Patent application number | Description | Published |
20090031205 | System for exporting-impoting the content of input cells from a scalable template instance to another - The present invention is directed to a method, system and program for exporting-importing the content of input cells from a source scalable template instance in a source multi-dimensional spreadsheet to a destination scalable template instance in a destination multi-dimensional spreadsheet; a multi-dimensional spreadsheet comprising a plurality of cells identified by a cell address along each dimension; a scalable template instance comprising a variable number of contiguous elements of same size ordered and aligned along a given spreadsheet dimension and structured according to information defined in an associated scalable template; an element being defined as a range of cells; a range of cells comprising one or a plurality of cells; said scalable template comprising an element profile; an element profile defining a cell content and a cell destination for each cell within each element; said cell destination specifying whether the cell is an input cell for receiving an entry or an output cell for producing a result. The method comprises the steps of:
| 01-29-2009 |
20090031206 | System in a spreadsheet for exporting-importing the content of input cells from a scalable template instance to another - The present invention is directed to a method, system and program for exporting-importing the content of input cells from a source scalable template instance in a source multi-dimensional spreadsheet to a destination scalable template instance in a destination multi-dimensional spreadsheet; a multi-dimensional spreadsheet comprising a plurality of cells identified by a cell address along each dimension; a scalable template instance comprising a variable number of contiguous elements of same size ordered and aligned along a given spreadsheet dimension and structured according to information defined in an associated scalable template; an element being defined as a range of cells; a range of cells comprising one or a plurality of cells; said scalable template comprising an element profile; an element profile defining a cell content and a cell destination for each cell within each element; said cell destination specifying whether the cell is an input cell for receiving an entry or an output cell for producing a result. The method comprises the steps of:
| 01-29-2009 |
20090037803 | SYSTEM IN AN ELECTRONIC SPREADSHEET FOR PERSISTENTLY SELF-REPLICATING MULTIPLE RANGES OF CELLS THROUGH A COPY-PASTE OPERATION AND A SELF-REPLICATION TABLE - The present invention includes a method and system for persistently self-replicating multiple ranges of cells through a copy-paste operation, in a multi dimensional spreadsheet. A set of ranges of cells is defined, wherein each range of cells has the same size. Each time the content of a range of cells belonging to this set is changed, a self-replication operation is performed automatically. The self-replication operation includes the steps of copying the changed range of cells onto a buffer; determining the set of ranges of cells to which the changed range of cells belongs to; identifying the ranges of cells belonging to the set; and pasting the content of the buffer in each of identified range of cells belonging to the set. | 02-05-2009 |
20090045911 | USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H | 02-19-2009 |
20090052671 | SYSTEM AND METHOD FOR CONTENT PROTECTION - The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an identifier, the media center including: a protection key; storage means for storing files identified by respective file identifiers; a processing unit comprising file encryption for encrypting each file before storage, using a title key computed from the protection key of the media center and for encrypting the title key using the protection key of the master storage device and the identifier of the master memory unit, the master storage device being further provided to write the encrypted title key in association with the corresponding file identifier to the master memory unit. | 02-26-2009 |
20090052672 | SYSTEM AND METHOD FOR PROTECTION OF CONTENT STORED IN A STORAGE DEVICE - The invention provides a system and method for content protection. A system according to an embodiment includes a media center connectable to a mobile secure and protection keyring associated with an identifier and with a media Key block MKB. The media center includes: a unique identifier identifying the media center MC_UID, a set of device keys DK; storage means for storing files identified by respective file identifiers; and a processing unit comprising file encryption means for encrypting each file before storage in the storage means, using a title key (Kt) computed from the identifier MC_UID of the media center and for encrypting the title key Kt from the set of device keys DK of the media center, and from the identifier and the media key block MKB of the mobile secure and protection keyring, the media center being further provided to write the encrypted title key (eKt) in association with the file identifier of the file to the mobile secure and protection keyring. | 02-26-2009 |
20090060458 | METHOD FOR SYNCHRONIZING DATA FLOWS - The first data flow is buffered at a receiver, and the buffer contents are scanned for metadata. Where metadata are found indicating a second data flow which has not yet arrived, the system enters a stalling phase during which the length of any silent periods in the first data flow are stretched. As the point in the first data flow at which the second data flow is necessary gets closer, the factor by which silent periods are stretched increases exponentially. Once the expected second data flow in fact arrives, playback of two data flows is accelerated by compressing silent periods so as to clear the backlog of additional data that built up in the buffer during the stalling phase. | 03-05-2009 |
20090073912 | METHOD AND SYSTEM FOR DIGITAL COMMUNICATION THROUGH INFRASTRUCTURE NETWORK WITH RECEIVING STATIONS ACCORDING TO THEIR GEOGRAPHICAL STATUS - The present invention relates to a method and system of computer communication through an infrastructure multicast IP network, between one or several determined central stations and undetermined groups of receiving stations, especially mobile stations. According to the invention, every mobile station sends its geographical status, e.g. its position, in an IP unicast message to the central station. In response, the mobile station receives an IP unicast message comprising one or more IP multicast addresses corresponding to the transmitted geographical status. The central station also has the necessary routers subscribed or unsubscribed to these multicast addresses, according to the local presence of such receiving stations. Receiving stations may then subscribe such localized multicast addresses, and receive the corresponding multicast messages. | 03-19-2009 |
20090100324 | System and computer program product for copying and pasting displayed elements of a range of cells in an electronic spreadsheet - The present invention is directed to a method, system and computer program for copying and pasting, in an electronic multidimensional spreadsheet, displayed elements of a source range of cells onto a destination range of cells, the source range of cells including one or more elements displayed on a user interface and one or more hidden elements, the elements being contiguous and aligned along a given spreadsheet dimension. The method includes (A) detecting a command for copying at least one displayed element from a selected source range of cells onto a selected destination range of cells; (B) identifying the selected source range of cells; (C) identifying the at least one displayed element in the selected source range of cells; (D) identifying at least one hidden element in the selected source range of cells; (E) copying the displayed element and hidden element onto a temporary range of cells; and (F) copying the temporary range of cells onto the destination range of cells. | 04-16-2009 |
20090121018 | VOTING METHOD - A voting method. A ballot paper is received. The received ballot paper includes a recorded vote. The recorded vote includes candidate/party information for an election held on a voting day in a jurisdiction. The ballot paper includes a burnable radio frequency identification (RFID) tag including an on-tag fuse that is not blown. The recorded vote is not revealable while the fuse is not blown and is revealable in response to the fuse being subsequently blown. After the ballot paper is received, the ballot paper is authenticated and the fuse is blown to reveal the recorded vote, followed by counting the ballot paper and directing the ballot paper to a candidate box. | 05-14-2009 |
20090121019 | VOTING SYSTEM AND BALLOT PAPER - A ballot paper and a voting system. The paper ballot is initially a voted ballot paper including: a recorded vote including candidate/party information for an election on a voting day in a jurisdiction, a burnable radio frequency identification (RFID) tag including a fuse not blown, and a basic RFID tag storing the jurisdiction's signature. The recorded vote is not revealable while the fuse is not blown and is revealable responsive to the fuse being blown. The voting system includes a ballot box and a ballot counting machine. The ballot box is configured to receive and authenticate the voted ballot paper and to generate a verified ballot paper. The ballot counting machine is configured to receive and authenticate the verified ballot paper, to effectuate a blowing of the fuse to reveal the recorded vote and to subsequently count the ballot paper and direct the ballot paper to a candidate box. | 05-14-2009 |
20090121840 | METHOD AND APPARATUS FOR LOCATING TIRES USING RFID - A method and apparatus for determining the position of four tires on corresponding four wheels in a vehicle. Each wheel has an axis of rotation. Each tire has an embedded Radio Frequency IDentification (RFID) tag. The RFID tags embedded in the four tires have respective identifiers denoted as ID | 05-14-2009 |
20090121843 | METHOD AND SYSTEMS FOR LOCALIZING OBJECTS USING PASSIVE RFID TAGs - Method and system for localizing an object in a stack of objects. A passive radio frequency identification (RFID) tag is attached to each object. Each RFID tag includes a unique identifier of the object to which the RFID tag is attached. A RFID reader has multiple antennas. Each antenna is positioned to transmit a signal that can be detected by different RFID tags attached to the objects within a reading range of the transmitted signal from each antenna. The antennas are sequentially selected and powered to transmit to the stack a read signal including object's identifier for the object to be localized. If a response to the read signal is received by a selected and powered antenna from a RFID tag that matched the object's identifier with its unique identifier, then a light emitting diode (LED) is lighted to identify a location of the object being localized. | 05-14-2009 |
20090135898 | METHOD AND USER DEVICE FOR RECEIVING DIGITAL TRANSMISSIONS - The invention provides a user device ( | 05-28-2009 |
20090138776 | RETRANSMISSION MANAGER AND METHOD OF MANAGING RETRANSMISSION - The invention provides a retransmission manager for use in a digital content delivery system, wherein the delivery system comprises a plurality of user devices, a set of content providers for delivering digital content to the user devices in the form of bursts of content through a source unit. The retransmission manager is connected to the user devices to receive notifications therefrom, each notification received from a given user device identifying a burst received by the given user device which is candidate for retransmission. The retransmission manager selects a set of bursts among the bursts identified by the notifications based on the amount of available bandwidth at the source unit and on negotiation messages received from at least one of the plurality of content providers, the negotiation message being related to at least one burst identified in the notifications and including, for each burst, a negotiation parameter. The retransmission manager then sends a request for retransmission of the selected bursts to the source unit. | 05-28-2009 |
20090138932 | QUALITY MANAGER AND METHOD FOR USE IN A DIGITAL CONTENT DELIVERY SYSTEM - The invention provides a quality manager for use in a digital content delivery system. The digital content delivery system comprises a plurality of user devices, a source unit connected through a communication network to the user devices for delivering digital content to the user devices in the form of bursts of content. The quality manager is connected to the user devices and adapted to receive notifications therefrom, each notification received from a given user device identifying a burst received by the given user device and including a quality indicator related to the quality of the received burst. The quality manager is further adapted to select a set of bursts among the bursts identified by the notifications, based on predefined rules comprising a rule related to the quality indicator included in the notifications, and for sending a request for retransmission of the selected bursts to the source unit. | 05-28-2009 |
20090144620 | METHOD AND DATA PROCESSING SYSTEM FOR DISPLAYING SYNCHRONOUSLY DOCUMENTS TO A USER - A method and a data processing system for displaying a first document and a second document in a synchronized way are disclosed. The first document includes a first set of control tags. The second document includes a second set of control tags. A control tag of the first set of control tags is uniquely assigned to a control tag of the second set of control tags. A portion of the first document is displayed to a user, wherein a first control tag is identified in the first document, wherein the first control tag corresponds to the control tag of the first set of control tags which is situated in essence at the top of the displayed portion of the first document. Furthermore, a second control tag is determined in the second document, wherein the second control tag corresponds to the control tag of the second set of control tags to which the first control tag is uniquely assigned. A portion of the second document is then displayed simultaneously to the display of the portion of the first document to the user, wherein the second control tag is situated in essence at the top of the displayed portion of the second document. | 06-04-2009 |
20090158090 | DATA ENTRY RETRIEVAL - The present invention provides for the recovery of characters entered into at least one data entry zone of a data entry window. A method in accordance with an embodiment includes: storing a first image of the data entry window during data entry; subtracting a reference image from the first image to obtain a delta image, wherein the reference image is an image of the data entry window without data entered; identifying at least one non empty zone of the delta image and the location of the at least one data entry zone on the data entry window from the location of the at least one non empty zone on the delta image; extracting at least one character by applying optical character recognition to the least one non empty zone; and inputting the at least one character into the location of the at least one data entry zone. | 06-18-2009 |
20090158140 | METHOD AND SYSTEM TO SECURE THE DISPLAY OF ADVERTISEMENTS ON WEB BROWSERS - A method and system to secure the display of advertisements on web browsers. A method according to an embodiment includes: interpreting a markup file in a virtual machine, converting displayable elements of the markup file to one or a plurality of images and constructing a modified markup file comprising the at least one image file and a scripting language code adapted to cause a user terminal upon which it is executed to transmit coordinate information defining the position of a user-controlled cursor and action information defining a clicking action. | 06-18-2009 |
20090158141 | METHOD AND SYSTEM TO SECURE THE DISPLAY OF A PARTICULAR ELEMENT OF A MARKUP FILE - A method and system to secure the display of a particular element of a markup file, interpreting a markup file comprising displayable elements, converting the displayable elements of the markup file to at least one image and constructing a modified markup file including the at least one image and a scripting language code adapted to encode links and input fields associated to the image. | 06-18-2009 |
20090160603 | LOCATING RFID TAGS - A method and RFID tag for locating RFID tags. A passive RFID tag A receives a polling command transmitted from a RFID reader and addressed to another passive RFID tag B. The RFID tag A determines that the polling command is not addressed to the RFID tag A and consequently, at time t | 06-25-2009 |
20090160622 | DIVIDING TAGGED ITEMS INTO SUBSETS - A method and system for dividing a set of tagged items into subsets. Each tagged item is tagged with a passive RFID tag. A RFID reader is instructed to poll the RFID tags of all tagged items in a specified region having fixed boundaries to generate information including, for each tagged item, a spatial location of each tagged item and a list of all other tagged items in the region which are adjacent to each tagged item. The region is split into a plurality of subregions. For each subregion, a central tagged item having more adjacent tagged items in each subregion than any other tagged item in each subregion is determined, utilizing the generated information. A virtual boundary is outlined around the central tagged item to enclose the central tagged item and a portion of the tagged items in each subregion which are adjacent to the central tagged item. | 06-25-2009 |
20090169019 | METHOD AND SYSTEMS USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for generating data for generating an authenticity certificate to be stored on a media. The authenticity certificate authenticates an object. A request for a step certificate includes a media identifier, a media key block, an object identifier, a requester entity type, and a requester identity certificate. The object identifier is hashed. A created signature includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A generated hashing result is a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate including the hashing result is generated and encrypted. The encrypted step certificate and an encrypted random key are sent to a requester of the step certificate. The object may be determined to be an authentic object, a counterfeited object, or a stolen object. | 07-02-2009 |
20090187816 | SYSTEM AND METHOD IN AN ELECTRONIC SPREADSHEET FOR DISPLAYING AND/OR HIDING RANGE OF CELLS - The present invention is directed to a method, system and program for displaying and/or hiding, in an electronic multi-dimensional spreadsheet on a user interface, elements of a range of cells, a range of cells having one or more contiguous elements aligned along a given spreadsheet dimension, an element of a range of cells having one or more cells along one or a plurality of spreadsheet dimensions. The method includes (A) detecting a command for hiding at least one element in a selected range of cells, the command comprising means for identifying the selected range of cells and means for identifying a display focus level selected among a plurality of ordered display focus levels defined for the selected range of cells; (B) identifying the selected range of cells in the element to hide; (C) identifying the selected display focus level; (D) identifying a table associated with the selected range of cells, the table associating each defined display focus level with at least one cell content criteria to apply to the content of the at least one cell; and (E) selectively displaying the element on the user interface based on the relationship of the selected display focus level with the display focus level associated with the element. | 07-23-2009 |
20090189457 | METHOD AND SYSTEM FOR READING A TRANSPONDER - A transponder, a method for powering the transponder, and a system relating to the method. The transponder includes at least two electrical coils, a dipole antenna, and a chip electrically connected to the dipole antenna and the electrical coils, wherein the electrical coils surround the dipole antenna and the chip. The transponder is surrounded with a wiring loop. An alternating current is generated in the wiring loop. The alternating current generates a magnetic field at the electrical coils. The electrical coils receive energy from the magnetic field and transfer the received energy to the chip for powering the transponder. The dipole antenna is configured to transmit an output signal to a reader and to receive an input signal from the reader. | 07-30-2009 |
20090200867 | SYSTEM AND METHODS FOR SCHEDULING POWER USAGE - A system for scheduling electric power consumption cycles is provided. A consumption cycle is a time period of human scale, minutes or hours typically, rather than an electrical cycle. The system includes an electric-powered device driven by power supplied by an electric power network. The system also includes a consumption cycle data (CCD) requesting module communicatively linked to the electric-powered device. The link may use electric power lines via methods such as Broadband over Power Line, or may be wireless. The CCD requesting module is configured to generate a CCD request requesting allocation of electric power from the electric power network. Additionally, the system includes an electric power network node electrically connected to the electric-powered device from which electric power is conveyed to the electric-powered device. The system also includes a CCD responding module communicatively linked to the CCD requesting module. The CCD responding module is configured to determine whether the request for allocation of power can be granted subject to a predetermined capacity constraint. | 08-13-2009 |
20090201154 | APPARATUS FOR SECURING A LAND SURVEYOR'S MARK BASED ON THE USE OF A RADIO FREQUENCY IDENTIFIER TAG - A surveyor's mark and a method for forming the mark. The mark includes a stick and a head assembled to the stick. The stick is configured to be planted in a ground and the head is configured to be above the ground. The head includes a tag having an identification number. The identification number has a value which is a first code value. The stick includes a tinny wire configured as an electrical conducting loop and connected to the tag. If the stick is planted in the ground and the head is above the ground, then pulling the head in an attempt to pull up the mark from the ground results in the head being disassembled from the stick and the tinny wire breaking so as to open the loop which changes the value of the identification number from the first code value to a second code value. | 08-13-2009 |
20090205405 | MONITORING OF WEARING SURFACE LAYER THICKNESS - A method of wear level determination and an associated product. Multiple Radio Frequency IDentification (RFID) tags are distributed within a thickness of a wearing surface layer of a tire. The multiple RFID tags include first RFID tags that have not been worn away, second RFID tags that have been worn away, and a special RFID tag that has not been worn away. A measure of wear of the wearing surface layer of the tire is determined from data received from the first RFID tags and from a table in the special RFID tag. The product includes the wearing surface layer of the tire, the multiple RFID tags, and a mechanism for determining the measure of wear of the wearing surface layer. | 08-20-2009 |
20090282464 | SYSTEM AND METHOD FOR AUTHENTICATING AN END USER - A system and associated method for authenticating an end user. The method comprises generating a first mask in response to an authentication request from an end user, the first mask comprising a set of root nodes, a set of server nodes, and a set of client nodes each being unique to the end user. Next, determining the authenticity of the end user based on comparing data received from the end user with nodes contained in the first mask. The data comprising a set of nodes selected by the end user and the end user having selected the data in response to the first mask. | 11-12-2009 |
20090292984 | METHOD AND SYSTEM TO SELECTIVELY SECURE THE DISPLAY OF ADVERTISEMENTS ON WEB BROWSERS - A method and system to selectively secure the display of advertisements on web browsers. A method in accordance with an embodiment includes: defining a particular displayed area of the interpreted markup file; obtaining the DOM tree of the interpreted markup file, the DOM tree comprising parent and child nodes, each node being associated with displayable elements; identifying in the DOM tree a set of child nodes whose displayable elements comprise the particular displayed area; identifying in the DOM tree a first parent node comprising the set of child nodes; converting displayable elements associated with the identified first parent node to an image; generating a second parent node comprising the image; and modifying the DOM tree into a modified DOM tree by deleting the identified set of child nodes and by replacing the identified first parent node by the second parent node. | 11-26-2009 |
20090315679 | LOCATION LOCALIZATION METHOD AND SYSTEM - A location localization method and system. The method includes transmitting by an RFID tag reader, a request for locating a passive RFID tag in a facility. The RFID tag reader receives from a first group of active RFID tags, a first date/time associated with first data. The RFID tag reader transmits to the first group of active RFID tags, a request for retrieving the first data. The first data comprises distances between each active RFID tag of the first group and the passive RFID tag. The RFID tag reader receives the first data. The RFID tag reader receives a map of the facility and locations on the map for the first group of active RFID tags. The RFID tag reader determines a location within the facility for the passive RFID tag based on the first data, the map, and the locations on the map. The RFID tag reader transmits the first location to a user. | 12-24-2009 |
20090315685 | METHODS AND SYSTEMS FOR RFID TAG GEOGRAPHICAL LOCATION USING BEACON TAGS AND LISTENING TAGS - RFID method and system are provided. A reader transmits a reader signal to beacon tags and a listening tag. The beacon tags transmit beacon signals including a beacon identification and a beacon distance to the reader. The listening tag receives the beacon signals. Neighbor distances are calculated for the beacon tags based on when the beacon signals are received, when the listening tag receives the reader signal, and a constant processing time. The neighbor distances are the individual distances from the listening tag to the beacon tags. A list is stored including the beacon identification for the beacon tags, the beacon distance, and the neighbor distances. The listening tag transmits the list and a listening tag identification to the reader. A geographical position of the listening tag is calculated based on the beacon distance, beacon coordinates, and a listening tag distance which is from the reader to the listening tag. | 12-24-2009 |
20100004816 | SYSTEM AND METHOD FOR GATHERING AND SUBMITTING DATA TO A THIRD PARTY IN RESPONSE TO A VEHICLE BEING INVOLVED IN AN ACCIDENT - A system and associated method for gathering and submitting data to a third party in response to a vehicle being involved in an accident. First an information manager stores data regardless of the vehicle being involved in an accident. Next the event detection manager stores data in response to detecting the vehicle being involved in an accident. Next the information manager stores state data pertaining to the vehicle's current state. Then an adjacent identifier manager requests, receives, and stores data from surrounding vehicles in memory. Next a report is generated and encrypted. Finally, the encryption and transmission manager stores the report in memory. | 01-07-2010 |
20100023586 | SYSTEM AND METHOD FOR CORRELATING QUESTIONS AND ANSWERS IN AN INSTANT MESSAGING ENVIRONMENT - A system and method for correlating questions and answers in an instant messaging environment. First creating an instant messaging client at least two zones, each zone of the at least two zones corresponding to a unique end user, each zone of further comprising at least one textbox. After creating the instant messaging client, providing the instant messaging client to each end user of at least two end users. Receiving a message from an end user, the message comprising a first value and a second value and text. Finally, sending the text received in the message to each instant messaging client not being controlled by the sending end user, the text therein being displayed in a textbox having the second value and being located in a zone corresponding to the sending end user. | 01-28-2010 |
20100024004 | METHOD AND SYSTEM FOR SECURING ACCESS TO AN UNSECURE NETWORK UTILIZING A TRANSPARENT IDENTIFICATION MEMBER - A method, system and computer-usable medium for providing secure access to an application over an unsecure network. A transparent identification member can be physically placed by a user against a login interface, the transparent identification member possessing a filter for filtering and displaying a pattern unique to the login interface. Thereafter, the user can be automatically permitted to authenticate an unsecure network and securely access an application over the unsecure network, in response to placing the transparent identification member against the login interface and providing a user input at a physical location on the login interface corresponding to the pattern unique to the login interface, thereby providing a secure authentication for the user to perform secure transactions over the unsecure network and preventing phishing by others with respect to the user and the unsecure network. | 01-28-2010 |
20100066513 | VEHICLE AUTHORIZATION METHOD AND SYSTEM - A vehicle authorization method and system. The method includes transmitting, by a computing system in a vehicle, a first request for enabling the vehicle for a driver. The computing system receives vehicle identification data associated with the vehicle. The computing system identifies the driver. The computing system transmits a second request for information associated with the driver. The computing system receives driver's license data associated with the driver, a list comprising authorized drivers for the vehicle, and insurance data associated with the driver and the vehicle. The computing system analyzes the vehicle identification data, the driver's license data, the list, and the insurance data. The computing system performs specified functions associated with the vehicle. The computing system generates and stores a report indicating the specified functions. | 03-18-2010 |
20100070622 | SYSTEM AND METHOD FOR UTILIZING SYSTEM LAG TO SEND FACTS TO AN END USER - A method for utilizing system lag to send facts to an end user. The method begins by monitoring a computer system to identify said system lag. After identifying system lag, the method determines an estimated length of the system lag, the estimated length being a measurement of time. The estimated length takes into account previously identified system lag lengths to better approximate the current system lag length. After determining the estimated length of the system lag, the method sends a fact to the end user during the system lag. The fact sent to the end user has a length equal to or less than the estimated length of the system lag. Finally, the method stores the actual length of the system lag in order to improve subsequent determinations of the estimated length. | 03-18-2010 |
20100097184 | METHOD AND APPARATUS FOR READING SHORT DISTANCE EMISSION RFID TAGS TO LOCATE ITEMS IN A CONTAINER - The present invention is directed to a method and apparatus for reading short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: initiating a reading sequence of a plurality of first RFID tags, wherein each first RFID tag is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in a vicinity of the first RFID tag; interrogating the plurality of second RFID tags to obtain the captured IDs; and determining a physical location of an item in the container based on the captured IDs. | 04-22-2010 |
20100097185 | RFID TAG POSITIONAL ADDRESSING - The present invention is directed to a method and apparatus for radio frequency identification (RFID) tag positional addressing. A method in accordance with an embodiment of the present invention includes: activating a plurality of first RFID tags, wherein each first RFID tag emits an identification (ID) and a position; capturing the IDs and positions emitted by the first RFID tags using a plurality of second RFID tags, wherein each second RFID tag captures the IDs and positions emitted by the first RFID tags located in a vicinity of the second RFID tag, and wherein each second RFID tag determines its physical location based on the captured IDs and positions; and sending a read command including a position of a targeted one of the second RFID tags that is to be read, wherein only the targeted second RFID tag located at the position in the read command responds to the read command. | 04-22-2010 |
20100097196 | METHOD AND APPARATUS FOR VISUALLY LOCATING SHORT DISTANCE EMISSION RFID TAGS TO LOCATE ITEMS IN A CONTAINER - The present invention is directed to a method and apparatus for visually locating short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: initiating a reading sequence of a plurality of first RFID tags, wherein each first RFID tag is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in the container, wherein each second RFID tag is coupled to a respective illumination source; addressing one of the first RFID tags; and activating the illumination source coupled to each second RFID tag that captured the ID of the addressed first RFID tag. | 04-22-2010 |
20100106417 | SYSTEM AND METHOD FOR IDENTIFYING A TRAJECTORY FOR EACH VEHICLE INVOLVED IN AN ACCIDENT - A method for identifying a trajectory for each vehicle involved in an accident. The method begins by plotting on a Cartesian Coordinate Plane GNSS locations corresponding to a vehicle involved in the accident. Next, the method identifies GNSS locations on the Cartesian Coordinate Plane where the vehicle was speeding. Next, the method marks those GNSS locations on the Cartesian Coordinate Plane where the vehicle involved in the accident was skidding. The process of plotting and identifying speeding as well as skidding is repeated for all vehicles involved in the accident. The Cartesian Coordinate plane then having all vehicle trajectories residing therein is sent to an output device. | 04-29-2010 |
20100109852 | EXPIRATION MANAGEMENT METHOD AND SYSTEM - An expiration management method and system. The method includes transmitting by an RFID tag reader within an enclosure, a plurality of continuous timing signals. The enclosure comprises a container comprising a product and an RFID tag. The RFID tag comprises data indicating a first state for the RFID tag and a first time period. The RFID tag reader receives the data and generates a first time stamp. The RFID tag reader transmits a first message commanding the RFID tag to enter a second state. The RFID tag reader transmits the first time stamp and generates a second time stamp. The RFID tag reader transmits the second time stamp. The RFID tag reader receives results from a comparing process performed by the RFID tag. The RFID tag reader performs a function indicating the results. | 05-06-2010 |
20100131478 | SYSTEM AND METHOD FOR LOADING A CALLED CLASS FILE TABLE WITH DATA INDICATING A HIGHEST VERSION OF A CLASS FILE - A system and a method for loading a called class file table with data indicating a highest version of a class file of a software application are provided. The method includes retrieving a first class version dependency file associated with a first class file, having both a first class name and a first version number associated with a second class file that is called by the first class file. The method further includes adding a first record to the called class file table having both the first class name and the first version number associated with a second class file, and retrieving a second class version dependency file associated with a third class file. The second class version dependency file has both a second class name and a second version number associated with a fourth class file called by the third class file. The method further includes if the second class name is identical to the first class name in the called class file table and the second version number is higher than the first version number, then updating the first record in the called class file table with the second class name and the second version number. | 05-27-2010 |
20100135331 | SYSTEM AND METHOD FOR SYNCHRONIZING COMMUNICATING ENTITIES IN A DECENTRALIZED NETWORK - A method for synchronizing communicating entities in a decentralized network. The method begins with a recipient entity receiving data comprising a first timestamp and a first distance. The first timestamp being the time the first data was broadcast; the first distance being a distance from the sender's synchronization time. Next the recipient entity receives data comprising a second timestamp and a second distance. The second timestamp being the time the second data was broadcast; the second distance being a distance from the sender's synchronization time. Based on the first and second timestamps and distances, the recipient entity calculates a new synchronization time. Next, the recipient entity broadcasts to at least one entity in the decentralized network data comprising a third timestamp and a third distance. The third timestamp being the time the third data was broadcast; the third distance being a distance from the recipient entity's synchronization time. | 06-03-2010 |
20100138657 | System and method for authenticating an end user - A method for authenticating an end user. The method starts by generating a first pattern in response to receiving an authentication request from the end user. Next, the method continues by generating a second pattern in response to receiving confirmation that the end user received the first pattern; the second pattern comprising multiple colored nodes. Then the method determines the authenticity status of the end user by comparing data sent by the end user with the second pattern. The end user having generated the data by overlaying a transparent credit card on top of the second pattern and selecting at least one node which displays a color other than black. Finally, the method sends the determined authenticity status to the end user via an output device. | 06-03-2010 |
20100138912 | System and method for authenticating an end user - A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device. | 06-03-2010 |
20100151840 | GENERATING ALERTS BASED ON PREDICTED WIRELESS CONNECTION LOSSES - A method and system for generating alerts based on predicted wireless connection losses. A message is received that includes a first position of a mobile device, an indication of a service being provided to the mobile device via a wireless connection provided by a first bearer, and an mobile device identifier. A direction and speed of the mobile device is received. An amount of time elapsing before the mobile device moves to a second position at which the mobile device experiences a loss of the wireless connection via the first bearer is predicted. An alert that indicates that the loss is occurring in the amount of time is generated. The alert is sent to the mobile device as a response to the message. | 06-17-2010 |
20100153001 | GENERATING OPTIMAL ITINERARIES BASED ON NETWORK CONNECTIVITY - A method and system for generating optimal itineraries based on network connectivity. A computer receives a first message from which a current position of a vehicle on a trip, destination, service(s) being provided to mobile device(s) in the vehicle, service provider(s) and network(s) are extracted. Optimal itineraries are generated by generating sets of optimal parameters that include paths for which connectivity measures satisfy predefined criteria and hops that indicate positions associated with connectivity changes. A response to the first message indicates the optimal itineraries and the associated sets of optimal parameters and is sent to a vehicle-based device. Sending the response results in the mobile device(s) making the connectivity changes when the vehicle is detected at the hops. | 06-17-2010 |
20100192004 | DATA INTEGRATION IN SERVICE ORIENTED ARCHITECTURES - A system, method and program product for transferring structured and unstructured data in a service oriented architecture (SOA) infrastructure. A method is disclosed that includes: receiving a request for a synchronization at a service orchestration engine (SOE), wherein the synchronization includes a transfer of structured meta-data from a first node to a second node and a transfer of unstructured file data from a first file node to a second file node; creating an entry in a routing table to track the synchronization; receiving the structured meta-data at the SOE from the first node and transferring the structured meta-data to the second node; and orchestrating a peer-to-peer data transfer from the first file node to the second file node, including communicating with file handling agents at the first and second file handling nodes. | 07-29-2010 |
20100199161 | System and computer program product for displaying and/or hiding a range of cells in an electronic spreadsheet - The present invention is directed to a method, system and program for displaying and/or hiding, in an electronic multi-dimensional spreadsheet on a user interface, elements of a range of cells, a range of cells having one or more contiguous elements aligned along a given spreadsheet dimension, an element of a range of cells having one or more cells along one or a plurality of spreadsheet dimensions. The method includes (A) detecting a command for hiding at least one element in a selected range of cells, the command comprising means for identifying the selected range of cells and means for identifying a display focus level selected among a plurality of ordered display focus levels defined for the selected range of cells; (B) identifying the selected range of cells in the element to hide; (C) identifying the selected display focus level; (D) identifying a table associated with the selected range of cells, the table associating each defined display focus level with at least one cell content criteria to apply to the content of the at least one cell; and (E) selectively displaying the element on the user interface based on the relationship of the selected display focus level with the display focus level associated with the element. | 08-05-2010 |
20110064383 | METHOD AND SYSTEM OF CIRCUMVENTING CONTENT FILTERS - A method, computer program, and system for enabling remanence-based advertisement that is not likely to be blocked by adblockers. A method of converting a master image, such as an advertisement or a logo, into a master video, according to an embodiment, includes: dividing the master image into a plurality of sub-images; generating a plurality of video frames defining a master video, the video frames having dimensions of the master image; and inserting the plurality of sub-images into the plurality of video frames, such that a playing of the master video defined by the video frames visually renders the master image. | 03-17-2011 |
20110112748 | SYSTEM AND METHOD FOR EXCHANGING POSITIONING INFORMATION BETWEEN VEHICLES IN ORDER TO ESTIMATE ROAD TRAFFIC - The present invention discloses a method, system and computer program embarked in a vehicle, for estimating traffic conditions based on positioning information exchanged with other vehicles using wireless communication. A method in accordance with an embodiment of the invention includes: receiving positioning information repeatedly broadcast by at least one vehicle, the positioning information for each vehicle including: information related to a current location of the vehicle; and information identifying the vehicle; calculating based on at least two successive locations of a same identified vehicle, a current speed and a current direction for the vehicle; and estimating current traffic conditions based on current location, speed and direction of identified vehicles. | 05-12-2011 |
20110127342 | NANO TIMER CONTROL SYSTEM - The invention provides a pressure controlled device and a system for managing the heating time of a pressure controlled device. The system includes a sensing device that allows the timing of a heating period for the pressure controlled device based on temperature and/or pressure values sensed inside the pressure controlled device. A RFID tag is coupled to the sensing device and is operable for generating timing information. The sensing device and the RFID tag are powered by a nano electromechanical (NEM) device that is operable by a source of pressurized air. | 06-02-2011 |
20110153901 | VIRTUAL USB KEY FOR BLADE SERVER - A system for sharing data contained on a peripheral device amongst a plurality of blade servers is disclosed. The system includes a memory device for storing the data contained on the peripheral device. The memory device is partitioned into memory areas. Each memory area stores one copy of the data. The system also includes a processor coupled to the memory device for assigning one of the memory areas to each blade server. The system also includes a switch controller coupled to the processor and to the plurality of blade servers for establishing communication between the plurality of blade servers and the plurality of assigned memory areas. | 06-23-2011 |
20110173241 | DATA INTEGRATION IN SERVICE ORIENTED ARCHITECTURES - A system, method and program product for transferring structured and unstructured data in a service oriented architecture (SOA) infrastructure. A method is disclosed that includes: receiving a request for a synchronization at a service orchestration engine (SOE), wherein the synchronization includes a transfer of structured meta-data from a first node to a second node and a transfer of unstructured file data from a first file node to a second file node; creating an entry in a routing table to track the synchronization; receiving the structured meta-data at the SOE from the first node and transferring the structured meta-data to the second node; and orchestrating a peer-to-peer data transfer from the first file node to the second file node, including communicating with file handling agents at the first and second file handling nodes. | 07-14-2011 |
20120059936 | MASTERLESS SLOT ALLOCATION - A masterless time slot allocation technique that collaboratively synchronizes, at a time slot level, devices communicating in an ad hoc network. Responsive to determining a current time slot allocated to a first device is occurring, the first device transmits a map to the other devices. The map includes an allocation of time slots to the devices, including indicators for whether each time slot is free, busy or overbooked, devices that own the time slots, and how recently information associated with each time slot was updated. After receiving the map, a second device determines a conflict in which the same time slot is allocated to the second device and to another device. The conflict is resolved by allocating another time slot to the second device and the result of resolving the conflict is each slot is allocated to no more than one device. | 03-08-2012 |
20120070279 | CYCLIC BLADE SPEED CONTROL APPARATUS AND METHOD - A blade speed control apparatus and method. The apparatus includes a rotor assembly a first blade assembly movably attached to the rotor assembly at a first initial position, a second blade assembly movably attached to the rotor assembly at a second initial position, and a movement mechanism configured to move the rotor assembly in a first lateral direction along a y-axis such that a first angle exists between the first blade assembly with said respect to the second blade assembly. The movement mechanism is configured to move a portion of the rotor assembly in a first lateral direction along a y-axis such that a first angle exists between the first blade assembly with said respect to the second blade assembly. The first angle does not comprise an angle of 180 degrees. | 03-22-2012 |
20120087582 | METHOD AND SYSTEM FOR RESIZING AN IMAGE - There is disclosed a method and system for resizing a digital image wherein a RGB image is converted into an YCbCr image (Y, Cb, Cr planes). Thereafter, a discrete cosine transform (DCT), followed by a specific inverse cosine transform (IDCT) is performed on each row/column of the Y, Cb, Cr planes. The mentioned specific operation corresponds to a type of homothetic matrix, which dimensions are defined by a scaling factor. In order to produce a scaled image, the scaled Y, Cb, Cr images are transformed to an RGB image for display. | 04-12-2012 |
20120096254 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR RETRIEVING DATA AT BOOT TIME - The invention provides a system for retrieving at boot time user data stored on a computer. The computer comprises a processor coupled through a system bus to I/O devices and to a system memory, the computer further having a basic input output system (BIOS) unit operatively coupled to the system bus for loading a computer operating system during a computer boot procedure, wherein the system memory being accessible to the computer operating system via the system bus. The system comprises a boot adapter for connecting the system bus to a boot bus, a boot memory coupled to the boot bus wherein the boot memory comprises storage locations for storing the predefined user data, and program code means coupled to the BIOS unit. The program code means are operative for loading a boot operating system during the computer boot procedure, the boot operating system having instructions for accessing the boot memory during the computer boot procedure. | 04-19-2012 |
20120127850 | BEST-PATH EVALUATION BASED ON RELIABILITY OF NETWORK INTERFACE LAYERS - A system and associated method for dynamic error dampening in a node in a network system. The node collects statistics of data traffic transferred through the node. The node has a link error MIB storing Error ratio and Reliability of interface of the node. When the Error ratio is too high, the node starts running a Layer 2 protocol for monitoring data traffic and calculates Penalty of the node. When Penalty is higher than predefined Suppress Threshold, the node deactivates Layer 3 link while the Layer 2 protocol still monitors the interface. Once the Penalty becomes lower than Reuse Threshold, the node reactivates the Layer 3 link that had been previously deactivated. When Penalty becomes zero (0), the node clears the Error ratio and stops the Layer 2 protocol for monitoring the data traffic. | 05-24-2012 |
20120204229 | METHOD AND SYSTEM FOR AUTHENTICATING AN END USER - A method and associated system for authenticating an end user. A selected subset of root nodes of a set of root nodes in a server mask is received, the selected subset of root nodes having been selected by the end user. In response to the receiving of the selected subset of root nodes, the end user is authenticated by determining that the spatial location in the server mask of each root node of the selected subset of root nodes matches a spatial position of a corresponding root node of a server set of transparent root nodes in the server mask, wherein the server set of transparent root nodes are a result of a first random selection of root nodes from the set of root nodes in the server mask. | 08-09-2012 |
20120204230 | AUTHENTICATION OF AN END USER - A method and System for authenticating an end user. A first pattern of colored quadrilaterals is generated. A second pattern of multiple colored nodes that include a first subset of nodes is generated. The first and second patterns are sent to the end user. If a transparent credit card is overlaid by the end user on top of the second pattern, then a second subset of nodes in the credit card would match in color and location the first subset of nodes. The authenticity status of the end user is determined by determining whether each node of a third subset of nodes within the second subset of nodes (i) corresponds to a unique node of the multiple colored nodes and (ii) has a color that matches a specific color in one quadrilateral of the colored quadrilaterals. The determined authenticity status is sent to the end user via an output device. | 08-09-2012 |
20120210411 | PROCESS FOR AUTHENTICATING AN END USER - A process for authenticating an end user. A first pattern of colored quadrilaterals is generated. A second pattern of multiple colored nodes that include a first subset of nodes is generated. The first and second patterns are sent to the end user. If a transparent credit card is overlaid by the end user on top of the second pattern, then a second subset of nodes in the credit card would match in color and location the first subset of nodes. The authenticity status of the end user is determined by determining whether each node of a third subset of nodes within the second subset of nodes (i) corresponds to a unique node of the multiple colored nodes and (ii) has a color that matches a specific color in one quadrilateral of the colored quadrilaterals. The determined authenticity status is sent to the end user via an output device. | 08-16-2012 |
20120218088 | LOCATION LOCALIZATION - A location localization method and system. The method includes transmitting by an RFID tag reader, a request for locating a passive RFID tag in a facility. The RFID tag reader receives from active RFID tags, a first date/time associated with first data. The RFID tag reader transmits to the active RFID tags, a request for retrieving the first data. The first data comprises distances between each active RFID tag and the passive RFID tag. The RFID tag reader receives the first data. The RFID tag reader receives a map of the facility and locations on the map for the active RFID tags. The RFID tag reader determines a location within the facility for the passive RFID tag based on the first data, the map, and the locations on the map. The RFID tag reader transmits the first location to a user. | 08-30-2012 |
20120242452 | USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H | 09-27-2012 |
20120254990 | AUTHENTICATION OF AN END USER - A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device. | 10-04-2012 |
20120257580 | COMMUNICATION WITH RECEIVING STATIONS ACCORDING TO THEIR GEOGRAPHICAL STATUS - A method for communicating with a receiving station and a system for implementing the method. The system includes the receiving station. A geographical area is divided into at least two geographical cells. Each cell is a unique geographical region within the geographical area. Each cell is associated with one and only one unique joining address of at least two joining addresses. A totality of joining addresses in a joining message consisting of the one and only one unique joining address to which each cell is associated. The joining message is an IP unicast message including the at least two joining addresses. | 10-11-2012 |
20120260153 | PERSISTENTLY SELF-REPLICATING MULTIPLE RANGES OF CELLS THROUGH A TABLE - The present invention includes a method and system for persistently self-replicating multiple ranges of cells through a copy-paste operation, in a multi dimensional spreadsheet. A set of ranges of cells is defined, wherein each range of cells has the same size. Each time the content of a range of cells belonging to this set is changed, a self-replication operation is performed automatically. The self-replication operation includes the steps of copying the changed range of cells onto a buffer; determining the set of ranges of cells to which the changed range of cells belongs; identifying the ranges of cells belonging to the set; and pasting the content of the buffer in each of the identified range of cells belonging to the set. | 10-11-2012 |
20120282090 | HYDRAULIC CYCLIC BLADE SPEED CONTROL APPARATUS AND METHOD - A hydraulic blade speed control apparatus and method. The apparatus includes a rotor assembly comprising a shaft; a first blade assembly pivotably attached to the shaft at a first initial position; a second blade assembly pivotably attached to the shaft assembly at a second initial position opposite to the first initial position; and a hydraulic movement mechanism. An initial angle of 180 degrees exists between the first blade assembly with said respect to the second blade assembly. The rotor assembly is configured to rotate the first blade assembly and the second blade assembly in a first direction and a second direction opposite to the first direction. The hydraulic movement mechanism is configured to pivotably move the first blade assembly in different angular positions with respect to the rotor assembly and the second blade assembly. | 11-08-2012 |
20120324188 | VIRTUAL USB KEY FOR BLADE SERVER - A method for sharing data contained on a peripheral device amongst a pluratlity of blade servers is disclosed. The method includes storing a copy of data from a peripheral device to a memory device. The memory device is partitioned into at least ‘n’ memory areas, each memory area storing one copy of the data. The method also includes assigning one of the at least ‘n’ memory areas to each of a plurality ‘n’ of servers. The method also includes establishing communication between the plurality of servers and the plurality of assigned memory areas via a switch controller. The switch controller is configured to access the plurality of assigned memory areas via a processor. | 12-20-2012 |
20120326872 | SECURING A LAND SURVEYOR'S MARK BASED ON USE OF A RADIO FREQUENCY IDENTIFIER TAG - A surveyor's mark and a method of forming the mark. A tag is embedded in a head. The head is removably assembled to a stick. The head is configured to be above a ground when the stick is planted in the ground. The head includes a tag. The tag in the head includes an identification number whose value identifies the tag and indicates if the head is disassembled from the stick. If the stick is planted in the ground and the head is above the ground, then pulling the head in an attempt to pull up the mark from the ground results in changing the value of the identification number in the tag from a first code value to a second code value that differs from the first code value. | 12-27-2012 |
20130048266 | AIR PRESSURE MEASUREMENT BASED COOLING - A cooling management system including component racks, a cooling system, pressure measurement devices, and a computing system within a structure. Each component rack includes an exothermic apparatus. The structure includes warm air aisle spaces and cold air aisle spaces located between the component racks. The cooling system feeds cold air into each cold air aisle space. The cold air flows through the component racks resulting in displacement of warm air from each exothermic apparatus. The warm air flows into the warm air aisle spaces and is directed back to the cooling system. The pressure measurement devices measure differential pressure values between the cold air aisle spaces and the warm air aisle spaces. The computing system monitors the differential pressure values, perform calculations associated with the differential pressure values, and control a fan speed of at least one fan within the cooling system based on the calculations. | 02-28-2013 |
20130124086 | GENERATING OPTIMAL ITINERARIES BASED ON NETWORK CONNECTIVITY - An approach for generating optimal itineraries based on network connectivity is presented. A computer receives a first message from which a current position of a vehicle on a trip, destination, a service being requested for a mobile device in the vehicle, service providers and network(s) are extracted. Network connectivity measures are retrieved and signal qualities in respective cells are determined based on the network connectivity measures. Based on the signal qualities, an itinerary is determined as paths and a hop indicating a position on one of the paths at which a connectivity change from a first to a second service provider is to occur. A response to the first message indicates the itinerary. Sending the response results in the mobile device making the connectivity change when the vehicle reaches the position indicated by the hop. | 05-16-2013 |
20130124087 | GENERATING OPTIMAL ITINERARIES BASED ON NETWORK CONNECTIVITY - An approach for generating optimal itineraries is presented. As a response to a first message sent to a remote computer system by a global positioning device transported by a vehicle on a trip, the device receives a second message indicating optimal itineraries of the trip. The device receives a selection of an optimal itinerary indicating a path, a hop, an updated service provider to provide a service to a mobile device transported by the vehicle, and an updated network for providing the service. The device detects the vehicle at a position indicated by the hop, and in response, generates a third message indicating the updated service provider and the updated network. The global positioning device sends the third message to the mobile device and as a result, the mobile device makes a connectivity change to the updated service provider and/or to the updated network. | 05-16-2013 |
20130144886 | METHOD FOR MANAGING EMAIL - This disclosure includes method for managing email that includes providing a list of topics, a reference associated with the topics, and a defined importance value for each reference. The method also includes preparing a topic relevance algorithm for each topic, each topic having associated attributes, and each topic relevance algorithm formed by estimating a relationship value between a topic and its associated attributes based on defined relevance of reference. The method further includes preparing an importance algorithm having a weighted importance attributes formed by estimating a weight for each of the importance attributes based on defined importance of the reference, assessing a target mail using the topic relevance algorithms to determine a topic relevance and against the importance algorithm to determine an importance and determining that a target mail has a threshold importance for a particular topic relevance. | 06-06-2013 |
20130176842 | DYNAMIC ERROR DAMPENING IN A NETWORK SYSTEM - A method and computer system for dynamic error dampening in a node of a network system. Data traffic of the node is implemented in accordance with an Open Systems Interconnection (OSI) network management model that includes a Layer 1 physical link, a Layer 2 link including a data link in which primitive point-to-point data communication with neighboring nodes is enabled upon the Layer 1 physical link, and a Layer 3 link which is a network link operating on top of the Layer 2 link. Implementation of an error dampening process at the node includes deactivating the Layer 3 link of the node while monitoring data traffic over the Layer 2 link of the node. Deactivating the Layer 3 link of the node includes preventing the Layer 3 Link of the node from receiving incoming data traffic for routing to other nodes in the network system. | 07-11-2013 |
20130230166 | USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for generating data for use in generating an authenticity certificate. A request is received for a step certificate that authenticates an involvement of the requester entity about an object. The request includes a media identifier, a media key block, an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted using a random key. The encrypted step certificate and an encrypted random key are sent to the requester entity for subsequent writing the step certificate and the encrypted random key on a media. | 09-05-2013 |
20130230167 | USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for ascertaining an object status of an object associated to an authenticity certificate. A first hashing result of an object identifier encoded within a decrypted first encrypted step certificate is extracted. A second hashing result is obtained from hashing the object to be authenticated. A third hashing result of an object identifier encoded within a decrypted second encrypted step certificate is extracted. A fourth hashing result is obtained from hashing the object to be authenticated. It is determining that the first hashing result is equal to the second hashing result and that the third hashing result is equal to the fourth hashing result, from which it is ascertained the object status of the object is that the object is an authentic object, a counterfeited object, or a stolen object. The ascertained object status is displayed on a screen of an authenticity verification equipment. | 09-05-2013 |
20130254863 | AUTHENTICATION OF AN END USER - A method and system for authenticating access of secure information by a user device. An authentication request for accessing the secure information is received, the authentication request including a user identifier of a user at the user device. A position of a secret quadrilateral within a first pattern of colored quadrilaterals is determined and is identifiable by the user identifier; the secret quadrilateral includes an authenticating color. The first pattern of colored quadrilaterals including the secret quadrilateral is generated. A second pattern including colored nodes that include the authenticating color at positions within a transparent authenticating card assigned to the user. The first pattern and the second pattern are sent to the user. Location information from the user device is received. It is determined that the subset of nodes that include the authenticating color, which allows access to the secure information by the user device. | 09-26-2013 |
20130262318 | METHOD AND SYSTEM FOR PERFORMING A COMMERCIAL TRANSACTION BY USING A SHORT MESSAGE SERVICE TERMINAL - Method for performing a commercial transaction wherein a customer having a computer connected to a public network such as the Internet network and a SMS terminal is able to receive and send SMS messages over a telephone network and can order an article by using the computer to a commercial server connected to the public network. | 10-03-2013 |
20140040140 | AUTHENTICATION OF AN END USER - A method, system, and computer program product for authenticating an end user. A login field is generated and sent to an end user, and a set of nodes is subsequently received from the end user. The login field includes first colored nodes having multiple colors distributed in a first random pattern. A transparent credit card controlled by the end user includes second colored nodes having multiple colors distributed in a second random pattern. An authenticity status of the end user is determined, and then sent to the end user, by determining whether each node of the set of nodes (i) corresponds to a unique node of the first colored nodes and (ii) has a same color determined by a function of a static integer and a dynamic integer D, wherein S and D are known only to the end user and the provider of the transparent credit card. | 02-06-2014 |
20140248830 | AIR PRESSURE MEASUREMENT BASED COOLING - A cooling management system including component racks, a cooling system, pressure measurement devices, and a computing system within a structure. Each component rack includes an exothermic apparatus. The structure includes warm air aisle spaces and cold air aisle spaces located between the component racks. The cooling system feeds cold air into each cold air aisle space. The cold air flows through the component racks resulting in displacement of warm air from each exothermic apparatus. The warm air flows into the warm air aisle spaces and is directed back to the cooling system. The pressure measurement devices measure differential pressure values between the cold air aisle spaces and the warm air aisle spaces. The computing system monitors the differential pressure values, perform calculations associated with the differential pressure values, and control a fan speed of at least one fan within the cooling system based on the calculations. | 09-04-2014 |
20140289600 | MANIPULATING OF LABELLED DATA FOR DATA ENTRY IN MANAGEMENT APPLICATIONS - A method and system for entry of data into content of cells belonging to an output field. Entered into cells of a multidimensional table located within a header record in the table are: input field labels respectively corresponding to input fields in the table entered into a respective unique cell within the header record; and an output label corresponding to the output field entered into a specifically unique cell within the header record and expressed as a mathematical expression of input field labels. The mathematical expressions are translated into the cell address of the cell containing each input field label and then pasted in each cell of the output field. The cell address of the cell containing each input field label is replaced in the pasted mathematical expression by the corresponding cell address of each input field in the same record that contains each cell of the output field. | 09-25-2014 |
20140309962 | ANALYSIS OF PEDESTRIAN CONGESTION - A method, system and computer program product are disclosed for providing a measure of pedestrian congestion in a given area. In one embodiment, the method comprises collecting data from a pedestrian moving in the area, and using the data to determine one or more specified parameters representing a pattern of movement of the pedestrian in the area. These specified parameters are used to determine a sinuosity of pedestrian traffic in the given area. In one embodiment, the pattern of movement is a walking pattern of the pedestrian, and the data collected from the pedestrian identifies a multitude of positions of the pedestrian's feet. In an embodiment, the specified parameters include a lateral gap between the feet of the pedestrian, and a length of a stride of the pedestrian. A sequence of values may be collected for each of these parameters. | 10-16-2014 |
20140330728 | METHOD AND SYSTEM FOR PERFORMING A COMMERCIAL TRANSACTION BY USING A SHORT MESSAGE SERVICE TERMINAL - Method for performing a commercial transaction wherein a customer having a computer connected to a public network such as the Internet network and a SMS terminal is able to receive and send SMS messages over a telephone network and can order an article by using the computer to a commercial server connected to the public network. | 11-06-2014 |
20140380301 | LAUNCHING A TARGET APPLICATION BASED ON CHARACTERISTICS OF A STRING OF CHARACTERS IN A SOURCE APPLICATION - A method and system for launching a target application. A predefined data type is identified by: determining that a first row of a parser table including a first regular expression formulating a string of characters includes rows ordered from a more general to a more specific regular expression; setting a first regular expression as a regular expression matching the string; resetting the regular expression with a second regular expression, of a next row of the parser table, that formulates the string more specifically than the first regular expression; and selecting the predefined data type in the row of the regular expression as the predefined data type of the string, upon performing the resetting for all rows of the parser table. The target application previously associated with a combination of the identified data type and a source application containing the string is identified and launched with the string as a parameter. | 12-25-2014 |
20150058635 | GENERATING AND PROCESSING AN AUTHENTICATION CERTIFICATE - A method and system for generating and processing an authenticity certificate. A request for a step certificate is received from a requester entity. The step certificate authenticates an involvement of the requester entity about an object. The request includes an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created and includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted. The encrypted step certificate is sent to the requester entity for subsequently storing the step certificate on a media. | 02-26-2015 |
20150082202 | UTILIZATION OF AN INSTANT MESSAGING ENVIRONMENT - A method and system for utilizing an instant messaging environment. An instant messaging client is created in association with each respective end user of at least two end users. Each instant messaging client in association with its respective end user includes at least two zones. Each zone corresponds exclusively to a unique end user. Each zone of the at includes at least two textboxes contiguously distributed within each zone. The at least two zones of each instant messaging client is configured to include a write-only zone specific to the respective end user and a read-only zone specific to each end user of all other end users exclusive of the respective end user. Each instant messaging client is provided to each respective end user of the at least two end users. | 03-19-2015 |