Patent application number | Description | Published |
20090254965 | METHOD AND SYSTEM FOR ENHANCING DISPLAY FUNCTIONALITY IN A SET-TOP ENVIRONMENT - Methods and systems for enhancing the storage and display of video data and other digital content in a set-top box or other television environment so that such data is securely stored and displayed are provided. Example embodiments provide an enhanced display controller (EDC) that executes in an electronic device, such as a set-top box, to provide secure storage and playback of streamed digital content. The EDC creates or identifies a secure storage location and stores the data stream in that secure location in a secure manner, thereby minimizing unauthorized access. In addition, the EDC supports the secure display of the data stream using standard (or proprietary) encryption techniques, and/or obfuscation techniques. The EDC also optionally supports various requirements for complying with the usage limitations typically associated with DRM data content. In one embodiment, the enhanced display controller is a modified set-top display (device) driver that includes a VBI decoder, mechanisms (e.g., code) for securely storing and retrieving digital content, a display obfuscation/encryption mechanism, and a secure data repository. Methods and systems for displaying dynamic, floating graphics using an EDC are also provided. These graphics may be used to as interfaces to invoke the secure storage and playback mechanisms of the EDC and to navigate through display spaces presented on the television display. | 10-08-2009 |
20100005396 | METHOD AND SYSTEM FOR CONTROLLING A COMLEMENTARY USER INTERFACE ON A DISPLAY SURFACE - An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications. The alternate display content controller may also include content and operating software delivered over the Internet or any other LAN. The alternate display content controller may also be included in a television decoder/settop box to permit two or more parallel graphical user interfaces to be displayed simultaneously. | 01-07-2010 |
20100064245 | SYSTEM AND METHOD FOR PARALLEL DATA DISPLAY OF MULTIPLE EXECUTING ENVIRONMENTS - A computer display controller arbitrates between multiple environments in a computer system to apportion display space between the multiple environments. The display controller may be implemented in hardware, firmware, or software, and determines display space allocation based on requests or requirements of each of the environments. If only one environment is active, the display controller may allocate the entire display space to the first environment. When a second environment is activated, display parameters may be dynamically provided to the display controller or previously provided to the display controller for storage and subsequent use. The display controller apportions the total displayable area to accommodate both environments and if necessary alters the display parameters of the first environment to accommodate the display needs of the second environment. The process may be extended to additional environments and may operate satisfactorily with computer systems having multiple displays. The display controller may allocate the entire display space to a particular environment, or only a portion of the display space for a particular environment on a single or multiple display device system. | 03-11-2010 |
20100077231 | METHOD AND SYSTEM FOR MAINTAINING SECURE DATA INPUT AND OUTPUT - Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques. In one embodiment, a security enhanced display driver, a security enhanced mouse driver, a security enhanced keyboard driver, and a security enhanced audio driver are provided. To complement the security enhancements, the methods and systems also provide for a watchdog mechanism to ensure that the driver is functioning as it should be and various user interface techniques for denoting security on a display device. | 03-25-2010 |
20100077360 | METHOD AND SYSTEM FOR MAINTAINING SECURE DATA INPUT AND OUTPUT - Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques. In one embodiment, a security enhanced display driver, a security enhanced mouse driver, a security enhanced keyboard driver, and a security enhanced audio driver are provided. To complement the security enhancements, the methods and systems also provide for a watchdog mechanism to ensure that the driver is functioning as it should be and various user interface techniques for denoting security on a display device. | 03-25-2010 |
20110096081 | SYSTEM AND METHOD FOR PARALLEL DATA DISPLAY OF MULTIPLE EXECUTING ENVIRONMENTS - A computer display controller arbitrates between multiple environments in a computer system to apportion display space between the multiple environments. The display controller may be implemented in hardware, firmware, or software, and determines display space allocation based on requests or requirements of each of the environments. If only one environment is active, the display controller may allocate the entire display space to the first environment. When a second environment is activated, display parameters may be dynamically provided to the display controller or previously provided to the display controller for storage and subsequent use. The display controller apportions the total displayable area to accommodate both environments and if necessary alters the display parameters of the first environment to accommodate the display needs of the second environment The process may be extended to additional environments and may operate satisfactorily with computer systems having multiple displays. The display controller may allocate the entire display space to a particular environment, or only a portion of the display space for a particular environment on a single or multiple display device system. | 04-28-2011 |
20110221765 | METHOD AND SYSTEM FOR CONTROLLING A COMPLEMENTARY USER INTERFACE ON A DISPLAY SURFACE - An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications. The alternate display content controller may also include content and operating software delivered over the Internet or any other LAN. The alternate display content controller may also be included in a television decoder/settop box to permit two or more parallel graphical user interfaces to be displayed simultaneously. | 09-15-2011 |
20120185360 | E-COMMERCE SOLUTIONS IMPLEMENTING MULTI-FUNCTION SEARCHING AND SEARCH-RELATED TOOLS AND TECHNIQUES - A machine-controlled electronic commerce (e-commerce) method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. Alternatively or in addition thereto, the processor may apply the target condition against the stored information. The machine may perform a search operation that incorporates at least one result of the querying and provide at least one search result based on the search operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results. | 07-19-2012 |
20120185468 | MULTI-FUNCTION MATCHING ENGINES IMPLEMENTING IMPROVED SEARCHING AND SEARCH-RELATED TOOLS AND TECHNIQUES - A machine-controlled method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. Alternatively or in addition thereto, the processor may apply the target condition against the stored information. The machine may perform a matching operation that incorporates at least one result of the querying and provide at least one matching result based on the matching operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results. | 07-19-2012 |
20120185469 | ADVANCED FILTERING MECHANISM TOOLS AND TECHNIQUES - A machine-controlled method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. The processor may apply the target condition against the stored information. The machine may perform a filtering operation that incorporates at least one result of the querying and provide at least one filtering result based on the filtering operation. | 07-19-2012 |
20120185470 | ENTERPRISE ARCHITECTURE SEARCHING AND SEARCH-RELATED TOOLS AND TECHNIQUES - A machine-controlled method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. Alternatively or in addition thereto, the processor may apply the target condition against the stored information. The machine may perform a collaborative decision making (CDM) operation that incorporates at least one result of the querying and provide at least one CDM result based on the CDM operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results. | 07-19-2012 |
20120185471 | BUSINESS INTELLIGENCE AND CUSTOMER RELATIONSHIP MANAGEMENT TOOLS AND TECHNIQUES - A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. A processor may apply an importance by asserting a user-defined importance condition against the information. The processor may apply a preference probability by asserting a user-specified preference condition against the information. The processor may assert a user-established target condition against the information. Responsive to a situation awareness activity, the machine may perform an actionable intelligence operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results. | 07-19-2012 |
20120185476 | MULTI-FUNCTION SEARCHING AND SEARCH-RELATED TOOLS AND TECHNIQUES FOR IMPROVED SEARCH RESULTS AND ENHANCED ANALYSIS AND DECISION-MAKING - A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. A processor may apply an importance by asserting a user-defined importance condition against the information. The processor may apply a preference probability by asserting a user-specified preference condition against the information. The processor may assert a user-established target condition against the information. Responsive to a search request, filtering request, collaborative decision making (CDM request), matching request, or situation awareness activity, the machine may perform a search operation, a filtering operation, a CDM operation, a matching operation, or an actionable intelligence operation, respectively. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results. | 07-19-2012 |
20120237029 | METHOD AND SYSTEM FOR MAINTAINING SECURE DATA INPUT AND OUTPUT - Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” and “replace and restore.” | 09-20-2012 |
20140067795 | MULTI-FUNCTION SEARCHING AND SEARCH-RELATED TOOLS AND TECHNIQUES FOR IMPROVED SEARCH RESULTS AND ENHANCED ANALYSIS AND DECISION-MAKING - A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. The processor may apply preferences, targets and thresholds by asserting a user-specified query conditions against the information. Responsive to multiple results of the querying, the processor may apply an importance by asserting a user-defined importance condition against the results of the query and may provide an indication of a ranking corresponding to at least one of the results. | 03-06-2014 |
Patent application number | Description | Published |
20090312794 | ANCHORS AND METHODS FOR SECURING SUTURE TO BONE - A method for securing suture to bone comprises drilling a hole in a desired portion of bone at a desired procedural site, passing a strand of suture through a portion of soft tissue to be approximated to the portion of bone, and extending the free suture ends proximally from the soft tissue. The suture is loaded into an anchor implant. Using an inserter, on a distal end of which is attached the anchor implant, the anchor implant is manipulated into the bone hole. The suture is then tensioned to a desired level by pulling on the free suture ends, after the anchor implant is positioned in the bone hole. The free suture ends are wrapped about a suture cleat on an inserter handle once the desired tension level is achieved. A proximal anchor component is moved distally to engage with a distal anchor component to lock the anchor in place within the bone hole, and to lock the suture in place within the anchor. Then, the inserter is removed from the procedural site. | 12-17-2009 |
20100004683 | ANCHORS AND METHOD FOR SECURING SUTURE TO BONE - A method for securing suture to bone comprises drilling a hole in a desired portion of bone at a desired procedural site, passing a strand of suture through a portion of soft tissue to be approximated to the portion of bone, and extending the free suture ends proximally from the soft tissue. The suture is loaded into an anchor implant. Using an inserter, on a distal end of which is attached the anchor implant, the anchor implant is manipulated into the bone hole. The suture is then tensioned to a desired level by pulling on the free suture ends, after the anchor implant is positioned in the bone hole. The free suture ends are wrapped about a suture cleat on an inserter handle once the desired tension level is achieved. A proximal anchor component is moved distally to engage with a distal anchor component to lock the anchor in place within the bone hole, and to lock the suture in place within the anchor. Then, the inserter is removed from the procedural site. | 01-07-2010 |
20100114123 | ARTHROSCOPIC SUTURE PASSING DEVICES AND METHODS - A system for transdermal repair of soft tissue includes an instrument comprising a proximal actuator portion, a fixed needle having a lumen and extending distally from the proximal actuator portion, and a movable needle having a lumen and extending distally from the proximal actuator portion. The movable needle is movable axially between an advanced position and a retracted position relative to the proximal actuator portion. A suture needle is disposed within the lumen of one of the fixed and movable needles, and has a length of suture connected thereto. Needle graspers are disposed in the lumen of each needle, for securing the suture needle and assisting in the transfer of the suture needle from one needle to the other to complete a suture passing step. | 05-06-2010 |
20130190782 | ARTHROSCOPIC SUTURE PASSING DEVICES AND METHODS - A system for transdermal repair of soft tissue includes an instrument comprising a proximal actuator portion, a fixed needle having a lumen and extending distally from the proximal actuator portion, and a movable needle having a lumen and extending distally from the proximal actuator portion. The movable needle is movable axially between an advanced position and a retracted position relative to the proximal actuator portion. A suture needle is disposed within the lumen of one of the fixed and movable needles, and has a length of suture connected thereto. Needle graspers are disposed in the lumen of each needle, for securing the suture needle and assisting in the transfer of the suture needle from one needle to the other to complete a suture passing step. | 07-25-2013 |
20140107700 | SYSTEMS AND METHODS FOR REPAIRING SOFT TISSUES USING NANOFIBER MATERIAL - An anchoring system is a combination of a nanofiber scaffold material and an arthroscopically deployable suture anchor. The anchor is deployed into a bone tunnel using common techniques. The nanofiber material extends out of the proximal end of the implant, once deployed. The implant also includes pre-loaded sutures or has the ability to accept and lock sutures to the implant. For an implant pre-loaded with suture, the implant is placed into the bone, the material is deployed above the anchor onto the surface of the bone, suture is passed through the soft tissue, and knots are tied to secure the tissue against the bone, sandwiching the material between the bone and tissue, to provide a pathway for cells from the bone marrow to the soft tissue-bone interface, promote the healing response, provide a biomimetic structure that cells readily adhere to, and create a larger healing footprint. | 04-17-2014 |
20150250471 | ALL-SUTURE SUTURE ANCHOR SYSTEMS AND METHODS - A method of anchoring soft tissue to a suitable bone site, using a soft suture anchor, includes steps of disposing the soft suture anchor on a shaft of an inserter, and securing a proximal end of a tensioning suture limb, extending proximally from the soft suture anchor, to structure in a handle of the inserter, so that it is maintained in place at a first level of holding tension (T | 09-10-2015 |