Patent application number | Description | Published |
20080230569 | Package comprising push-pull closure and slit valve - Packages for containing and dispensing consumer products comprise a push-pull closure connected to a bottle and having a dispensing opening covered by a slit valve. The combination of a push-pull closure and a slit valve results in a package that easily dispenses a liquid consumer product, while guarding against leakage of the consumer product from the package, especially during transportation and storage of the product, particularly when the package is a tottle package. The push-pull closure of the present package is simple to open and can also be easily closed with the use of only one hand, especially by pressing the closure against a flat surface, such as a shower wall or shelf. | 09-25-2008 |
20110226721 | THREADED CLOSURE ASSEMBLY - A threaded closure assembly comprising a transition and a cap is disclosed. The threaded closure assembly may be utilized to seal a liquid containing bottle, particularly one containing a liquid fabric composition. | 09-22-2011 |
20110290756 | THREADED CAP - A threaded cap is disclosed. The threaded cap may form a portion of a closure assembly comprising also comprising a threaded transition. The closure assembly may be utilized to seal a liquid containing bottle, particularly one containing a liquid fabric composition. | 12-01-2011 |
20120181209 | Process For The Manufacture Of a Container - The present invention is directed to a process for the manufacture of a blow molded container comprising a physical geometry that creates more than one undercut and a means for removal of said container from a mold used to form said container. | 07-19-2012 |
20120181272 | Array of Products - The present invention relates to an array of products comprising a plurality of different containers having a similar container to closure interface across at least one brand and different volumetric sizes wherein at least one of said containers comprises more than one undercut and comprising a plurality of different closures comprising at least one common component. | 07-19-2012 |
20120181278 | Closure For a Container - The present invention is directed to a closure for a container comprising a first component which assembles onto an outlet opening and provides a seal, said first component is threadingly engaged to a second component of said closure; a second component comprising a dispensing orifice, said second component, threadingly engaged with said first component; a dispensing orifice positioned directly adjacent to the open portion of the container body; wherein the second component will engage with the first component when the second component is moved relative to the first component to enable operation of the orifice and wherein the first component comprises one or more elements being in a specific juxtaposition enabling a small height and a low profile for one or more of the elements of the first component, said element(s) being in the plane or below the plane of the outlet of the container. | 07-19-2012 |
20120181292 | Blow Molded Container - The present invention is directed to a container comprising a retention mechanism for attaching a closure to an opening or neck of a container with a portion of the container body comprising a physical geometry that creates more than one undercut. | 07-19-2012 |
20120181302 | Closure For a Container - The present invention is directed to a closure for a container comprising a first component which assembles onto an outlet opening of a container and provides a seal; said first component containing a snap component to engage to a second component to form a closure; a second component combined with first component forms a dispensing orifice wherein the dispensing orifice is positioned directly adjacent to the open portion of container outlet; a motion of second component pivots about an axis to open a dispensing orifice; wherein second component engages with first component when second component is moved relative to first component to enable operation of orifice; first component comprising one or more elements being in a specific juxtaposition enabling a small height and a low profile for one or more elements of first component; said element(s) being in the plane or below the plane of the outlet of the container. | 07-19-2012 |
20130183462 | Process For The Manufacture Of An Article Comprising a Recess - The present invention relates to a process for blowing an article with at least one recess. | 07-18-2013 |
Patent application number | Description | Published |
20130096570 | TRAJECTORY GUIDE, ACCESS PORT, AND FIDUCIAL MARKER ALIGNMENT - A trajectory guide for introducing an instrument into a human or animal subject is described. A guide stem can be removed in sections without disturbing the aligned instrument. An access port portion of the trajectory guide can be left in place, without disturbing trajectory alignment, and can allow overlying skin to be sutured closed. The access port can provide infusate delivery, such as using an injection port, catheter or the like. A fiducial marker arrangement can provide easy and accurate trajectory alignment, for use with the present trajectory guide, another trajectory guide, or without any trajectory guide. | 04-18-2013 |
20130310767 | SEAL TIP CATHETER DEVICES OR METHODS - A first catheter can include a first catheter body providing a longitudinal bore and can have flexible first seal at its distal portion. The first seal can at least partially occlude the bore at the distal portion of the catheter body in a first configuration. A second catheter can be slid into or through the bore of the first catheter body, such as to expand the first seal into a second configuration. Wicking or reflux can be inhibited. Other features, applications, and methods can be included. | 11-21-2013 |
20140288578 | TRAJECTORY GUIDE, ACCESS PORT, AND FIDUCIAL MARKER ALIGNMENT - A trajectory guide for introducing an instrument into a human or animal subject is described. A guide stem can be removed in sections without disturbing the aligned instrument. An access port portion of the trajectory guide can be left in place, without disturbing trajectory alignment, and can allow overlying skin to be sutured closed. The access port can provide infusate delivery, such as using an injection port, catheter or the like. A fiducial marker arrangement can provide easy and accurate trajectory alignment, for use with the present trajectory guide, another trajectory guide, or without any trajectory guide. | 09-25-2014 |
Patent application number | Description | Published |
20080221820 | System for First Pass Filtering of Anomalies and Providing a Base Confidence Level for Resource Usage Prediction in a Utility Computing Environment - Provided is a system for monitoring resources in a utility computing environment (UCE). Measurements are evaluated to determine whether or not a particular resource requires remedial or other type of action. A sliding measurement window is employed to assemble a number of measurements corresponding to a particular resource. The number of intervals in a sliding measurement window is based upon best practices corresponding to the resource being measured and analyzed. A first threshold-crossing event and subsequent events are stored until the window is full, or closed. When the window is closed, the threshold-crossing measurements are analyzed to determine whether or not there exists an issue with the resource that requires action. Once a window has been closed and analyzed, the first threshold-crossing event and each subsequent event up to a second threshold-crossing event are discarded and the window reopens. | 09-11-2008 |
20120005672 | IMAGE MANAGEMENT FOR VIRTUAL MACHINE INSTANCES AND ASSOCIATED VIRTUAL STORAGE - A storage management method and computer program serves as an intermediary between storage subsystems and a virtual machine manager, e.g., a hypervisor. The storage management provides a unified user interface for configuration and unifies handling virtual machine image storage/retrieval, as well as management of virtual disk volumes provided to the operating systems and applications within virtual machine images. The images including the virtualized storage along with the entire state of the virtual machine form snapshots that can be cloned, stored when taking a virtual machine off-line and loaded when the virtual machine is being brought on-line. | 01-05-2012 |
20120005673 | STORAGE MANAGER FOR VIRTUAL MACHINES WITH VIRTUAL STORAGE - A storage manager connects containers of virtual machine (VM) images and virtual storage device data within hosts. The storage management provides a set of northbound application programming interfaces (APIs) that allow configuration of images associated with VM images and virtual storage devices provided to the operating systems and applications within virtual machine images. The northbound APIs, include methods for creating a virtual storage container that contains storage for the VM instance and also at least one virtual storage device to be provided to an operating system executed by the VM, a method for causing an attach of the virtual storage container to the host and a method for causing a deployment of the virtual storage device within the host. A set of southbound APIs are provided by the host, including at least a method that creates virtual storage devices and a method that attaches virtual storage devices to the host. | 01-05-2012 |
20120185855 | IMAGE MANAGEMENT FOR VIRTUAL MACHINE INSTANCES AND ASSOCIATED VIRTUAL STORAGE - A storage management method provides an intermediary between storage subsystems and a virtual machine manager, e.g., a hypervisor. The storage management provides a unified user interface for configuration and unifies handling virtual machine image storage/retrieval, as well as management of virtual disk volumes provided to the operating systems and applications within virtual machine images. The images including the virtualized storage along with the entire state of the virtual machine form snapshots that can be cloned, stored when taking a virtual machine off-line and loaded when the virtual machine is being brought on-line. | 07-19-2012 |
20120198448 | STORAGE MANAGER FOR VIRTUAL MACHINES WITH VIRTUAL STORAGE - A storage manager connects containers of virtual machine (VM) images and virtual storage device data within hosts. The storage management provides a set of northbound application programming interfaces (APIs) that allow configuration of images associated with VM images and virtual storage devices provided to the operating systems and applications within virtual machine images. The northbound APIs, include methods for creating a virtual storage container that contains storage for the VM instance and also at least one virtual storage device to be provided to an operating system executed by the VM, a method for causing an attach of the virtual storage container to the host and a method for causing a deployment of the virtual storage device within the host. A set of southbound APIs are provided by the host, including at least a method that creates virtual storage devices and a method that attaches virtual storage devices to the host. | 08-02-2012 |
Patent application number | Description | Published |
20100115113 | SYSTEMS AND METHODS FOR PROVIDING DYNAMIC NETWORK AUTHORIZATION, AUTHENTICATION AND ACCOUNTING - Systems and methods for selectably controlling and customizing source access to a network, where the source is associated with a source computer, and wherein the source computer has transparent access to the network via a gateway device and no configuration software need be installed on the source computer to access the network. A user may be prevented access from a particular destination or site based upon the user's authorization while being permitted to access to other sites that the method and system deems accessible. The method and system can identify a source without that source's knowledge, and can access customizable access rights corresponding to that source in a source profile database. The source profile database can be a remote authentication dial-in user service (RADIUS) or a lightweight directory access protocol (LDAP) database. The method and system use source profiles within the source profile database to dynamically authorize source access to networks and destinations via networks. | 05-06-2010 |
20100332615 | SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM - Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications. | 12-30-2010 |
20120017009 | SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM - Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications. | 01-19-2012 |
20120030737 | SYSTEM AND METHOD FOR AUTHORIZING A PORTABLE COMMUNICATION DEVICE - Systems and methods of authorizing a portable communication device to access a network resource. In an embodiment, a request to access a network resource is received from a portable communication device via a network. A processor is used to dynamically and selectively determine whether the portable communication device is authorized to access the requested network resource. The determination may be based on a unique identifying attribute associated with the portable communication device without the unique identifying attribute being predefined in a user profile database and without querying the portable communication device or its user for information. If the portable communication device is authorized, it may be allowed to access the network resource. Otherwise, it may be redirected to an authentication system where it may be enabled to submit authentication-related information so that it may be authorized to access the requested network resource. | 02-02-2012 |
20120096159 | SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM - Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications. | 04-19-2012 |
20120303812 | SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM - Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications. | 11-29-2012 |
20120311152 | SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM - Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications. | 12-06-2012 |
20130055358 | SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM - Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications. | 02-28-2013 |
20140047093 | SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM - Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications. | 02-13-2014 |
20140059222 | SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM - Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications. | 02-27-2014 |
20140089182 | SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM - Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications. | 03-27-2014 |
Patent application number | Description | Published |
20120318749 | SYSTEMS AND METHODS FOR PERFORMING THE BACTERIAL DISINFECTION OF A FLUID USING POINT RADIATION SOURCES - A system for disinfecting a fluid, including: a flow cell including one or more inlet ports and one or more outlet ports, wherein the flow cell is configured to communicate a fluid containing a biological contaminant from the one or more inlet ports to the one or more outlet portions through an interior portion thereof; and one or more point radiation sources disposed about the flow cell, wherein the one or more point radiation sources are operable for delivering radiation to the biological contaminant; wherein an interior surface of the flow cell is operable for reflecting the radiation delivered to the biological contaminant by the one or more point radiation sources; and wherein the interior surface of the flow cell is operable for reflecting the radiation delivered to the biological contaminant by the one or more point radiation sources such that a radiation intensity is uniform throughout the interior portion of the flow cell. In one exemplary embodiment, the flow cell is an integrating sphere. Optionally, the system also includes a photocatalyzing material disposed on at least a portion of the interior surface of the flow cell. | 12-20-2012 |
20140161664 | APPARATUS FOR IRRADIATION - An irradiation apparatus configured to be coupled to an irradiation chamber containing a material to be irradiated, comprising: a support structure; one or more radiation sources coupled to the support structure; and a heat exchange mechanism thermally coupled to the one or more radiation sources. The heat exchange mechanism comprises one or more of a thermoelectric cooling device, a vapor chamber, a heatsink, a heat dissipation structure, a fan, and a cooling coating. The one or more radiation sources comprise one or more UV radiation sources, one or more UV-C radiation sources, one or more visible radiation sources, or a combination thereof. Optionally, the one or more radiation sources comprise a plurality of radiation sources arranged in an array. Optionally, the one or more radiation sources deliver a combination of wavelengths to the material to be irradiated. | 06-12-2014 |
20140240695 | OPTICAL DENSITY MONITOR AND COMPARATOR SYSTEMS AND METHODS - The present disclosure relates generally to systems and methods for determining the absorption coefficient and the optical density of a fluid as they relate to the wavelength of incident radiation. Specifically, ultraviolet light-emitting diodes (UV LEDs) or the like that emit ultraviolet (UV) radiation or the like are used as sources for irradiating the interior of an integrating chamber that is designed to increase the path length of the radiation through the fluid, thus enhancing the detection limits of the absorption coefficient and the optical density according to Beer's Law. | 08-28-2014 |
Patent application number | Description | Published |
20110066861 | DIGITAL CONTENT MANAGEMENT AND DELIVERY - Methods, systems, and apparatus for digital content management and distribution are provided. In an example, a plurality of unique keys can be provide, wherein each unique key corresponding to one or more docks for accessing digital content. A selection of at least one item of digital content can be received from a user and an indication of a dock corresponding to the user can also be received. A unique key can be selected from the plurality of unique keys corresponding to the dock of the user, and the at least one item of digital content can be encrypted based on the selected unique key. | 03-17-2011 |
20120022977 | SECURE PRE-LOADED DRIVE MANAGEMENT AT KIOSK - Methods, systems, and apparatus for digital content management and distribution are provided. In an example, a method of protecting digital content at a kiosk is provided. The method includes providing a plurality of memory devices, the plurality of memory devices having pre-loaded content thereon. A selection is received from a user. A memory device is selected from the plurality of pre-loaded memory devices that matches the selection from the user. A dock to which the memory device is to be coupled is determined. The memory device is protected with a unique key corresponding to the dock. | 01-26-2012 |
20120047374 | TAMPER RESISTANCE EXTENSION VIA TAMPER SENSING MATERIAL HOUSING INTEGRATION - Systems and apparatuses disclosed herein provide for a tamper resistant electronic device. The electronic device can include a circuit board, housing, a security shield, one or more pressure sensitive switches, and security electronics. The security shield can cover a first area of the circuit board and be configured to sense tampering. The security shield can also be integrated into the first part of the housing, wherein a second area of the circuit board is covered by the housing and is outside of the security shield, both the first area and the second area having electronics therein. The security electronics on the circuit board can be coupled to the security shield and the one or more pressure switches, and can be configured to zeroize data stored on the circuit board if the security shield senses tampering or if one or more of the one or more pressure sensitive switches is disengaged. | 02-23-2012 |
Patent application number | Description | Published |
20100131432 | Methods and compositions of molecular profiling for disease diagnostics - The present invention relates to compositions, kits, and methods for molecular profiling and cancer diagnostics, including but not limited to gene expression product markers, alternative exon usage markers, and DNA polymorphisms associated with cancer. In particular, the present invention provides molecular profiles associated with thyroid cancer, methods of determining molecular profiles, and methods of analyzing results to provide a diagnosis. | 05-27-2010 |
20120220474 | METHODS AND COMPOSITIONS FOR DIAGNOSIS OF THYROID CONDITIONS - The present invention relates to compositions, kits, and methods for molecular profiling and cancer diagnostics, including but not limited to genomic DNA markers associated with cancer. In particular, the present invention provides molecular profiles associated with thyroid cancer, methods of determining molecular profiles, and methods of analyzing results to provide a diagnosis. | 08-30-2012 |
20130225662 | METHODS AND COMPOSITIONS OF MOLECULAR PROFILING FOR DISEASE DIAGNOSTICS - The present invention relates to compositions, kits, and methods for molecular profiling and cancer diagnostics, including but not limited to gene expression product markers, alternative exon usage markers, and DNA polymorphisms associated with cancer. In particular, the present invention provides molecular profiles associated with thyroid cancer, methods of determining molecular profiles, and methods of analyzing results to provide a diagnosis. | 08-29-2013 |
20140349864 | METHODS AND COMPOSITIONS OF MOLECULAR PROFILING FOR DISEASE DIAGNOSTICS - The present invention relates to compositions, kits, and methods for molecular profiling and cancer diagnostics, including but not limited to gene expression product markers, alternative exon usage markers, and DNA polymorphisms associated with cancer. In particular, the present invention provides molecular profiles associated with thyroid cancer, methods of determining molecular profiles, and methods of analyzing results to provide a diagnosis. | 11-27-2014 |
Patent application number | Description | Published |
20080230282 | Modular sealed portable digital electronic controller - An electronic digital controller, such as a load cell indicator, is disclosed in which a number of components, such as a circuit board, display, and keypad are placed within an enclosure, and the enclosure is bonded closed, such as using an adhesive, to render the enclosure watertight. The keypad is a touch sensitive, capacitive keypad with no moving parts, and it is housed behind a rigid panel. An optoelectronic transceiver allows for data exchange with an electronic memory device housed in the adhesively sealed enclosure and allows for data exchange and for updating or modification of software code housed therein. Other components, such as another circuit board, a power supply, and block connectors, are placed in an adjacent enclosure, and the circuit boards in the two enclosures are electrically connected. The power supply is preferably a potted AC power supply but may also include a battery. | 09-25-2008 |
20110017522 | Modular sealed portable digital electronic controller - An electronic digital controller, such as a load cell indicator, is disclosed in which a number of components, such as a circuit board, display, and keypad are placed within an enclosure, and the enclosure is bonded closed, such as using an adhesive, to render the enclosure watertight. The keypad is a touch sensitive, capacitive keypad with no moving parts, and it is housed behind a rigid panel. An optoelectronic transceiver allows for data exchange with an electronic memory device housed in the adhesively sealed enclosure and allows for data exchange and for updating or modification of software code housed therein. Other components, such as another circuit board, a power supply, and block connectors, are placed in an adjacent enclosure, and the circuit boards in the two enclosures are electrically connected. The power supply is preferably a potted AC power supply but may also include a battery. | 01-27-2011 |
Patent application number | Description | Published |
20110256846 | SYSTEMS AND METHOD FOR MEDIA TRANSFER - Components of a mobile traffic network and components in communication with the network cooperate to confirm whether a mobile station user or account owner has previously purchased media content for a particular mobile station. Media content that has already been purchased by a user can be downloaded by that user to a new mobile station after the initial mobile station is lost, damaged, or upgraded. | 10-20-2011 |
20130337798 | SYSTEMS AND METHOD FOR MEDIA TRANSFER - Components of a mobile traffic network and components in communication with the network cooperate to confirm whether a mobile station user or account owner has previously purchased media content for a particular mobile station. Media content that has already been purchased by a user can be downloaded by that user to a new mobile station after the initial mobile station is lost, damaged, or upgraded. | 12-19-2013 |
20150049754 | TELEPHONY ENABLED INFORMATION EXCHANGE - Systems and methods for IMS telephony enabled information exchange are disclosed. In some implementations, a transfer request to transfer a file from a first user to a second user is received at a IMS gateway and during an ongoing telephone call established between a first device associated with the first user and a second device associated with the second user. The second user on the ongoing telephone call is identified at the IMS gateway. Upon identifying the second user and responsive to the transfer request, the file is transferred from the first user to the second user. | 02-19-2015 |
20150055850 | System For and Method Of Paper Note Authentication and Tracking Through NFC - A system for and method of paper note authentication and tracking through NFC is presented. The system and method includes utilizing an authenticating device to receive paper note data using an NFC reader, transmit the paper note data to an authenticating party, receive an authentication determination and/or additional paper note data, and authenticate the paper note where the authentication determination indicates accordingly. The system and method may further include updating the paper note data upon authentication to prevent duplicate authentication attempts. | 02-26-2015 |
20150058220 | PAYMENT PRE-AUTHORIZATION - A computing device may receive account information identifying a user account and may authenticate the computing device as authorized to configure pre-authorized transactions for the identified user account. The computing device may receive pre-authorization parameters specifying limitations on transactions to be performed using a payment card associated with the user account, the limitations being separate from limitations on use of the payment card specified in a cardholder agreement associated with the payment card, and may provide a pre-authorization request to a transaction authorization server authorizing transactions performed using the payment card, the pre-authorization request including the account information and the pre-authorization parameters. | 02-26-2015 |
Patent application number | Description | Published |
20140043141 | SERVICE IDENTIFICATION AUTHENTICATION - A server receives a service personnel identification verification request from a computing device. The request includes identification information obtained via the computing device from a security badge. The computer determines whether there is a security concern with the identification information by comparing the identification information to stored service personnel information in a service personnel database. A response is sent to the computing device indicating the result of the determination, for presentation to a user who may be interacting with a person having the security badge. | 02-13-2014 |
20140058893 | ORDERING FROM A MENU VIA NFC ENABLED MOBILE DEVICE - An NFC-enabled mobile device is used to select one or more items identified on a menu of a business establishment. The mobile device transmits an order for the selected items to a server of the establishment when the mobile device is brought within range of a near field communication terminal at the premises of the establishment. The mobile device receives a message from the server of the establishment via the wireless transceiver of the device. Based on the information from the message, the mobile device presents to the customer an indication of the status of fulfillment of the order. An initial order of the selection may be sent prior to the order by the mobile device through NFC or other networks, or may be sent via a different device. | 02-27-2014 |
20140099922 | INTERFACE FOR SYNCHRONIZING AUTOMATED REPLIES BETWEEN DIFFERENT MESSAGING SYSTEMS - Systems and techniques are provided for synchronizing automated reply configuration settings between different messaging services for an individual user of a mobile device. User account information and an authentication key are registered at a server of a first messaging service associated with the mobile device and a second messaging service associated with a client of the second messaging service. In response to a request for access to an automated reply function of the first messaging service from the client of the second messaging service, it is determined whether or not the client is authorized for access based on a comparison of authentication information included in the client's request with the authentication key registered for the mobile device. If the client is authorized successfully, the client is allowed to access the automated reply function in accordance with configuration information specified in the request from the client. | 04-10-2014 |
20140152421 | NEAR FIELD COMMUNICATION BASED KEY CONTROL SERVICE - Systems and techniques for providing a near field communication (NFC) based key control service and automated notification system are provided for automatically reporting unauthorized or restricted uses of an NFC-enabled physical key to the primary user or owner of the key via a communication network. An NFC reader is configured to communicate with a server of the NFC based key control service via a network in order to report attempted violations of one or more use restrictions defined for the key, as detected by the NFC reader when the NFC tag embedded within the key is located near a third-party device associated with a restricted use of the key. | 06-05-2014 |
20150146683 | CALL CONTINUITY USING SHORT-RANGE COMMUNICATIONS HANDOFF - A call is made from a user equipment (UE) device to a first other UE device that is is paired to a short range communications device. The first other UE device monitors the respective connections between short range communications device and the first other UE device and a second other UE device and automatically hands over the telephone call from the first other UE device to the second other UE device when the connection between the short range communications device and the second other UE device is stronger than the connection between the short-range communications device and the other first UE device. The cordless headset 172 is concurrently handed off from the first other UE device to the second other UE device. | 05-28-2015 |
20150179069 | ACCIDENT PREVENTION SYSTEM - A vehicle system may include a communication device configured to receive road data. The system may also include an application, having a processor and a memory, configured to analyze the road data in view of the at least one vehicle attribute included in vehicle data. The application may also determine whether the road data is relevant and transmit, in response to the road data being relevant, a command to a display unit to display information based on the analysis of the road data. | 06-25-2015 |
20150189542 | CONTENT MANAGEMENT DELIVERY SYSTEM (CMDS) FACILITATED LOCAL ACCESS SYSTEM - A method of sharing a streaming content item to a target user equipment (UE) device on a network includes identifying a UE device on the network that is currently receiving the content item. The method determines whether the target and source UE devices are serviced by a common base station. If they are, the method commands the base station to multicast the content item to the UE device and the target UE device. The method also includes sharing a content item stored on a first UE device with a second UE device by commanding the first UE device to send the content item to the second UE device without going through the network or by commanding the first UE device to upload the content item to the base station and then downloading the content item from the base station to the first UE device. | 07-02-2015 |
20150189552 | MOBILE DEVICE WITH GUARANTEED QOS - A mobile device includes a transceiver that receives data from a network, and transmits data to the network, an input interface that receives input data from a user of the device, and a processor. The processor is configured to receive an input from the input interface indicating a desired quality of service (QoS) requested by the user for a communication session through the network. The processor is also configured to append a code corresponding to the desired QoS to a session initiation protocol (SIP) invite message relating to set-up of the communication session, and transmit the SIP invite message to the network by the transceiver to control the network to provide the desired QoS during communication between the mobile device and another device via the communication session through the network. | 07-02-2015 |
Patent application number | Description | Published |
20110154313 | Updating A Firmware Package - Updating a firmware package including receiving an update package for the firmware package, the firmware package including currently installed components supporting one of a plurality of software layers, the update package including update components that correspond to the currently installed components; retrieving information describing a state of the currently installed components; comparing the information describing the state of the currently installed components to information describing a state of the corresponding update components; constructing a revised update package that includes only update components having a state more recent than the state of the corresponding currently installed components; and updating the currently installed components with corresponding update components of the revised update package. | 06-23-2011 |
20110154324 | Virtual Machine Administration For Data Center Resource Managers - Virtual machine administration for data center resource managers including discovering resources of the datacenter to be managed by a resource manager; determining, in dependence upon attributes of the resources, processing capabilities of the discovered resources; determining, in dependence upon attributes of the resources of the datacenter to be managed, memory capabilities of the discovered resources; determining, in dependence upon attributes of the resources, minimum memory requirements for managing the discovered resources; determining, in dependence upon attributes of the resources of the datacenter to be managed, minimum processing requirements for managing the discovered resources; deploying, in dependence upon the determined processing capabilities and memory capabilities upon one or more of the resources of the datacenter to be managed, a virtual machine having at least the minimum memory requirements and the minimum processing requirements; and deploying the resource manager on the virtual machine. | 06-23-2011 |
Patent application number | Description | Published |
20090144256 | Workflow control in a resource hierarchy - Illustrative embodiments provide a computer implemented method, an apparatus and a computer program product for workflow management control in a resource hierarchy. In one embodiment, the computer implemented method comprises, receiving data, from a plurality of target data sources, into a collection, and synthesizing the received data in the collection to establish a resource hierarchy. The collection is then queried, using criteria in a request for a resource from a requester to provide a selected resource from the collection, forming a response, the selected resource of the response being a best fit result, and returning the response to the requester. | 06-04-2009 |
20090280899 | GAME CONSOLE CONTROL TO INITIATE SYSTEM DIRECTIVES - A method and system for utilizing a game console and an input device is disclosed. The method and system comprise mapping commands to system directives of the game console and generating an input signal having predefined characteristics corresponding to the input device being utilized to engage the system directives. The method and system include performing system functions using an input controller associated with the input device after the system directives are engaged. | 11-12-2009 |
20100180025 | DYNAMIC LOAD BALANCING BETWEEN CHASSIS IN A BLADE CENTER - A computer-implemented method, system and computer program product for load balancing between different blade chassis within a blade center are presented. Each blade chassis is monitored for total data traffic to and from that blade chassis. If a first blade chassis within the blade center is overworked, then a most overtaxed blade within that first blade chassis is disabled. A less utilized second blade chassis within the blade center is then identified, and a least taxed blade within the second blade chassis is assigned to take over the workload of the disabled blade from the first blade chassis. | 07-15-2010 |
20100180161 | FORCED MANAGEMENT MODULE FAILOVER BY BMC IMPEACHMENT CONCENSUS - A computer-implemented method, system and computer program product for managing failover of Management Modules (MMs) in a blade chassis are presented. Each server blade in the blade chassis evaluates a performance of a primary MM. If a threshold number of server blades determine that the primary MM is not meeting pre-determined minimum performance standards, then a secondary MM impeaches the primary MM and takes over the management of the server blades. | 07-15-2010 |
20110066840 | SYSTEM AND METHOD FOR REDUCING SUBSYSTEM ENERGY COSTS - Power supply to system resources is managed by implementing a hardware hook. System resources that should be reconfigured for an application workload are identified. A present power profile in a non-volatile memory is then updated. The present power profile is updated according to the application workload. During a system restart, the present power profile is retrieved from the non-volatile memory. Power is applied to system resources through the hardware hook based on the present power profile. | 03-17-2011 |