recipient device. | 05-14-2015 |
20150263860 | CONTROLLING ACCESS TO PERSONAL INFORMATION STORED IN A VEHICLE USING A CRYPTOGRAPHIC KEY - A system and a method are disclosed providing user information in a vehicle. The method includes the steps of: providing over a vehicle network a cryptographic key in response to receiving a wireless signal from a wireless transmitter at a first electronic control unit (ECU); receiving at a second ECU the cryptographic key; authenticating the cryptographic key at the second ECU; and providing user information via the second ECU based on the authentication. | 09-17-2015 |
20160026787 | AUTHENTICATING MESSAGES SENT OVER A VEHICLE BUS THAT INCLUDE MESSAGE AUTHENTICATION CODES - A system and method of transmitting data within a vehicle over a vehicle bus includes: constructing at an electronic control unit (ECU) a serial bus message that includes a data message and a message authentication code (MAC) that is created using a secret key stored at the ECU, a MAC algorithm, and the data message; transmitting the serial bus message to a receiving ECU over the vehicle bus; and authenticating the serial bus message at the receiving ECU using a copy of the secret key stored at the receiving ECU by creating a copy of the MAC from the data message included in the serial bus message, the copy of the secret key, and the MAC algorithm; comparing the MAC included in the serial bus message with the copy of the MAC created at the receiving ECU; and rejecting or accepting the data message based on the comparison. | 01-28-2016 |
20160099806 | DISTRIBUTING SECRET KEYS FOR MANAGING ACCESS TO ECUS - A system and method of controlling access to electronic control units (ECUs) includes: receiving, at an ECU supplier computer, a supplier encryption key derived from a master encryption key using a supplier identifier that identifies an ECU supplier; issuing an ECU identifier that identifies an ECU and includes the supplier identifier; generating for the ECU an ECU unlock authorization key using the supplier encryption key and the ECU identifier; and storing the ECU unlock authorization key and the ECU identifier in the ECU. | 04-07-2016 |