Patent application number | Description | Published |
20090111583 | SYSTEMS AND METHOD FOR IMPROVING APPLICATION INTEGRITY - Methods, apparatuses, and techniques for improving an integrity of an online game include engaging in an online game session by a tester. The tester observing unexpected operation of the online game and pressing a triggering mechanism in response to the unexpected operation. Then capturing a time-based history of the online game session, and communicating the time-based history to a network entity where it is determined if the online game operation malfunctioned. | 04-30-2009 |
20090310617 | Data Distribution by Proxy - A communication device communicates with an originating device during an originating session and receives originating data from the originating device over a wireless communication link and then communicates with a receiving device during a receiving session and sends the originating data to the receiving device over a wireless communication link, such that the originating session and the receiving session occur at different times, and at least one of the sessions is an ad hoc communication session. | 12-17-2009 |
20100306038 | Rewarding Initial Purchasers of Digital Media - Rewarding a first classification of purchasers of digital media is provided. Such a classification may include initial purchasers (e.g., purchasers of new items) and secondary purchasers (e.g., purchasers of previously used items). A digital medium is played on a digital device and a notification is sent to a server. The server identifies the user of the digital device based on a unique device identifier associated with the digital device and a stored association of that digital device with the user. The user is determined to belong to the first classification of purchasers of the digital medium based on a unique identifier associated with the digital medium. The user, belonging to the first classification of purchasers, is provided with access to a reward that is not generally accessible to users belonging to a second classification. Users that are identified as belonging to the second classification may be offered a chance to upgrade their classification and access the reward. | 12-02-2010 |
20110016079 | Summarizing a Body of Media - Bodies of media may be summarized in various ways depending on numerous factors, thus resulting in summaries that are tailored to particular desires of consumers. An instruction may be received to provide a summary of at least a portion of the body of media. Software stored in memory may then be executed by a processor to determine one or more factors for providing the summary. The summary may be selected, based on the one or more factors, from a plurality of available summaries stored in memory. The plurality of available summaries corresponds to the at least a portion of the body of media. Finally, the selected summary may be provided to a consumer via an output device. | 01-20-2011 |
20110016182 | Managing Gifts of Digital Media - An individual may wish to make a gift of digital media to a designated recipient. The digital media may be previously purchased by the individual or may be new, unused digital media purchased specifically as a gift for the recipient. The sender of the gift sends a gift notification. The sender is then verified to ensure that the sender is authorized to make the gift by matching an identifier of the digital media with an identifier associated with the sender. The digital media may be associated with a set of rights and privileges. Further rights and privileges associated with the digital media may be offered to the recipient. | 01-20-2011 |
20110314560 | SHARING AND LENDING OF DIGITAL CONTENT - An individual may wish to make a gift of digital media to a designated recipient. The digital media may be previously purchased by the individual or may be new, unused digital media purchased specifically as a gift for the recipient. The sender of the gift sends a gift notification. The sender is then verified to ensure that the sender is authorized to make the gift by matching an identifier of the digital media with an identifier associated with the sender. The digital media may be associated with a set of rights and privileges. Further rights and privileges associated with the digital media may be offered to the recipient. | 12-22-2011 |
20120075488 | SYSTEM AND METHDOD FOR CAPTURING AND DISPLAYING STILL PHOTO AND VIDEO CONTENT - Still images can be captured during capture of video frames at different resolutions. Still image data and video data at different resolutions and in different data formats can be combined into a single file and stored in a memory. Storing the video data and still image data in a single file simplifies the process of displaying video in conjunction with display of representative still images. | 03-29-2012 |
20130218827 | SUMMARIZING A BODY OF MEDIA BY ASSEMBLING SELECTED SUMMARIES - Bodies of media may be summarized in various ways depending on numerous factors, thus resulting in summaries that are tailored to particular desires of consumers. An instruction may be received to provide a summary of at least a portion of the body of media. Software stored in memory may then be executed by a processor to determine one or more factors for providing the summary. The summary may be selected, based on the one or more factors, from a plurality of available summaries stored in memory. The plurality of available summaries corresponds to the at least a portion of the body of media. Finally, the selected summary may be provided to a consumer via an output device. | 08-22-2013 |
Patent application number | Description | Published |
20090191951 | Validation of Network Devices - A system and method for actively validating a network device is provided. Nodes in a network game community are prompted to engage in interrogation and response to facilitate the identification of nodes operating with hacked, modified and non-typical game configurations. In one embodiment, a query is presented to a user's machine which triggers a response, and where the response indicates whether certain data at the user is valid and wherein invalid data is suggestive of illegal community behavior. Functions are triggered and data is queried to determine whether the state of game environment is operating according to known metrics or constraints. Various queries to test user integrity include memory peeks, confirmation of location of functions in memory, memory hashing, profiling of threads operating on the user machine, and combinations thereof. Queries may be actively initiated by a server, peer, peer group or combinations thereof and may be scheduled on a routine basis, triggered in response to passive listening, and via collaborating users who suspect cheat activity. | 07-30-2009 |
20100309897 | NETWORK PARTICIPANT STATUS EVALUATION - Methods and apparatus for obtaining and providing status information for network devices. In one implementation, a wireless device includes: an antenna; a wireless communication interface connected to said antenna and supporting wireless communication across a wireless connection provided by said antenna; a memory supporting storing data; and a controller connected to said wireless interface and to said memory, supporting an application service and a network evaluation service; wherein said application service provides execution and management of one or more application programs accessible by said controller using application data stored in said memory, said network evaluation service provides evaluation of status information of other devices available for wireless communication through said wireless interface and provides status information of the wireless device to another device upon request, and status information provided by said network evaluation service includes information indicating at least one application program for which application data is stored in said memory. | 12-09-2010 |
20110269547 | Maintaining Community Integrity - Various metrics as may be deployed in an active, passive, or hybrid validation architecture are disclosed. A computing device configured to monitor network game activity may identify an inconsistency between user game data and a particular game metric governing a particular aspect of the network gaming environment. Upon identification of an inconsistency between game data and a game metric, which may indicative of illicit game play, a validation process (e.g., active, passive, and/or hybrid) may be implemented to further confirm the existence of illicit game. Alternatively, an action to maintain integrity of the gaming community may be executed without further confirmation whereby a purportedly illicit game device may be ejected from the network. | 11-03-2011 |
20120088585 | VALIDATION OF NETWORK DEVICES - A system and method for actively validating a network device is provided. Nodes in a network game community are prompted to engage in interrogation and response to facilitate the identification of nodes operating with hacked, modified and non-typical game configurations. In one embodiment, a query is presented to a user's machine which triggers a response, and where the response indicates whether certain data at the user is valid and wherein invalid data is suggestive of illegal community behavior. Functions are triggered and data is queried to determine whether the state of game environment is operating according to known metrics or constraints. | 04-12-2012 |
20140100027 | MANAGING GAME METRICS AND AUTHORIZATIONS - Various metrics as may be deployed in an active, passive, or hybrid validation architecture are disclosed. A computing device configured to monitor network game activity may identify an inconsistency between user game data and a particular game metric governing a particular aspect of the network gaming environment. Upon identification of an inconsistency between game data and a game metric, which may indicative of illicit game play, a validation process (e.g., active, passive, and/or hybrid) may be implemented to further confirm the existence of illicit game. Alternatively, an action to maintain integrity of the gaming community may be executed without further confirmation whereby a purportedly illicit game device may be ejected from the network. | 04-10-2014 |
20140187316 | DEFINING NEW RULES FOR VALIDATION OF NETWORK DEVICES - A system and method for actively validating a network device is provided. Nodes in a network game community are prompted to engage in interrogation and response to facilitate the identification of nodes operating with hacked, modified and non-typical game configurations. In one embodiment, a query is presented to a user's machine which triggers a response, and where the response indicates whether certain data at the user is valid and wherein invalid data is suggestive of illegal community behavior. Functions are triggered and data is queried to determine whether the state of game environment is operating according to known metrics or constraints. | 07-03-2014 |
20140309024 | INVALIDATING NETWORK DEVICES WITH ILLICIT PERIPHERALS - A system and method for passively validating network game users is provided. Data indicative of game behavior and actions at one or more nodes interacting with a network game in a network game community are monitored. The data is evaluated to determine whether the one or more nodes are adhering to one or more rules associated with the network game. Data indicative of illicit game behavior may trigger various responses including invalidation of the node engaged in the illicit behavior. Alternatively, a query may be generated to further identify the nature and/or actual existence of illicit behavior at the node. Monitoring of game data may occur at a server, a peer, as part of a peer group or combinations thereof, which may be based on routine schedule or part of constant game behavior monitoring. | 10-16-2014 |
Patent application number | Description | Published |
20090075737 | Tracking, Correlating, and Processing Multi-User Online Sessions - Scheduling an online session including: determining desired time slots for an online session; determining potential users to participate in the online session; sending invitations to the potential users; receiving responses to the invitations thereby identifying participants for the online session; and entering the online session into the calendars of the participants of the online session. | 03-19-2009 |
20090094370 | Seamless Host Migration Based on NAT Type - Systems and methods of the present invention for maintaining network data distribution are provided. Network data may be distributed in such as manner as to allow a network session to weather interrupted communications between host and clients without significant loss of data. Embodiments of the present invention provide for one or more clients to serve as backup host(s) for the network session, such determinations including the use of NAT profile information. When the other clients transmit data to the host, they may also transmit the data to one or more backup hosts if there are any indications of interrupted communication. | 04-09-2009 |
20100312796 | Systems and Methods for Server Management - Exemplary systems and methods for server management are provided. An exemplary system comprises a plurality of servers, with each server having the ability to access a database or, in some embodiments, be configured to perform a calculation, computation or make a determination of a particular value, values or other information. A communications network delivers queries to each server whereby a look-up table directs query processing by the servers. Further embodiments of the system feature a program logic controller for rebalancing the workload of the network servers. Exemplary methods of processing queries on the system comprise submitting a query to the network, communicating the query to each server in the network and each server looking-up on a look-up table the processing responsibilities of the servers in the network. The query is processed by the server having primary responsibility for processing the query while other the servers monitor query processing. Transmission of a query result to a user typically completes the process. | 12-09-2010 |
20120016905 | Systems and Methods for Server Management - Exemplary systems and methods for server management are provided. An exemplary system comprises a plurality of servers, with each server having the ability to access a database or, in some embodiments, be configured to perform a calculation, computation or make a determination of a particular value, values or other information. A communications network delivers queries to each server whereby a look-up table directs query processing by the servers. Further embodiments of the system feature a program logic controller for rebalancing the workload of the network servers. Exemplary methods of processing queries on the system comprise submitting a query to the network, communicating the query to each server in the network and each server looking-up on a look-up table the processing responsibilities of the servers in the network. The query is processed by the server having primary responsibility for processing the query while other the servers monitor query processing. Transmission of a query result to a user typically completes the process. | 01-19-2012 |
20120166651 | Systems and Methods for Seamless Host Migration - Systems and methods of the present invention for maintaining network data distribution are provided. Network data may be distributed in such as manner as to allow a network session to weather interrupted communications between host and clients without significant loss of data. Embodiments of the present invention provide for one or more clients to serve as backup host(s) for the network session. When the other clients transmit data to the host, they may also transmit the data to one or more backup hosts if there are any indications of interrupted communication. | 06-28-2012 |
20130304931 | SEAMLESS HOST MIGRATION BASED ON NAT TYPE - Systems and methods of the present invention for maintaining network data distribution are provided. Network data may be distributed in such as manner as to allow a network session to weather interrupted communications between host and clients without significant loss of data. Embodiments of the present invention provide for one or more clients to serve as backup host(s) for the network session, such determinations including the use of NAT profile information. When the other clients transmit data to the host, they may also transmit the data to one or more backup hosts if there are any indications of interrupted communication. | 11-14-2013 |
20140310309 | SYSTEMS AND METHODS FOR SERVER MANAGEMENT - Exemplary systems and methods for server management are provided. An exemplary system comprises a plurality of servers, with each server having the ability to access a database or, in some embodiments, be configured to perform a calculation, computation or make a determination of a particular value, values or other information. A communications network delivers queries to each server whereby a look-up table directs query processing by the servers. Further embodiments of the system feature a program logic controller for rebalancing the workload of the network servers. Exemplary methods of processing queries on the system comprise submitting a query to the network, communicating the query to each server in the network and each server looking-up on a look-up table the processing responsibilities of the servers in the network. The query is processed by the server having primary responsibility for processing the query while other the servers monitor query processing. Transmission of a query result to a user typically completes the process. | 10-16-2014 |
20150180958 | SYSTEMS AND METHODS FOR SEAMLESS HOST MIGRATION - Systems and methods of the present invention for maintaining network data distribution are provided. Network data may be distributed in such as manner as to allow a network session to weather interrupted communications between host and clients without significant loss of data. Embodiments of the present invention provide for one or more clients to serve as backup host(s) for the network session. When the other clients transmit data to the host, they may also transmit the data to one or more backup hosts if there are any indications of interrupted communication. | 06-25-2015 |
Patent application number | Description | Published |
20100169250 | METHODS AND SYSTEMS FOR TRANSDUCTIVE DATA CLASSIFICATION - A system, method, data processing apparatus, and article of manufacture are provided for classifying data. Labeled data points are received, each of the labeled data points having at least one label indicating whether the data point is a training example for data points for being included in a designated category or a training example for data points being excluded from a designated category; receiving unlabeled data points; receiving at least one predetermined cost factor of the labeled data points and unlabeled data points; training a transductive classifier using MED through iterative calculation using the at least one cost factor and the labeled data points and the unlabeled data points as training examples; applying the trained classifier to classify at least one of the unlabeled data points, the labeled data points, and input data points; and outputting a classification of the classified data points, or derivative thereof. | 07-01-2010 |
20100269168 | System And Method For Developing A Risk Profile For An Internet Service - A method and system for controlling access to an Internet resource is disclosed herein. When a request for an Internet resource, such as a Web site, is transmitted by an end-user of a LAN, a security appliance for the LAN analyzes a reputation index for the Internet resource before transmitting the request over the Internet. The reputation index is based on a reputation vector which includes a plurality of factors for the Internet resource such as country of domain registration, country of service hosting, country of an internet protocol address block, age of a domain registration, popularity rank, internet protocol address, number of hosts, to-level domain, a plurality of run-time behaviors, JavaScript block count, picture count, immediate redirect and response latency. If the reputation index for the Internet resource is at or above a threshold value established for the LAN, then access to the Internet resource is permitted. If the reputation index for the Internet resource is below a threshold value established for the LAN, then access to the Internet resource is denied. | 10-21-2010 |
20100274786 | System And Method For Performing Longest Common Prefix Strings Searches - A method and system a method for compressing and searching a plurality of strings. The method includes inputting a plurality of strings into a compression engine. The method also includes converting each of the plurality of strings into a new, prefix-preserving compressed string, using the compression engine. For every string P that is a strict prefix of a string S, P's resulting compressed string is a strict prefix of S's resulting compressed string. | 10-28-2010 |
20140164914 | AUTOMATIC DOCUMENT SEPARATION - A method and system for delineating document and/or subdocument boundaries and identifying document and/or subdocument types, the method comprising: automatically generating at least one identifier for identifying which of a plurality of document and/or subdocument images belongs to which of a plurality of categories. The method and/or system optionally may include automatically categorizing a plurality of document and/or subdocument images into a plurality of predetermined categories in accordance with classification rules for said categories. | 06-12-2014 |
20140330759 | SYSTEM AND METHOD FOR DEVELOPING A RISK PROFILE FOR AN INTERNET SERVICE - A method and system for controlling access to an Internet resource is disclosed herein. When a request for an Internet resource, such as a Web site, is transmitted by an end-user of a LAN, a security appliance for the LAN analyzes a reputation index for the Internet resource before transmitting the request over the Internet. The reputation index is based on a reputation vector which includes a plurality of factors for the Internet resource such as country of domain registration, country of service hosting, country of an internet protocol address block, age of a domain registration, popularity rank, internet protocol address, number of hosts, to-level domain, a plurality of run-time behaviors, JavaScript block count, picture count, immediate redirect and response latency. If the reputation index for the Internet resource is at or above a threshold value established for the LAN, then access to the Internet resource is permitted. If the reputation index for the Internet resource is below a threshold value established for the LAN, then access to the Internet resource is denied. | 11-06-2014 |
Patent application number | Description | Published |
20080242671 | INHIBITORS OF CATHEPSIN S - The present invention provides compounds, compositions and methods for the selective inhibition of cathepsin S. In a preferred aspect, cathepsin S is selectively inhibited in the presence of at least one other cathepsin isozyme. The present invention also provides methods for treating a disease state in a subject by selectively inhibiting cathepsin S. | 10-02-2008 |
20090203777 | ORGANIC COMPOUNDS - The invention describes novel pharmaceutically acceptable salt forms of camostat, processes for lyophilisation, taste-masked formulations, nebulised formulations and the use of each of the fore-going in the treatment of respiratory diseases, particularly cystic fibrosis and chronic obstructive pulmonary disease (COPD). | 08-13-2009 |
20120208882 | Organic Compounds - The invention describes novel pharmaceutically acceptable salt forms of camostat, processes for lyophilisation, taste-masked formulations, nebulised formulations and the use of each of the fore-going in the treatment of respiratory diseases, particularly cystic fibrosis and chronic obstructive pulmonary disease (COPD). | 08-16-2012 |
20130296357 | METHODS OF USING ALK INHIBITORS - The invention provides methods for using compounds of Formula (I) for treating an EML4-ALK | 11-07-2013 |
Patent application number | Description | Published |
20080242694 | Amino-substituted heterocycles, compositions thereof, and methods of treatment therewith - Provided herein are Heterocyclic Compounds having the following structure: | 10-02-2008 |
20100216781 | mTOR KINASE INHIBITORS FOR ONCOLOGY INDICATIONS AND DISEASES ASSOCIATED WITH THE mTOR/PI3K/AKT PATHWAY - Provided herein are Heteroaryl Compounds having the following structure: | 08-26-2010 |
20110137028 | METHODS OF SYNTHESIS AND PURIFICATION OF HETEROARYL COMPOUNDS - Provided herein are methods to prepare Heteroaryl Compounds having the following structure: | 06-09-2011 |
20120059164 | PYRAZINO[2,3-b]PYRAZINE mTOR KINASE INHIBITOR FOR ONCOLOGY INDICATIONS AND DISEASES ASSOCIATED WITH THE mTOR/PI3K/AKT PATHWAY - Provided herein are Heteroaryl Compounds having the following structure: | 03-08-2012 |
20120071658 | PYRAZINO[2,3-b]PYRAZINE mTOR KINASE INHIBITOR FOR ONCOLOGY INDICATIONS AND DISEASES ASSOCIATED WITH THE mTOR/PI3K/AKT PATHWAY - Provided herein are Heteroaryl Compounds having the following structure: | 03-22-2012 |
20130245254 | METHODS OF SYNTHESIS AND PURIFICATION OF HETEROARYL COMPOUNDS - Provided herein are methods to prepare Heteroaryl Compounds having the following structure: | 09-19-2013 |
20130289271 | PYRAZINO[2,3-b]PYRAZINE mTOR KINASE INHIBITORS FOR ONCOLOGY INDICATIONS AND DISEASES ASSOCIATED WITH THE mTOR/PI3K/AKT PATHWAY - Provided herein are Heteroaryl Compounds having the following structure: | 10-31-2013 |
20140155593 | METHODS OF SYNTHESIS AND PURIFICATION OF HETEROARYL COMPOUNDS - Provided herein are methods to prepare Heteroaryl Compounds having the following structure: | 06-05-2014 |
20140200206 | SUBSTITUTED PYRROLOPYRIMIDINE COMPOUNDS, COMPOSITIONS THEREOF, AND METHODS OF TREATMENT THEREWITH - Provided herein are Pyrrolopyrimidine Compounds having the following structure: | 07-17-2014 |
20140200207 | SUBSTITUTED PYRROLOPYRIMIDINE COMPOUNDS, COMPOSITIONS THEREOF, AND METHODS OF TREATMENT THEREWITH - Provided herein are Pyrrolopyrimidine Compounds having the following structure: | 07-17-2014 |
20150051397 | PYRAZINO[2,3-b]PYRAZINE mTOR KINASE INHIBITORS FOR ONCOLOGY INDICATIONS AND DISEASES ASSOCIATED WITH THE mTOR/PI3K/AKT PATHWAY - Provided herein are Heteroaryl Compounds having the following structure: | 02-19-2015 |
Patent application number | Description | Published |
20090099938 | Web based communication of information with reconfigurable format - A system of using an interactive device such as an e-mail pager to obtain information from a publicly available source, such as the Internet. The e-mail pager may send information in its native format to a service that acts as an intermediary. That service takes the information and uses it to assemble a request to the actual information source, such as a Web page being accessed. If a web page is being accessed, the request is in HTML, and may include personal logon information. The response from the web page is also in HTML, and this information is received by the service, and salient information is taken from the HTML file. The information is reformatted, e.g. according to a template, into the e-mail pager's native format, and sent to the pager. Another embodiment describes opening multiple pages, and assembling their content into a single web page. | 04-16-2009 |
20120101954 | Multiple Site Profile and Transfer of Information - Profile information is shared between websites. A multi site profile can be used which has information for use on a social networking site which includes information about connections and lifestyle preferences on the social networking site, and on an item purchase site which includes information about successful items purchased on the item purchase site, and on a gaming website, which includes information about characters on the gaming website, and items associated with the profile, gaming website. The profile can be used on the different sites, and receive updates from the different sites. | 04-26-2012 |
20140294185 | Adaptive High Fidelity Reproduction System for Object-Based Audio - Object-based audio is adaptively associated with speakers, depending on the speaker configuration that is present. Each speaker it receives an audio assignment based on its individual spectral characteristics. As more speakers are added, content is adaptively associated with that you speaker, and taken away from the previous. | 10-02-2014 |
20150237447 | Wireless Audio Distribution System - A system for wirelessly distributing audio, the system including a controller for receiving audio content from a source external to the controller, one or more speakers wirelessly coupled to the controller, a wireless communications interface coupled to or integrated within the controller for wirelessly distributing the audio content to the one or more speakers, a memory for storing a sonic characteristic of at least one of the one or more speakers, and a processor for associating at least some elements of the audio content with the at least one of the one or more speakers based at least in part on the sonic characteristic. | 08-20-2015 |