Patent application number | Description | Published |
20080292120 | AUTOMATICALLY RECONFIGURABLE STEREO SPEAKER SYSTEM - An embodiment of an audio system comprises a speaker system configured to automatically change a coupling of an audio speaker from a first channel input to a second channel input if an external speaker is coupled to a first output. In embodiments of the invention, the speaker that connects to an audio source, such as an audio card of a personal computer (PC), automatically swaps channels based on the jack into which an external speaker is plugged. Thus, the reconfiguration of the audio system is automatic for the user in some embodiments, requiring nothing more from the user than selecting one of two jacks for use with an external speaker. | 11-27-2008 |
20080309520 | COMMUNICATION DEVICE INPUT SYSTEM - A system is disclosed that enables more rapid entry of text messages in cell phones that use a 12-key keypad. A cursor movement key placed on the side of a device having a numeric keypad enables a user to more quickly and easily and advance the cursor position between letter entries. By placing a cursor movement key in a position that it can be actuated by a different finger than the one in contact with the keypad, a user will be able to type a text message more rapidly when using only a single hand. Providing one or more user-reconfigurable keys on a cellular telephone enables a user to optionally enable a key to perform a desired function or else to be selectively disabled, thereby preventing unintentional input. An embodiment comprises a keypad on a first face and a first cursor movement key on a second face. | 12-18-2008 |
20090100041 | Public Electronic Document Dating List - Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection. | 04-16-2009 |
20090152286 | DRAINABLE CAP FOR INVERTIBLE CONTAINERS - A system is described for storing liquids. The system comprises a cap configured to couple to a container. The cap comprises a base surface configured to provide a base for a coupled container; a flip-open lid positioned to enable access to an interior of a coupled container; a first cavity having a floor defined by a portion of the cap and a sidewall defined by a portion of the cap; and a drainage port sized to enable water to drain from the first cavity. By providing one or more drainage ports for the hollow portions of invertible container caps, the tendency of water to pool and stagnate within the caps can be reduced. This can reduces the growth of harmful mold in showers. | 06-18-2009 |
20090210404 | DATABASE SEARCH CONTROL - Identifying a search engine user's preference for handling quotations, using easily remembered variations for enclosing a quote, simplifies the user interface. An example is enclosing the quote in either single or double quotation marks to indicate search options for the quote. A method of controlling a database search comprises receiving a search string; identifying, within the search string, a pair of phrase indicia such as quotation marks; identifying, between the pair of indicia, a quote string; matching the pair of phrase indicia to one of a plurality of pairs of indicia, wherein first and second ones of the plurality indicate an exact quote search and a modified quote search, respectively; and identifying, responsive to the matching, a request for an exact quote search or a modified quote search. The modified quote search may be a spell corrected search, a word stemmed search, an alternate spelling search, or a translated search. | 08-20-2009 |
20090273893 | NOTEBOOK COMPUTER WITH TILTING KEYBOARD VENT - A notebook computer with a tilting keyboard, which opens a vent when tilted, solves multiple problems and may further materially contribute to countering terrorism. A tilted position of the keyboard allows the vent to open when the notebook lid is open, thereby providing extra cooling capacity during periods of computer use when there is a lessened need for compactness. The vent is it least partially closed when the keyboard is in the stowed position and the lid is closed, thereby reducing the possibility of debris ingestion when air flow needs are reduced and the need for compactness is increased. A security inspection position of the keyboard enables inspection of the inside of the computer, for example as part of a security checkpoint procedure. A negative tilt can reduce wrist strain and repetitive motion injuries for some users. Some embodiments tilt the keyboard automatically in response to the lid opening, and stow the keyboard automatically in response to the lid being closed. | 11-05-2009 |
20100095128 | DOCUMENT INTEGRITY VERIFICATION PREPARATION - A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering, where such security was previously unavailable, for example, documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements. | 04-15-2010 |
20100095129 | COMPUTER PROGRAM INTEGRITY VERIFICATION - A system and method are disclosed that can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary executable files and data files, the contents of which are not thoroughly examined by humans in their binary state. Embodiments can efficiently identify whether multiple digital files are substantially similar, even if they are not identical, thus potentially reducing storage space requirements. | 04-15-2010 |
20100208967 | MEDICAL DIAGNOSTIC IMAGE CHANGE HIGHLIGHTER - Systems and methods are disclosed which enable more accurate examination of medical diagnostic images, for example x-ray, ultrasound and magnetic resonance imaging (MRI) images. The systems and methods highlight anomalies that have changed between the collection times of two or more diagnostic images, and can also provide objective scoring of the degree of change. | 08-19-2010 |
20110125718 | Public Electronic Document Dating List - Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection. | 05-26-2011 |
20110162928 | Super-Compressible Piston Shock Absorber - Piston-in-cylinder type shock absorbers are disclosed that are compressible to less than half of their extended length, thereby eliminating the current need for automotive suspensions to accommodate unwieldy shock absorbers that, even when fully compressed, must be longer than the amount of permitted axial suspension travel at the shock absorber's connection point. Since the disclosed shock absorbers are super-compressible, they are also super-extendable, which is extendable beyond double their compressed length. In some embodiments, this super-compressibility and super-extendibility are rendered possible by the use of a rigidly interleaved, oppositely-oriented, axially-balanced, free-floating bank of gas-charged cylinders. | 07-07-2011 |
20110165861 | Cellular Device Identification and Location with Emergency Number Selectivity Enforcement (CILENSE) - A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required. | 07-07-2011 |
20110167498 | Software License Management - A method of managing a software license comprises loading a software program into volatile memory, obtaining authorization data, modifying a portion of the volatile memory relied upon by the program in accordance with the authorization data, executing the program, and causing the modifications to be deleted from the volatile memory. In some embodiments, selection criteria compared with the authorization data does not contain information corresponding to all of the content of the authorization data, thereby denying a software attacker the benefit of identifying and exploiting the selection criteria. | 07-07-2011 |
20110197859 | Dynamically Altering Piston Displacement - Systems are disclosed that enable an internal combustion engine to dynamically alter piston displacement. The alteration is dynamic, because it occurs during engine operation, rather than requiring stopping and disassembling the engine. It is piston displacement that is altered, rather than engine displacement, because the actual volume that is displaced by a piston (as it moves within a cylinder) is altered. This is contrasted with the prior art practice of starving some cylinders of fuel. Because “engine displacement” is conveniently defined in prior art multi-displacement systems, to include only cylinders that actively produce power, the fuel-starved cylinders are excluded from a calculation of “engine displacement” and thus the “engine displacement” allegedly changes. The disclosed dynamic alteration of piston displacement is the alteration of actual displaced cylinder volume, and is differentiated from alteration of engine displacement. | 08-18-2011 |
20110265628 | System and Method for Disposal of Digital Media - A system and method are described for rendering Compact Discs (CDs) and Digital Video Discs (DVDs) unreadable. Embodiments comprise a frame, a guide for constraining motion of the frame with respect to a disc, and at least one scraping element. Scraping elements may be positioned to damage the disc volume descriptor while the frame moves in a constrained manner relative to the disc. The guide may comprise a spindle which engages the center hole of a disc to hold the frame in a radially-fixed position. A scraping element on the frame damages the disc as the disc rotates relative to the frame. The guide may be integrated, such that the frame comprises a slot through which the disc passes. A scraping element inside the slot damages a disc as it passes through. Embodiments are hand operated, not motorized, and some have no moving parts. Embodiments also function with non-optical media. | 11-03-2011 |
20120197901 | Public Electronic Document Dating List - Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection. | 08-02-2012 |
20120258846 | MULTI-FUNCTION, VARIABLE-ASSIST PUSHUP SYSTEM - A system is described that simultaneously (1) provides for at least 10 different height adjustments for assisted pushups; (2) provides an adjustable ankle-holding situp bar to accommodate differently-sized feet; (3) can compensate for an uneven exercise surface; (4) requires no permanent mounting or any installation; (5) does not require use of a doorway; (6) is highly compact for storage; (7) can be disassembled for storage using a trivial procedure that is already well-known by most gym users; (8) leverages existing, widely-used and inexpensive home gym equipment to provide some portions of the system, thereby reducing expense; and (9) can be used as a weight for some barbell exercises, thereby stretching the home gym user's money; and (10) can be used as a weight plate on a weight bar for weightlifting exercises, thereby further stretching the home gym user's money. Alternative systems are also described. | 10-11-2012 |
20130133055 | METHOD AND APPARATUS TO PROVIDE CONTINUOUS AUTHENTICATION BASED ON DYNAMIC PERSONAL INFORMATION - An authentication method, system and device are provided to continuously collect dynamic personal identification data (DPID) samples through a user device by using one or more sensors to continuously collect biometric and location data samples associated with the user and then securely transfer the DPID samples to a central authentication server where attributes of the DPID samples may be captured and incorporated as part of a challenge-response pair which requests an arbitrarily generated N-tuple of the DPID samples from a predetermined time interval from the user device that is unique to the user and dynamic based on the sensed data and the time-interval of collection. | 05-23-2013 |
20130282678 | VERIFYING AGE AND INTEGRITY OF WEBSITE PAGES - Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection. | 10-24-2013 |
20130336563 | Medical Diagnostic Image Change Highlighter - Systems and methods are disclosed which enable more accurate examination of medical diagnostic images, for example x-ray, ultrasound and magnetic resonance imaging (MRI) images. The systems and methods highlight anomalies that have changed between the collection times of two or more diagnostic images, and can also provide objective scoring of the degree of change. | 12-19-2013 |
20130337772 | Cellular device Identification and Location with Emergency Number Selectivity Enforcement (CILENSE) - A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required. | 12-19-2013 |
20130340087 | Software License Management - A method of managing a software license comprises loading a software program into volatile memory, obtaining authorization data, modifying a portion of the volatile memory relied upon by the program in accordance with the authorization data, executing the program, and causing the modifications to be deleted from the volatile memory. In some embodiments, selection criteria compared with the authorization data does not contain information corresponding to all of the content of the authorization data, thereby denying a software attacker the benefit of identifying and exploiting the selection criteria. | 12-19-2013 |
20130343621 | Industrial Diagnostic Image Change Highlighter - Systems and methods are disclosed which enable more accurate examination of industrial diagnostic images, for example x-ray, ultrasound and terahertz camera images. The systems and methods highlight anomalies that have changed between the collection times of two or more diagnostic images, and can also provide objective scoring of the degree of change. | 12-26-2013 |
20140068263 | SUBSYSTEM AUTHENTICITY AND INTEGRITY VERIFICATION (SAIV) - Systems and methods are disclosed for enhancing anti-terrorism public safety measures, by more securely determining whether explosives or other contraband have been inserted into notebook computer batteries or other large, replaceable subsystems of electronic devices. Because notebook computers typically require large, heavy batteries, they present attractive containers for smugglers and terrorists attempting to bring explosives onto an airplane. The disclosed security testing system provides more reliable results than many current tests, and does not require that the device under test be powered on. The systems and methods disclosed use out-of-band authentication for added security. | 03-06-2014 |
20140174865 | SUPER-COMPRESSIBLE PISTON SHOCK ABSORBER - Piston-in-cylinder type shock absorbers are disclosed that are compressible to less than half of their extended length, thereby eliminating the current need for automotive suspensions to accommodate unwieldy shock absorbers that, even when fully compressed, must be longer than the amount of permitted axial suspension travel at the shock absorber's connection point. Since the disclosed shock absorbers are super-compressible, they are also super-extendable, which is extendable beyond double their compressed length. In some embodiments, this super-compressibility and super-extendibility are rendered possible by the use of a rigidly interleaved, oppositely-oriented, axially-balanced, free-floating bank of gas-charged cylinders. | 06-26-2014 |
20140201853 | Subsystem Authenticity and Integrity Verification (SAIV) - Systems and methods are disclosed for enhancing anti-terrorism public safety measures, by more securely determining whether explosives or other contraband have been inserted into notebook computer batteries or other large, replaceable subsystems of electronic devices. Because notebook computers typically require large, heavy batteries, they present attractive containers for smugglers and terrorists attempting to bring explosives onto an airplane. The disclosed security testing system provides more reliable results than many current tests, and does not require that the device under test be powered on. The systems and methods disclosed use out-of-band authentication for added security. | 07-17-2014 |
20140222767 | Page Substitution Verification Preparation - A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering, where such security was previously unavailable, for example, documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements. | 08-07-2014 |
20140325371 | MEDIA HAND-OFF WITH GRAPHICAL DEVICE SELECTION - A wireless user device has a first antenna operable within a first wireless function frequency band and a second antenna operable within a second wireless function frequency band different than the first operable within a first wireless function frequency band. Circuitry configured to process signals received by the first antenna and the second antenna is further configured to identify and resolve locations of a plurality of remote wireless devices by signal phase comparison. A display screen is configured to display an icon for the identified remote wireless device at an area of the display screen that corresponds to the relative location of the remote wireless device with respect to the user device. | 10-30-2014 |
20140334699 | Diagnostic Image Change Highlighter - Systems and methods are disclosed which enable more accurate examination of industrial diagnostic images, for example x-ray, ultrasound and terahertz camera images. The systems and methods highlight anomalies that have changed between the collection times of two or more diagnostic images, and can also provide objective scoring of the degree of change. | 11-13-2014 |
20140335846 | Cellular device Identification and Location with Emergency Number Selectivity Enforcement (CILENSE) for Moving Vehicles - A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required. | 11-13-2014 |