Patent application number | Description | Published |
20090323926 | METHODS AND SYSTEMS FOR VOICE COMMUNICATION - An intermediary communication system, the intermediary communication including: (a) a first network interface, configured for transmitting over a first network connection to a first remote end unit a first sound sequence; and for receiving from the first remote end unit a returning sound sequence that is responsive to the first sound sequence; (b) a processor, configured to determine an echo reduction parameter in response to a relationship between a first sound sequence parameter and a returning sound sequence parameter; and (c) a second network interface, for transmitting to a second remote end unit, over a second network connection, a processed sound sequence that was generated in response to the echo reduction parameter from a preprocessed sound sequence which was generated by the first remote end unit. | 12-31-2009 |
20100002685 | METHOD AND SYSTEM FOR PROVIDING COMMUNICATION - A communication system, the system including: (i) a first network interface for communicating with a remote system over a network, wherein the first network interface is configured to: (a) receive a conversation initiation request generated in response to an interaction with a conversation trigger that is included in a web page that is displayed at a remote system; wherein the conversation initiation request includes context metadata that pertains to content of the web-page; and (b) provide to the remote system a communication widget that is configured in response to the context metadata; and (ii) a management unit, configured to initiate a communication session between the communication widget and a recipient, for transmitting conversation signals between the remote system and the recipient. | 01-07-2010 |
20140006929 | TECHNIQUES FOR PROVIDING A USER INTERFACE HAVING BI-DIRECTIONAL WRITING TOOLS | 01-02-2014 |
Patent application number | Description | Published |
20090184479 | Clamping Tool - A clamping tool includes a holder, a connector and a tool. The holder has a rearwardly tapering bore and a holder thread having a first pitch. The connector has a cylindrical shape and a connector through bore. The connector further has a first connector thread having a pitch similar to the first pitch, and a second connector thread having a second pitch that is different from the first pitch. The tool has a rearwardly tapering rear portion and a tool thread having a pitch similar to the second pitch. In an assembled position, the rearwardly tapering rear portion of the tool abuts the rearwardly tapering bore of the holder, the holder thread is threadingly engaged with the first connector thread, and the tool thread is threadingly engaged with the second connector thread. | 07-23-2009 |
20100189520 | Cutting Tool Having a Clamping Mechanism - A clamping mechanism includes a male portion and a female portion. The male portion has a forwardly extending locking protrusion, and an alignment protrusion extending forwardly of the locking protrusion. A rear of the female portion has a forwardly extending locking bore and an alignment bore extending forwardly from a front end of the locking bore. The locking bore has an insertion bore portion which merges with a gripping bore portion. The insertion bore portion has an insertion bore axis while the gripping bore portion has a gripping bore axis that is spaced apart by a non-zero first distance from the insertion bore axis. In a clamped position, the alignment protrusion abuts a portion of the alignment bore and the locking protrusion abuts the gripping bore portion along a gripping angular extension, thereby forming a circumferential interference fit. | 07-29-2010 |
20100270756 | Rotary cutting tool - A chuck for clamping an article has a receiving portion including a receiving bore having a longitudinal axis L, and a radially inwardly facing contoured clamping and receiving inner surface. A clamping sleeve is accommodated in the receiving bore and is rotatable between a releasing position and a securing position. The contoured clamping and receiving surface has one or more clamping segments, each clamping segment having a ramp between a trough and a crest, a second ramp between the crest and a depression, and a third ramp between the depression and the succeeding stop ridge. Rotating the clamping sleeve within the receiving bore causes one or more rollers associated with each clamping segment to cooperate with the contoured clamping surface to effect the releasing and the securing of the article. | 10-28-2010 |
20110064529 | Cutting Tool and Holder - A cutting tool has a cutting insert and a holder. The cutting insert has a cutting portion and an insert shank with a cylindrical portion and a non-cylindrical portion. The holder has a clamping portion which has a clamping sleeve and a cage located therein. The cage includes a load member housing with a load member. The cage has a major abutment wall connected to a minor abutment wall. The clamping sleeve has first and second inner sections defined by points P | 03-17-2011 |
20110194907 | Tool Clamping Mechanism - A tool clamping mechanism connects a first member to a second member. The first member has a cylindrical stem with a coupling tooth projecting from the stem. The second member has a clamping cavity formed by the union of a gripping bore and an access hole. The access hole has an access bore and a tooth access hole formed to accommodate the stem and the coupling tooth respectively. The stem diameter of the stem is larger than the gripping bore diameter of the gripping bore. The clamping cavity further has a coupling recess for accommodating the coupling tooth. The coupling recess has a drive surface for engaging a driven surface located on the coupling tooth to create a force which pushes the stem from the access bore into the gripping bore and helps prevent separation of the two members. | 08-11-2011 |
20110248456 | Collet Having Angled Seal Bores - A collet has seal bores formed in interspaces of the collet. The seal bores are oriented at an acute angle α to the longitudinal axis of the collet, and extend towards a tool end of the collet, from a clamping surface of the collet to a collet peripheral surface. Adjacent the clamping bore, the collet has stopping surfaces for accurately locating the seals. When inserted into the seal bores, the seals prevent fluid leakage between the clamping bore surface and the peripheral surface of the collet. | 10-13-2011 |
20120099938 | Cutting Tool and Coupling Mechanism Therefor - A cutting tool having a cutting head removably secured to a shank by frictional forces maintained between a male coupling member located in a female coupling member. Support surfaces of the male coupling member engage support walls of the female coupling member. The support surfaces lie on a common cylinder having a larger diameter than a common cylinder on which the support walls lie. The support walls are located on a circumferentially continuous bore wall of the female coupling member. | 04-26-2012 |
20120148353 | Cutting Tool and Holder - A cutting tool has a cutting insert and a holder. The cutting insert has a cutting portion and an insert shank with a cylindrical portion and a non-cylindrical portion. The holder has a clamping portion which has a clamping sleeve and a cage located therein. The cage includes a load member housing with a load member. The cage has a major abutment wall adjacent to a minor abutment wall. The clamping sleeve has first and second inner sections defined by points P | 06-14-2012 |
20130309035 | Milling Collet Having Pull-Out Preventer for Retaining a Fluted Milling Tool - A pull-out preventer and milling collet that includes the pull-out preventer. The pull-out preventer is configured to prevent axial migration of a fluted milling tool out of the milling collet. The milling collet includes a through-hole extending from a rear-end aperture to an opposing cutting-end aperture of a basic body thereof. The pull-out preventer is located at the cutting-end aperture of the basic body. | 11-21-2013 |
20140054866 | Cutting Tool Lock Nut Having Grooved Collet-Locking Surface and Cutting Tool Incorporating Same - A cutting tool includes a chuck, a compressible conical collet and a lock nut for locking the collet. The cutting tool lock nut has a nut portion with a threaded portion for threading with the chuck, and a locking portion with a collet-locking surface formed with angled coolant grooves thereon. The collet-locking surface presses on the collet head, thereby compressing it to grip a tool shank in a collet bore thereof. As the locking portion presses only against a peripheral surface of the collet head, the lock nut is suitable for locking collets with different bore diameters. When the chuck is provided with a coolant fluid, the coolant fluid flows through the chuck and through the collet towards the locking portion, passing through the coolant notches between the locking portion and the collet head, and sprayed towards a location along the tool shank. | 02-27-2014 |
20140321928 | Cutting Tool Having A Tool Coupling With Offset Peripheral And Central Coupling Threads And Method Of Assembly Thereof - A cutting tool includes first and second components, configured for differential coupling with each other. The first and second components each include peripheral and central coupling threads which each extend in a helical direction about a component axis of the respective component. Each component's peripheral and central coupling threads are axially offset with respect to each other. The first and second components each include a radial stop surface located at the respective peripheral coupling thread. In an assembled position of the cutting tool, the radial stop surfaces abut each other and the peripheral and central coupling threads of the first component threadingly engage the peripheral and central coupling threads of the second component, respectively, forming a differential tool coupling between the first and second components. | 10-30-2014 |
Patent application number | Description | Published |
20120266247 | Automatic Inference Of Whitelist-Based Validation As Part Of Static Analysis For Security - A method includes performing taint analysis of a computer program and determining an original set of paths from sources to sinks. Each path corresponds to a vulnerability. The method includes determining for each variable whose type is a collection and is accessed in one of the paths in the original set of paths whether the variable points to a concrete value whose internal state is not tainted according to the taint analysis. The method further includes, for each of the variables whose type is a collection found not to be tainted according to the taint analysis, determining all points in the computer program where a membership check against the collection is performed. The method also includes, for each of the points, determining corresponding paths and removing those paths from the original set of paths to create a reduced set of paths. Apparatus and computer readable program products are also disclosed. | 10-18-2012 |
20130174260 | TARGETED SECURITY TESTING - Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the static analysis. A page not including a potential vulnerability is identified based on the static analysis. The web page including the potential vulnerability is dynamically analyzed using a set of test payloads. The page not including the potential vulnerability is dynamically analyzed using a subset of the set of test payloads, the subset including fewer test payloads than the set of test payloads. | 07-04-2013 |
20130174262 | TARGETED SECURITY TESTING - Source code of a plurality of web pages including script code is statically analyzed. A page including a potential vulnerability is identified based on the static analysis. A page not including a potential vulnerability is identified based on the static analysis. The web page including the potential vulnerability is dynamically analyzed using a set of test payloads. The page not including the potential vulnerability is dynamically analyzed using a subset of the set of test payloads, the subset including fewer test payloads than the set of test payloads. | 07-04-2013 |
20140075560 | AUTOMATIC CLASSIFICATION OF SECURITY VULNERABILITIES IN COMPUTER SOFTWARE APPLICATIONS - Automatically classifying security vulnerabilities in computer software applications by identifying candidate security vulnerabilities in a learning set including at least a first computer software application, classifying each of the candidate security vulnerabilities using predefined classifications, determining, for each of the candidate security vulnerabilities, values for predefined properties, creating a set of correlations between the property values and the classifications of the candidate security vulnerabilities, identifying a candidate security vulnerability in a second computer software application, determining, for the candidate security vulnerability in the second computer software application, values for the predefined properties, and using the set of correlations to classify the candidate security vulnerability in the second computer software application with a classification from the predefined classifications that best correlates with the property values of the candidate security vulnerability in the second computer software application. | 03-13-2014 |
20140157406 | APPLICATION TESTING SYSTEM AND METHOD - A method, computer program product, and computer system for sending, by a first computing device, a payload from a plurality of payloads to a second computing device. A response from the second computing device responding to the payload is received at the first computing device. It is determined whether the payload has successfully attacked an application executing at the second computing device based upon, at least in part, the response. If not, at least a portion of the plurality of payloads that shares a structural overlap with the first payload is identified. At least a second payload of the portion is prevented from being sent to the second computing device in response to identifying that the second payload shares the structural overlap with the first payload. | 06-05-2014 |
20140157413 | APPLICATION TESTING SYSTEM AND METHOD - A method, computer program product, and computer system for sending, by a first computing device, a payload from a plurality of payloads to a second computing device. A response from the second computing device responding to the payload is received at the first computing device. It is determined whether the payload has successfully attacked an application executing at the second computing device based upon, at least in part, the response. If not, at least a portion of the plurality of payloads that shares a structural overlap with the first payload is identified. At least a second payload of the portion is prevented from being sent to the second computing device in response to identifying that the second payload shares the structural overlap with the first payload. | 06-05-2014 |
Patent application number | Description | Published |
20100077325 | In Situ Editing of GUI Features - A graphical user interface development system offers a development module that displays GUI elements in an editing window. Respective attribute definition interfaces are provided exclusively within the window that enable in situ editing of attributes of the GUI elements, for example, in-line textual editing and toggling of Boolean attributes. Operator inputs are received via the attribute definition interfaces and attributes of corresponding GUI elements are modified in response to the inputs. | 03-25-2010 |
20100106547 | Automated workflow generation - A computer-implemented method for generating a workflow includes receiving via an interactive user interface operator input that defines a first document that is to be filled in by a user and comprises a decision component. A first state of the workflow corresponding to the first document and a transition associated with actuation of the decision component are automatically defined. A second document that is to be presented upon user selection of the decision component in the first document is generated, and a second state of the workflow that corresponds to the second document and is linked to the first state by the transition is generated. In response to the first and second documents and the decision component, software code that corresponds to the workflow is produced for use in a workflow engine. | 04-29-2010 |
20120117117 | AIDING REPORT CONSTRUCTION BASED ON INFERENCE OF IMPLICIT APPLICATION LEVEL RELATIONSHIPS - A method of aiding report construction based on inference of implicit application level relationships is provided herein. The method may include the following steps: analyzing a model of a software application to yield data elements associated with base objects of the software application and relationships between the data elements; generating a list of reportable objects comprising the base objects and objects associated with the data elements and their relationships; ordering the reportable objects based on at least one of: content and usage of the reportable objects, to yield an ordered list; and presenting the ordered list in a form usable for building a report on the software application, wherein at least one of: the analyzing, the generating, the ordering, and the presenting, is carried out by at least one processor. | 05-10-2012 |
20140129974 | PASSWORD PRESENTATION MANAGEMENT - According to some embodiments of the present invention, there is provided a method for revealing at least a portion of a disguised password on a display device. The method comprises receiving a plurality of password characters typed by a user, presenting a plurality of replacement symbols in a password field displayed by a display device of a terminal having a touch surface, each the replacement symbol being indicative of the reception of another of the plurality of password characters, detecting a fingertip which slides contiguously against the touch surface, and temporarily replacing the presentation of at least some of the plurality of replacement symbols with of the presentation of at least some of the plurality of password characters in a sequential manner correspondingly with a movement of the fingertip. | 05-08-2014 |
Patent application number | Description | Published |
20140059271 | FAST EXECUTION OF FLUSH COMMANDS USING ADAPTIVE COMPACTION RATIO - A method includes receiving one or more storage commands and at least one flush command in a storage device, which includes a non-volatile memory and a volatile buffer for buffering data received for storage in the non-volatile memory. The flush command instructs the storage device to commit the data buffered in the volatile buffer to the non-volatile memory. The storage commands are executed in accordance with a first storage rule. The flush command is executed in accordance with a second storage rule having smaller latency relative to the first storage rule. | 02-27-2014 |
20140095765 | FLASH TRANSLATION LAYER (FTL) DATABASE JOURNALING SCHEMES - A method includes, in a storage device that includes a non-volatile memory and a volatile memory, maintaining at least one data structure that stores management information used for managing data storage in the non-volatile memory, such that at least a portion of the data structure is stored in the volatile memory. A sequence of journaling chunks is created during operation of the storage device, each journaling chunk including a respective slice of the data structure and one or more changes that occurred in the data structure since a previous journaling chunk in the sequence. The sequence of the journaling chunks is stored in the non-volatile memory. Upon recovering from an electrical power interruption in the storage device, the data structure is reconstructed using the stored journaling chunks. | 04-03-2014 |
20140213280 | Sharing Location Information Among Devices - Methods, systems, apparatus, and computer program products that include, on a first device executing a first instance of a location application, receiving an indication to begin sharing data describing a path traveled by the first device, receiving location data describing the path traveled by the first device, the location data received from a location system of the first device, and the location data including a plurality of locations of the first device, and transmitting the location data in a form usable to enable a user interface of a second instance of a location application executing on a second device to indicate the path traveled by the first device. | 07-31-2014 |