Patent application number | Description | Published |
20100146299 | SYSTEM AND METHOD FOR CONFIDENTIALITY-PRESERVING RANK-ORDERED SEARCH - A confidentiality preserving system and method for performing a rank-ordered search and retrieval of contents of a data collection. The system includes at least one computer system including a search and retrieval algorithm using term frequency and/or similar features for rank-ordering selective contents of the data collection, and enabling secure retrieval of the selective contents based on the rank-order. The search and retrieval algorithm includes a baseline algorithm, a partially server oriented algorithm, and/or a fully server oriented algorithm. The partially and/or fully server oriented algorithms use homomorphic and/or order preserving encryption for enabling search capability from a user other than an owner of the contents of the data collection. The confidentiality preserving method includes using term frequency for rank-ordering selective contents of the data collection, and retrieving the selective contents based on the rank-order. | 06-10-2010 |
20110016226 | Methods and Apparatus for Updating Index Information While Adding and Updating Documents in a Distributed Network - Systems and methods are described herein for updating documents in a distributed network. When a new document needs to be added to the network, or when changes are to be made to an existing document, keywords are extracted from the document and used to generate update messages for each keyword. The nodes responsible for each keyword are determined. The individual update messages are consolidated into a composite update messages that is sent to a first node in the network. The first node extracts those portions of the composite message associated with it, and forwards the composite message to a second node in the network. | 01-20-2011 |
20110072055 | Methods and Apparatus for a Plug-In Model for Publishing Structured Meta-Data Based Discovery - Methods and apparatus for publishing services and performing queries for service in a network are described herein. Service descriptions writing in a native search description language are translated to a normalized schema. The normal schema is published to the network. Queries to the network, which may be written in any native search description language, are also translated to normalized schema prior to performing the search. Accordingly, all services available can be published and located in a query without consideration of the native search description language. | 03-24-2011 |
20120011119 | OBJECT RECOGNITION SYSTEM WITH DATABASE PRUNING AND QUERYING - A database for object recognition is generated by performing at least one of intra-object pruning and inter-object pruning, as well as keypoint clustering and selection. Intra-object pruning removes similar and redundant keypoints within an object and different views of the same object, and may be used to generate and associate a significance value, such as a weight, with respect to remaining keypoint descriptors. Inter-object pruning retains the most informative set of descriptors across different objects, by characterizing the discriminability of the keypoint descriptors for all of the objects and removing keypoint descriptors with a discriminability that is less than a threshold. Additionally, a mobile platform may download a geographically relevant portion of the database and perform object recognition by extracting features from the query image and using determined confidence levels for each query feature during outlier removal. | 01-12-2012 |
20120011142 | FEEDBACK TO IMPROVE OBJECT RECOGNITION - A database for object recognition is modified based on feedback information received from a mobile platform. The feedback information includes information with respect to an image of an object captured by the mobile platform. The feedback information, for example, may include the image, features extracted from the image, a confidence level for the features, posterior probabilities of the features belonging to an object in the database, GPS information, and heading orientation information. The feedback information may be used to improve the database pruning, add content to the database or update the database compression efficiency. The information feedback to the server by the mobile platform may be determined based on a search of a portion of the database performed by the mobile platform using features extracted from a captured query image. | 01-12-2012 |
20120011150 | Methods and Apparatus for Efficiently Processing Multiple Keyword Queries on a Distributed Network - Methods and apparatus are described herein for performing AND/OR searching using multiple keywords. A query is received at a first node in a network having multiple keywords. The first node determines a set of documents matching a first of the multiple keywords, and computes an ideal Bloom filter representing those keywords. The first node sends the query and the Bloom filter to a second node, which determines its search results for a second of the multiple keywords in accordance with the Bloom filter. | 01-12-2012 |
20120027290 | OBJECT RECOGNITION USING INCREMENTAL FEATURE EXTRACTION - In one example, an apparatus includes a processor configured to extract a first set of one or more keypoints from a first set of blurred images of a first octave of a received image, calculate a first set of one or more descriptors for the first set of keypoints, receive a confidence value for a result produced by querying a feature descriptor database with the first set of descriptors, wherein the result comprises information describing an identity of an object in the received image, and extract a second set of one or more keypoints from a second set of blurred images of a second octave of the received image when the confidence value does not exceed a confidence threshold. In this manner, the processor may perform incremental feature descriptor extraction, which may improve computational efficiency of object recognition in digital images. | 02-02-2012 |
20120062702 | ONLINE REFERENCE GENERATION AND TRACKING FOR MULTI-USER AUGMENTED REALITY - A multi-user augmented reality (AR) system operates without a previously acquired common reference by generating a reference image on the fly. The reference image is produced by capturing at least two images of a planar object and using the images to determine a pose (position and orientation) of a first mobile platform with respect to the planar object. Based on the orientation of the mobile platform, an image of the planar object, which may be one of the initial images or a subsequently captured image, is warped to produce the reference image of a front view of the planar object. The reference image may be produced by the mobile platform or by, e.g., a server. Other mobile platforms may determine their pose with respect to the planar object using the reference image to perform a multi-user augmented reality application. | 03-15-2012 |
20120243732 | Adaptable Framework for Cloud Assisted Augmented Reality - A mobile platform efficiently processes sensor data, including image data, using distributed processing in which latency sensitive operations are performed on the mobile platform, while latency insensitive, but computationally intensive operations are performed on a remote server. The mobile platform acquires sensor data, such as image data, and determines whether there is a trigger event to transmit the sensor data to the server. The trigger event may be a change in the sensor data relative to previously acquired sensor data, e.g., a scene change in an image. When a change is present, the sensor data may be transmitted to the server for processing. The server processes the sensor data and returns information related to the sensor data, such as identification of an object in an image or a reference image or model. The mobile platform may then perform reference based tracking using the identified object or reference image or model. | 09-27-2012 |
20120293635 | HEAD POSE ESTIMATION USING RGBD CAMERA - A three-dimensional pose of the head of a subject is determined based on depth data captured in multiple images. The multiple images of the head are captured, e.g., by an RGBD camera. A rotation matrix and translation vector of the pose of the head relative to a reference pose is determined using the depth data. For example, arbitrary feature points on the head may be extracted in each of the multiple images and provided along with corresponding depth data to an Extended Kalman filter with states including a rotation matrix and a translation vector associated with the reference pose for the head and a current orientation and a current position. The three-dimensional pose of the head with respect to the reference pose is then determined based on the rotation matrix and the translation vector. | 11-22-2012 |
20130007442 | FACILITATING GROUP ACCESS CONTROL TO DATA OBJECTS IN PEER-TO-PEER OVERLAY NETWORKS - Methods and apparatuses are provided for facilitating group access controls in peer-to-peer or other similar overlay networks. A group administrator may create a group in the overlay network and may assign peer-specific certificates to each member of the group for indicating membership in the group. A group member peer node can access data objects in the overlay network using its respective peer-specific certificate to authenticate itself as a group member. The authentication is performed by another peer node in the network. The validating peer node can authenticate that the group member is the rightful possessor of the peer-specific certificate using a public key associated with the peer node to which the peer-specific certificate was issued. The validating peer node can also validate that the peer-specific certificate was properly issued to the group member using a public key of the apparatus that issued the peer-specific certificate. | 01-03-2013 |
20130057700 | LINE TRACKING WITH AUTOMATIC MODEL INITIALIZATION BY GRAPH MATCHING AND CYCLE DETECTION - A vision based tracking system in a mobile platform tracks objects using groups of detected lines. The tracking system detects lines in a captured image of the object to be tracked. Groups of lines are formed from the detected lines. The groups of lines may be formed by computing intersection points of the detected lines and using intersection points to identified connected lines, where the groups of lines are formed using connected lines. A graph of the detected lines may be constructed and intersection points identified. Interesting subgraphs are generated using the connections and the group of lines is formed with the interesting subgraphs. Once the groups of lines are formed, the groups of lines are used to track the object, e.g., by comparing the groups of lines in a current image of the object to groups of lines in a previous image of the object. | 03-07-2013 |
20130076915 | FRAMEWORK FOR REFERENCE-FREE DRIFT-CORRECTED PLANAR TRACKING USING LUCAS-KANADE OPTICAL FLOW - Reference free tracking of position by a mobile platform is performed using images of a planar surface. Tracking is performed optical flow techniques, such as pyramidal Lucas-Kanade optical flow with multiple levels of resolution, where displacement is determined with pixel accuracy at lower resolutions and at sub-pixel accuracy at full resolution, which improves computation time for real time performance. Periodic drift correction is performed by matching features between a current frame and a keyframe. The keyframe may be replaced with the drift corrected current image. | 03-28-2013 |
20130117769 | SENSOR API FRAMEWORK FOR CLOUD BASED APPLICATIONS - An apparatus and method for a framework exposing an API (application programming interface) to web-based server applications on the internet or in the cloud is presented. The API allows server applications to retrieve sensor data from a mobile device via a low-power sensor core processor on a mobile device. This API eliminates effort and cost associated with developing and promoting a new mobile device client application. The API framework includes APIs that web-based application may use to fetch sensor data from one or more particular sensors on the mobile device. | 05-09-2013 |
20130191518 | METHOD AND APPARATUS FOR AUTOMATIC SERVICE DISCOVERY AND CONNECTIVITY - Apparatus and methods for automatic service discovery and connectivity include acts of or components for retrieving service metadata associated with one or more service devices from a connectivity entity, wherein the service metadata comprises connectivity parameters, and configuring one or more links with at least one of the one or more service devices based on the service metadata. Further, the apparatus and methods may include acts of or components for using a service available from the one or more service devices through the one or more links. | 07-25-2013 |
20130223279 | SENSOR BASED CONFIGURATION AND CONTROL OF NETWORK DEVICES - A mobile device, such as a smartphone or a tablet computer, can execute functionality for configuring a network device in a communication network and for subsequently controlling the operation of the network device with little manual input. The mobile device can detect, from the network device, sensor information that is indicative of configuration information associated with the network device. The mobile device can decode the received sensor information to determine the configuration information and can accordingly enroll the network device in the communication network. In response to determining to control the enrolled network device, the mobile device can capture an image of the network device and can use the captured image to unambiguously identify the network device. The mobile device can establish a communication link with the network device and can transmit one or more commands to vary operating parameters of the network device. | 08-29-2013 |
20140059037 | DETERMINING CAPACITY OF SEARCH STRUCTURES - A system for storing target images for object recognition predicts a querying performance for the target image if the target image were included in a search tree of a database. The search tree has a universal search tree structure that is fixed so that it does not change with the addition of new target images. The target image is selected for inclusion or exclusion in the search tree based on the based on the querying performance, wherein the fixed tree structure of the search tree does not change if inclusion of the target image is selected. | 02-27-2014 |
20140122378 | RULES ENGINE AS A PLATFORM FOR MOBILE APPLICATIONS - Disclosed are systems and methods for providing a rules engine as a platform within a portable electronic device. In one embodiment, a rules engine platform is provided within a portable electronic device by receiving a plurality of rules for one or more modules of the portable electronic device. Additionally, the rules engine platform can receive one or more samples from one or more of the modules within the portable electronic device. The rules engine platform identifies and evaluates one or more relevant rules based on the received sample. The rules engine platform can then determine an action to provide to other modules of the portable electronic device. The rules engine platform may be configured to optimize the performance and power consumption of the portable electronic device. | 05-01-2014 |
20140122396 | RULES ENGINE AS A PLATFORM FOR MOBILE APPLICATIONS - Disclosed are systems and methods to optimize a rules engine as a platform within a computing system. The computing system may identify a context of interest, such as environment or circumstance of the computing system or a user of the computing system. Based on the identified context of interest, the rules engine platform may selectively identify rules or sets of rules that are relevant to the context of interest. Accordingly, rules or sets of rules that are irrelevant to the context of interest may be omitted from evaluation. Therefore, resources of the computing system may not consumed in some embodiments by resolving conflicts between rules and evaluating rules that result in actions that are not suitable for the context of interest. | 05-01-2014 |
20140125700 | USING A PLURALITY OF SENSORS FOR MAPPING AND LOCALIZATION - Systems and methods for performing localization and mapping with a mobile device are disclosed. In one embodiment, a method for performing localization and mapping with a mobile device includes identifying geometric constraints associated with a current area at which the mobile device is located, obtaining at least one image of the current area captured by at least a first camera of the mobile device, obtaining data associated with the current area via at least one of a second camera of the mobile device or a sensor of the mobile device, and performing localization and mapping for the current area by applying the geometric constraints and the data associated with the current area to the at least one image. | 05-08-2014 |
20140168056 | ENABLING AUGMENTED REALITY USING EYE GAZE TRACKING - Methods and apparatus relating to enabling augmented reality applications using eye gaze tracking are disclosed. An exemplary method according to the disclosure includes displaying an image to a user of a scene viewable by the user, receiving information indicative of an eye gaze of the user, determining an area of interest within the image based on the eye gaze information, determining an image segment based on the area of interest, initiating an object recognition process on the image segment, and displaying results of the object recognition process. | 06-19-2014 |
20140211659 | SYSTEMS AND METHODS FOR MONITORING THE SIZE OF A WIRELESS NETWORK - Systems and methods for monitoring the number of neighboring wireless devices in a wireless network are described herein. In one aspect, the method includes receiving a message from one of the neighboring wireless devices having an identifier associated with the neighboring wireless device and adding the identifier into a Bloom filter. The method may further include estimating the number of distinct strings that have been added into the Bloom filter based on the number of zeros in the Bloom filter, the number of distinct strings representing an estimate of the number of neighboring wireless devices in the wireless network. | 07-31-2014 |
20140267799 | ALWAYS-ON CAMERA SAMPLING STRATEGIES - Embodiments of the present invention are directed toward providing intelligent sampling strategies that make efficient use of an always-on camera. To do so, embodiments can utilize sensor information to determine contextual information regarding the mobile device and/or a user of the mobile device. A sampling rate of the always-on camera can then be modulated based on the contextual information. | 09-18-2014 |
20140269555 | SYSTEMS AND METHODS FOR SHARING CONTEXT INFORMATION IN A NEIGHBOR AWARE NETWORK - Systems and methods share context information on a neighbor aware network. A method for communicating data in a wireless communications network is disclosed. The method includes receiving, by a device, a first message from a station, decoding the message to determine service information, the service information identifying a service provided by the station, generating a second message, wherein the second message is generated to indicate the service provided by the station and service information of the device, and transmitting, by the device, the second message to a remote station. | 09-18-2014 |
20140269658 | SYSTEMS AND METHODS FOR SHARING CONTEXT INFORMATION IN A NEIGHBOR AWARE NETWORK - Systems and methods share context information on a neighbor aware network. In one aspect, a context providing device receives a plurality of responses to a discovery query from a context consuming device, and tailors services it offers to the context consuming device based on the responses. In another aspect, a context providing device indicates in its response to a discovery query which services or local context information it can provide to the context consuming device, and also a cost associated with providing the service or the local context information. In some aspects, the cost is in units of monetary currency. In other aspects, the cost is in units of user interface display made available to an entity associated with the context providing device in exchange for the services or local context information offered to the context consuming device. | 09-18-2014 |
20140278238 | SPECTROMETER FOR PERSONAL CONTEXT - A method of performing context inference is described. The method includes collecting ambient light at a spectrometer sensor integrated in a portable device, characterizing the collected light to obtain optical information, comparing the optical information to optical data predetermined to match one or more contexts, inferring at least one characteristic of a specific context based on the comparison, and determining a probability that the portable device is in the specific context. | 09-18-2014 |
20140279790 | CONTEXT AWARE LOCALIZATION, MAPPING, AND TRACKING - Exemplary methods, apparatuses, and systems infer a context of a user or device. A computer vision parameter is configured according to the inferred context. Performing a computer vision task, in accordance with the configured computer vision parameter. The computer vision task may by at least one of: a visual mapping of an environment of the device, a visual localization of the device or an object within the environment of the device, or a visual tracking of the device within the environment of the device. | 09-18-2014 |
20140280184 | Updating Index Information When Adding Or Removing Documents - In several aspects, an electronic device and method index a repository of N documents by W words, by not storing between queries, N*W numbers that are specific to each word i and each document j, normally used to compute a score of relevance to a query, of each document j. Instead, the electronic device and method generate the N*W word-specific-document-specific numbers dynamically at query time, based on a set of W numbers corresponding to the W words, and one or more sets (e.g. x sets) of N numbers corresponding to the N documents. Query-time generation of word-specific-document-specific numbers reduces memory otherwise required, e.g. to store these numbers. Hence, in certain aspects W+xN numbers are maintained between queries, and these numbers are changed incrementally when a new document is added to the set or an existing document is removed. Maintaining W+xN numbers reduces processing otherwise required, to start from scratch. | 09-18-2014 |
20140368626 | COMPUTER VISION APPLICATION PROCESSING - Methods, systems, and techniques to enhance computer vision application processing are disclosed. In particular, the methods, systems, and techniques may reduce power consumption for computer vision applications and improve processing efficiency for computer vision applications. | 12-18-2014 |
20140368688 | COMPUTER VISION APPLICATION PROCESSING - Methods, systems, and techniques to enhance computer vision application processing are disclosed. In particular, the methods, systems, and techniques may reduce power consumption for computer vision applications and improve processing efficiency for computer vision applications. | 12-18-2014 |
20150146926 | POWER EFFICIENT USE OF A DEPTH SENSOR ON A MOBILE DEVICE - Systems, apparatus and methods in a mobile device to enable and disable a depth sensor for tracking pose of the mobile device are presented. A mobile device relaying on a camera without a depth sensor may provide inadequate pose estimates, for example, in low light situations. A mobile device with a depth sensor uses substantial power when the depth sensor is enabled. Embodiments described herein enable a depth sensor only when images are expected to be inadequate, for example, accelerating or moving too fast, when inertial sensor measurements are too noisy, light levels are too low or high, an image is too blurry, or a rate of images is too slow. By only using a depth sensor when images are expected to be inadequate, battery power in the mobile device may be conserved and pose estimations may still be maintained. | 05-28-2015 |
20150193935 | ONLINE REFERENCE GENERATION AND TRACKING FOR MULTI-USER AUGMENTED REALITY - A multi-user augmented reality (AR) system operates without a previously acquired common reference by generating a reference image on the fly. The reference image is produced by capturing at least two images of a planar object and using the images to determine a pose (position and orientation) of a first mobile platform with respect to the planar object. Based on the orientation of the mobile platform, an image of the planar object, which may be one of the initial images or a subsequently captured image, is warped to produce the reference image of a front view of the planar object. The reference image may be produced by the mobile platform or by, e.g., a server. Other mobile platforms may determine their pose with respect to the planar object using the reference image to perform a multi-user augmented reality application. | 07-09-2015 |
20150327304 | SENSOR BASED CONFIGURATION AND CONTROL OF NETWORK DEVICES - A mobile device, such as a smartphone or a tablet computer, can execute functionality for configuring a network device in a communication network and for subsequently controlling the operation of the network device with little manual input. The mobile device can detect sensor information from a network device. The mobile device can determine device configuration information based, at least in part, on decoding the sensor information. The mobile device can provide the device configuration information to an access point of a network. The mobile device can receive communication link information from the access point. The mobile device can provide the communication link information to the network device. The mobile device can receive a message indicating a communication link between the network device and the access point is established. | 11-12-2015 |
Patent application number | Description | Published |
20110256726 | PLASMA ACTIVATED CONFORMAL FILM DEPOSITION - Methods of depositing a film on a substrate surface include surface mediated reactions in which a film is grown over one or more cycles of reactant adsorption and reaction. In one aspect, the method is characterized by the following operations: (a) exposing the substrate surface to a first reactant in vapor phase under conditions allowing the first reactant to adsorb onto the substrate surface; (b) exposing the substrate surface to a second reactant in vapor phase while the first reactant is adsorbed on the substrate surface; and (c) exposing the substrate surface to plasma to drive a reaction between the first and second reactants adsorbed on the substrate surface to form the film. | 10-20-2011 |
20120028454 | PLASMA ACTIVATED CONFORMAL DIELECTRIC FILM DEPOSITION - Methods of depositing a film on a substrate surface include surface mediated reactions in which a film is grown over one or more cycles of reactant adsorption and reaction. In one aspect, the method is characterized by intermittent delivery of dopant species to the film between the cycles of adsorption and reaction. | 02-02-2012 |
20130040447 | CONFORMAL DOPING VIA PLASMA ACTIVATED ATOMIC LAYER DEPOSITION AND CONFORMAL FILM DEPOSITION - Disclosed herein are methods of doping a patterned substrate in a reaction chamber. The methods may include forming a first conformal film layer which has a dopant source including a dopant, and driving some of the dopant into the substrate to form a conformal doping profile. In some embodiments, forming the first film layer may include introducing a dopant precursor into the reaction chamber, adsorbing the dopant precursor under conditions whereby it forms an adsorption-limited layer, and reacting the adsorbed dopant precursor to form the dopant source. Also disclosed herein are apparatuses for doping a substrate which may include a reaction chamber, a gas inlet, and a controller having machine readable code including instructions for operating the gas inlet to introduce dopant precursor into the reaction chamber so that it is adsorbed, and instructions for reacting the adsorbed dopant precursor to form a film layer containing a dopant source. | 02-14-2013 |
20130309415 | SYSTEMS AND METHODS FOR MODULATING STEP COVERAGE DURING CONFORMAL FILM DEPOSITION - Systems and methods for processing a substrate include a) arranging a substrate on a pedestal in a processing chamber; b) supplying precursor to the processing chamber; c) purging the processing chamber; d) performing radio frequency (RF) plasma activation; e) purging the processing chamber; and f) prior to purging the processing chamber in at least one of (c) or (e), setting a vacuum pressure of the processing chamber to a first predetermined pressure that is less than a vacuum pressure during at least one of (b) or (d) for a first predetermined period. | 11-21-2013 |
20140030444 | HIGH PRESSURE, HIGH POWER PLASMA ACTIVATED CONFORMAL FILM DEPOSITION - Methods and apparatus for depositing a film on a substrate surface including plasma assisted surface mediated reactions in which a film is grown over one or more cycles of reactant adsorption and reaction are provided. The embodiments disclosed herein relate to methods and apparatus for performing conformal film deposition and atomic layer deposition reactions that result in highly uniform films with low particle contamination. According to various embodiments, the methods and apparatus involve high deposition chamber pressures and plasma generation using high radio frequency powers. | 01-30-2014 |
20140106574 | GAPFILL OF VARIABLE ASPECT RATIO FEATURES WITH A COMPOSITE PEALD AND PECVD METHOD - Provided herein are methods and apparatus for filling one or more gaps on a semiconductor substrate. The disclosed embodiments are especially useful for forming seam-free, void-free fill in both narrow and wide features. The methods may be performed without any intervening etching operations to achieve a single step deposition. In various implementations, a first operation is performed using a novel PEALD fill mechanism to fill narrow gaps and line wide gaps. A second operation may be performed using PECVD methods to continue filling the wide gaps. | 04-17-2014 |
20140120737 | SUB-SATURATED ATOMIC LAYER DEPOSITION AND CONFORMAL FILM DEPOSITION - Methods and apparatus for depositing continuous thin films using plasma-activated sub-saturated atomic layer deposition are provided herein. According to various embodiments, pin-hole free continuous films may be deposited at thicknesses thinner than achievable with conventional methods. The methods and apparatus also provide high degree of thickness control, with films a per-cycle thickness tunable to as low as 0.1 Å in some embodiments. Further, the methods and apparatus may be used to provide films having improved properties, such as lower wet etch rate, in some embodiments. | 05-01-2014 |
20140134827 | CONFORMAL FILM DEPOSITION FOR GAPFILL - A method and apparatus for conformally depositing a dielectric oxide in high aspect ratio gaps in a substrate is disclosed. A substrate is provided with one or more gaps into a reaction chamber where each gap has a depth to width aspect ratio of greater than about 5:1. A first dielectric oxide layer is deposited in the one or more gaps by CFD. A portion of the first dielectric oxide layer is etched using a plasma etch, where etching the portion of the first dielectric oxide layer occurs at a faster rate near a top surface than near a bottom surface of each gap so that the first dielectric oxide layer has a tapered profile from the top surface to the bottom surface of each gap. A second dielectric oxide layer is deposited in the one or more gaps over the first dielectric oxide layer via CFD. | 05-15-2014 |
20140141542 | METHODS FOR DEPOSITING FILMS ON SENSITIVE SUBSTRATES - Methods and apparatus to form films on sensitive substrates while preventing damage to the sensitive substrate are provided herein. In certain embodiments, methods involve forming a bilayer film on a sensitive substrate that both protects the underlying substrate from damage and possesses desired electrical properties. Also provided are methods and apparatus for evaluating and optimizing the films, including methods to evaluate the amount of substrate damage resulting from a particular deposition process and methods to determine the minimum thickness of a protective layer. The methods and apparatus described herein may be used to deposit films on a variety of sensitive materials such as silicon, cobalt, germanium-antimony-tellerium, silicon-germanium, silicon nitride, silicon carbide, tungsten, titanium, tantalum, chromium, nickel, palladium, ruthenium, or silicon oxide. | 05-22-2014 |
20140216337 | PLASMA ACTIVATED CONFORMAL DIELECTRIC FILM DEPOSITION - Methods of depositing a film on a substrate surface include surface mediated reactions in which a film is grown over one or more cycles of reactant adsorption and reaction. In one aspect, the method is characterized by intermittent delivery of dopant species to the film between the cycles of adsorption and reaction. | 08-07-2014 |
20150107513 | SYSTEMS FOR MODULATING STEP COVERAGE DURING CONFORMAL FILM DEPOSITION - A system for processing a substrate include a processing chamber including a pedestal to support a substrate and a controller configured to a) supply precursor to the processing chamber; b) purge the processing chamber; c) perform radio frequency (RF) plasma activation; d) purge the processing chamber; and e) prior to purging the processing chamber in at least one of (b) or (d), set a vacuum pressure of the processing chamber to a first predetermined pressure that is less than a vacuum pressure during at least one of (a) or (c) for a first predetermined period. | 04-23-2015 |
20160032453 | SYSTEMS AND METHODS FOR VAPOR DELIVERY - A vapor delivery system includes an ampoule to store liquid precursor and a heater to partially vaporize the liquid precursor. A first valve communicates with a push gas source and the ampoule. A second valve supplies vaporized precursor to a heated injection manifold. A valve manifold includes a first node in fluid communication with an outlet of the heated injection manifold, a third valve having an inlet in fluid communication with the first node and an outlet in fluid communication with vacuum, a fourth valve having an inlet in fluid communication with the first node and an outlet in fluid communication with a second node, a fifth valve having an outlet in fluid communication with the second node, and a sixth valve having an outlet in fluid communication with the second node. A gas distribution device is in fluid communication with the second node. | 02-04-2016 |
Patent application number | Description | Published |
20120173865 | System And Method For Generating Multiple Protected Content Formats Without Redundant Encryption Of Content - Embodiments may include generating a first protected version of content, which may include packetizing the content into multiple packets that each includes content information and non-content information and using initialization vectors to perform chained encryption on multiple blocks of the packetized content. At least some of the initialization vectors are generated dependent upon the non-content information. Embodiments may also include using the encrypted blocks to generate a second protected version of the content without re-encrypting the content. The second protected version of the content may include multiple encrypted content samples each including multiple encrypted blocks from the first protected version of the content. For a given encrypted content sample, different sets of encrypted blocks in that sample may form different encryption chains. The second protected version of the content may include decryption information for decrypting the encrypted content samples including initialization vectors used to create the first protected version. | 07-05-2012 |
20120173880 | System And Method For Decrypting Content Samples Including Distinct Encryption Chains - Embodiments may be configured to receive a protected version of content that includes multiple encrypted content samples. In various embodiments, each encrypted content sample includes multiple encrypted blocks. For a given encrypted content sample, different sets of encrypted blocks in that sample may form different encryption chains. The protected version of the content may further include decryption information for decrypting the encrypted content samples. The decryption information may include at least some initialization vectors generated dependent upon non-content information that is not included in the protected version of the content. The non-content information may be from a different protected version of the content. Embodiments may be configured to use the decryption information to decrypt one or more of the encrypted content samples. | 07-05-2012 |
20130128992 | Methods and Apparatus for Preparation of Casual Stereoscopic Video - A pair of video streams is prepared for stereoscopic display. A pair of frames is rectified. Each of the pair of frames is from a respective stream of the pair of video streams. A reduced video stream is generated by removing from one of the pair of video streams a set of correlative data that is present in or can be predicted from the other of the pair of video streams. The reduced video stream and the other of the pair of video streams are compressed for use in stereoscopic display of the reduced video stream and the other of the pair of video streams. | 05-23-2013 |
20130129079 | System And Method For Decryption Of Content Including Disconnected Encryption Chains - Embodiments may include receiving a protected version of content including different encryption chains including encrypted blocks of content. The protected version of content may include decryption information for decrypting the encrypted chains; the decryption information may include initialization vectors that are distinct from the content. Embodiments may also include performing chained decryption on a particular sequence of data blocks including multiple encryption chains from the protected version of the content and at least some of the initialization vectors. Some of the initialization vectors may be positioned between the encryption chains within the particular sequence such that during the chained decryption the initialization vectors are decrypted in sequence with the data blocks of the encryption chains. The chained decryption may result in a sequence of decrypted data blocks including decrypted initialization vectors. Embodiments may include generating a decrypted version of the content by excluding the decrypted initialization vectors from that sequence. | 05-23-2013 |
20130129085 | System And Method For Decryption Of Content Including Partial-Block Discard - Embodiments may include receiving a protected version of content that includes multiple encryption chains each including encrypted blocks of content. The protected version of content may include one or more initialization vectors for decrypting the encrypted blocks of content and discard information that specifies non-content portions of one or more data blocks to be discarded after decryption. Embodiments may also include performing chained decryption on the multiple encryption chains using the initialization vectors specified by the decryption information. The chained decryption may result in a sequence of decrypted data blocks. Embodiments may also include, based on the discard information, locating and removing the non-content portions of one or more data blocks in the sequence of decrypted data blocks. Embodiments may also include generating the protected version of content. Embodiments may also include performing any of the aforesaid techniques on one or more computers. | 05-23-2013 |
20130132507 | System and Method for Low-Latency Content Streaming - Embodiments of a system and method for low-latency content streaming are described. In various embodiments, multiple data fragments may be sequentially generated. Each data fragment may represent a distinct portion of media content generated from a live content source. Each data fragment may include multiple sub-portions. Furthermore, for each data fragment, generating that fragment may include sequentially generating each sub-portion of that fragment. Embodiments may include, responsive to receiving a request for a particular data fragment from a client during the generation of a particular sub-portion of that particular data fragment, providing the particular sub-portion to the client subsequent to that particular sub-portion being generated and prior to the generation of that particular data fragment being completed in order to reduce playback latency at the client relative to the live content source. | 05-23-2013 |
20130163758 | Methods and Apparatus for Key Delivery in HTTP Live Streaming - A key delivery mechanism that delivers keys to an OS platform (e.g., iOS platform) devices for decrypting encrypted HTTP live streaming data. An HTTPS URL for a stateless HTTPS service is included in the manifest for an encrypted HTTP live stream obtained by an application (e.g., a browser) on an OS platform device. The URL includes an encrypted key, for example as a query parameter value. The application passes the manifest to the OS. The OS contacts the HTTPS service to obtain the key using the URL indicated in the manifest. Since the encrypted key is a parameter of the URL, the encrypted key is provided to the HTTPS service along with information identifying the content. The HTTPS service decrypts the encrypted key and returns the decrypted key to the OS over HTTPS, thus eliminating the need for a database lookup at the HTTPS service. | 06-27-2013 |
20130166906 | Methods and Apparatus for Integrating Digital Rights Management (DRM) Systems with Native HTTP Live Streaming - Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming. Several methods for integrating a DRM system with HTTP live streaming on an operating system (OS) platform are described. In each of these methods, a manifest is delivered to an application on a device; the application then accesses a remote DRM server to obtain a license and one or more keys for the content. The DRM server enforces the rights of the client in regard to the indicated content. The application may modify the manifest to indicate a method for obtaining the key. The application delivers the manifest to the OS, which uses the indicated method (e.g., a URL) to obtain the key. While similar, the methods primarily differ in the manner in which the OS is directed to obtain the key. | 06-27-2013 |
20130191489 | Media Content Streaming Using Stream Message Fragments - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for media content streaming can include transacting access information associated with a media stream and transacting one or more fragments associated with the media stream to facilitate a delivery of media content associated with the media stream. Access information can include fragment sequencing information to facilitate individual retrieval of fragments associated with the media stream using a uniform resource identifier via a processing device configured to cache content. A fragment can include one or more stream messages. A stream message can include a message header and a corresponding media data sample. The message header can include a message stream identifier, a message type identifier, a timestamp, and a message length value. | 07-25-2013 |
20130262694 | Buffering in HTTP Streaming Client - A buffer model in an HTTP streaming client may include receiving a first content fragment of a first content stream in response to a first HTTP request. It may also include receiving a second content fragment of a second content stream in response to a second HTTP request. The buffer model may further include storing the first and second content fragments in first and second buffers of a plurality of configurable buffers. The first and second content fragments may be multiplexed into a third buffer of the plurality of buffers. The multiplexed first and second content fragments may be stored in a fourth buffer of the plurality of buffers for playback. The buffer model may be implemented by an application. The buffers may be designed based on one or more constraints. | 10-03-2013 |
20140040026 | SYSTEMS AND METHODS FOR INCLUDING ADVERTISEMENTS IN STREAMING CONTENT - Various embodiments in this disclosure describe a method and a system for including advertisements in streaming content. For example, a manifest file may be accessed by a client device from a server device via a network, the manifest file including one or more media segment URLs and one or more advertisement markers arranged in a predetermined sequence. The advertisement markers included in the manifest file may be replaced by the client device with advertisement URLs associated with user-customized advertisements. The media segment URLs and the advertisement URLs included in the manifest file may then be sequentially accessed in accordance with the predetermined sequence. | 02-06-2014 |
20140040612 | SYSTEM AND METHOD FOR LOCAL GENERATION OF STREAMING CONTENT WITH A HINT TRACK - Embodiments of a system and method for local generation of streaming content with a hint track are described. Embodiments may include receiving a first version of encrypted content comprising encrypted content samples that each include media content and non-content information. Embodiments may also include receiving a hint track including packet header information for a stream of media packets from which the media content was sourced, and offset information identifying locations of encrypted media content within the encrypted content samples. Embodiments may include generating a second version of the encrypted content for streaming, which may include, based on the information of the hint track, identifying the location of media content within the encrypted content samples. Embodiments may include generating media packets within the second version of the encrypted content, each of those media packets including header information from the hint track and the identified media content from the encrypted content samples. | 02-06-2014 |
20140040630 | SYSTEM AND METHOD FOR DETECTING A SECURITY COMPROMISE ON A DEVICE - Embodiments of a system and method for detecting a security compromise on a device are described. Embodiments may be implemented by a content consumption application configured to protect content decryption keys on a device, such as a computer system (e.g., a desktop or notebook computer) or a mobile device (e.g., a smartphone or tablet). For instance, the content consumption application may be configured to provide decryption keys for respective content to a media component (or another component of the operating system) if multiple conditions have been met. For instance, in various embodiments, the content consumption application may pass the key to the media component after ensuring that i) one or more security mechanisms of the device operating system have not been compromised and ii) one or more executable instructions of the content consumption application have not been tampered (e.g., instructions corresponding to a function that handles the decryption key(s)). | 02-06-2014 |
20140074859 | SYSTEM AND METHOD FOR RATING AUDIENCES OF NETWORK-BASED CONTENT OF MULTIPLE CONTENT PUBLISHERS - Embodiments of a system and method for rating audiences of network-based content of multiple content publishers are described. Embodiments may include, for each of multiple users, receiving usage information specifying one or more attributes of the user's content consumption activity with respect to network-based content. The usage information received for at least some of the users may be associated with network-based content from multiple different content publishers (e.g., different websites that host content portals). Embodiments may also include determining a subset of the multiple users that share one or more characteristics (e.g., demographic characteristics). Embodiments may also include generating a report based on a portion of the received usage information that is specific to the subset of the multiple users. The report may specify one or more aggregate attributes of the subset's content consumption activity. | 03-13-2014 |
20140143670 | Video Playback Analytics Collection - In embodiments of video playback analytics collection, an analytics script can be distributed to a client device along with video content that is requested by the client device. The analytics script is implemented to identify a type and/or version of a browser application that supports a video player session to playback the video content for viewing at the client device. The analytics script is also implemented to collect video playback data associated with the video content playback, detect an early end of the video player session before the playback of the video content is completed, and initiate communication of the video playback data to an analytics server. The analytics script can also initiate a timing delay to delay a browser navigation away from the video player session, where the timing delay is effective to allow communication of the video playback data to the analytics server. | 05-22-2014 |
20140245001 | Decryption of Content Including Partial-Block Discard - Embodiments may include receiving a protected version of content that includes multiple encryption chains each including encrypted blocks of content. The protected version of content may include one or more initialization vectors for decrypting the encrypted blocks of content and discard information that specifies non-content portions of one or more data blocks to be discarded after decryption. Embodiments may also include performing chained decryption on the multiple encryption chains using the initialization vectors specified by the decryption information. The chained decryption may result in a sequence of decrypted data blocks. Embodiments may also include, based on the discard information, locating and removing the non-content portions of one or more data blocks in the sequence of decrypted data blocks. Embodiments may also include generating the protected version of content. Embodiments may also include performing any of the aforesaid techniques on one or more computers. | 08-28-2014 |
20140280789 | Media Content Streaming Using Stream Message Fragments - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for media content streaming can include transacting access information associated with a media stream and transacting one or more fragments associated with the media stream to facilitate a delivery of media content associated with the media stream. Access information can include fragment sequencing information to facilitate individual retrieval of fragments associated with the media stream using a uniform resource identifier via a processing device configured to cache content. A fragment can include one or more stream messages. A stream message can include a message header and a corresponding media data sample. The message header can include a message stream identifier, a message type identifier, a timestamp, and a message length value. | 09-18-2014 |
20140337620 | System and Method for Local Generation of Streaming Content with a Hint Track - Embodiments of a system and method for local generation of streaming content with a hint track are described. Embodiments may include receiving a first version of encrypted content comprising encrypted content samples that each include media content and non-content information. Embodiments may also include receiving a hint track including packet header information for a stream of media packets from which the media content was sourced, and offset information identifying locations of encrypted media content within the encrypted content samples. Embodiments may include generating a second version of the encrypted content for streaming, which may include, based on the information of the hint track, identifying the location of media content within the encrypted content samples. Embodiments may include generating media packets within the second version of the encrypted content, each of those media packets including header information from the hint track and the identified media content from the encrypted content samples. | 11-13-2014 |
20150033031 | System and Method for Detecting a Security Compromise on a Device - Embodiments of a system and method for detecting a security compromise on a device are described. Embodiments may be implemented by a content consumption application configured to protect content decryption keys on a device, such as a computer system (e.g., a desktop or notebook computer) or a mobile device (e.g., a smartphone or tablet). For instance, the content consumption application may be configured to provide decryption keys for respective content to a media component (or another component of the operating system) if multiple conditions have been met. For instance, in various embodiments, the content consumption application may pass the key to the media component after ensuring that i) one or more security mechanisms of the device operating system have not been compromised and ii) one or more executable instructions of the content consumption application have not been tampered (e.g., instructions corresponding to a function that handles the decryption key(s)). | 01-29-2015 |
20150113287 | Decrypting Content Samples Including Distinct Encryption Chains - Embodiments may be configured to receive a protected version of content that includes multiple encrypted content samples. In various embodiments, each encrypted content sample includes multiple encrypted blocks. For a given encrypted content sample, different sets of encrypted blocks in that sample may form different encryption chains. The protected version of the content may further include decryption information for decrypting the encrypted content samples. The decryption information may include at least some initialization vectors generated dependent upon non-content information that is not included in the protected version of the content. The non-content information may be from a different protected version of the content. Embodiments may be configured to use the decryption information to decrypt one or more of the encrypted content samples. | 04-23-2015 |
20150195256 | Methods and Apparatus for Key Delivery in HTTP Live Streaming - A key delivery mechanism that delivers keys to an OS platform (e.g., iOS platform) devices for decrypting encrypted HTTP live streaming data. An HTTPS URL for a stateless HTTPS service is included in the manifest for an encrypted HTTP live stream obtained by an application (e.g., a browser) on an OS platform device. The URL includes an encrypted key, for example as a query parameter value. The application passes the manifest to the OS. The OS contacts the HTTPS service to obtain the key using the URL indicated in the manifest. Since the encrypted key is a parameter of the URL, the encrypted key is provided to the HTTPS service along with information identifying the content. The HTTPS service decrypts the encrypted key and returns the decrypted key to the OS over HTTPS, thus eliminating the need for a database lookup at the HTTPS service. | 07-09-2015 |
20150235011 | DRM PROTECTED VIDEO STREAMING ON GAME CONSOLE WITH SECRET-LESS APPLICATION - Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for client authentication at a key server, which eliminates the need of storing or using any secret information in the client application. Further, an encrypted content key generated by a content packager using a public key can be deployed in the key URI of a playlist file, which is sent to the key server. The key server can be configured to decrypt the content key using a corresponding private key. Further, the content key and unencrypted samples are protected in the game console client application from debugging and replay attacks by using additional security checks at both the client and key server. By storing secret information remotely from the game console and using the SSO model, DRM policies can be enforced on an untrusted client application. | 08-20-2015 |
20150256578 | Media Content Streaming Using Stream Message Fragments - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for media content streaming can include transacting access information associated with a media stream and transacting one or more fragments associated with the media stream to facilitate a delivery of media content associated with the media stream. Access information can include fragment sequencing information to facilitate individual retrieval of fragments associated with the media stream using a uniform resource identifier via a processing device configured to cache content. A fragment can include one or more stream messages. A stream message can include a message header and a corresponding media data sample. The message header can include a message stream identifier, a message type identifier, a timestamp, and a message length value. | 09-10-2015 |
20150264096 | Low Latency Live Video Streaming - Techniques are disclosed for low latency live video streaming. A client can be configured to send a single HTTP request for live video streaming to a server. The server can be configured to push one or more video segments to the client in response to the request, following a pre-defined push strategy. For example, using a so-called all-push strategy, the client sends only one request to the server, and in response, the server sends all of the video segments to the client as soon as each segment is complete. The HTTP 2.0 protocol may be used for pushing the video from the server to the client. This technique eliminates the request explosion problem when small segments are used. Further, the number of segments pushed with each request can be varied, which is to facilitate adaptive bitrate switching. | 09-17-2015 |
20150281298 | Buffering in HTTP Streaming Client - A buffer model in an HTTP streaming client may include receiving a first content fragment of a first content stream in response to a first HTTP request. It may also include receiving a second content fragment of a second content stream in response to a second HTTP request. The buffer model may further include storing the first and second content fragments in first and second buffers of a plurality of configurable buffers. The first and second content fragments may be multiplexed into a third buffer of the plurality of buffers. The multiplexed first and second content fragments may be stored in a fourth buffer of the plurality of buffers for playback. The buffer model may be implemented by an application. The buffers may be designed based on one or more constraints. | 10-01-2015 |
20160065961 | COMMON COPY COMPRESSION - Embodiments of the present invention provide systems, methods, and computer storage media directed to hosting a plurality of copies of a digital content. A common component and one or more individual components from one or more copies of the digital content are generated. As such, the common component and the one or more individual components are stored, such that each individual component in conjunction with the common component represents a separate copy of the digital content. In some implementations, a compression ratio may be customized for determining the sizing of the common component and individual component. | 03-03-2016 |
20160065979 | COMMON COPY COMPRESSION - Embodiments of the present invention provide systems, methods, and computer storage media directed to hosting a plurality of copies of a digital content. A common component and one or more individual components from one or more copies of the digital content are generated. As such, the common component and the one or more individual components are stored, such that each individual component in conjunction with the common component represents a separate copy of the digital content. In some implementations, a compression ratio may be customized for determining the sizing of the common component and individual component. | 03-03-2016 |
20160099854 | DIGITAL CONTENT CONSUMPTION ANALYSIS - Content consumption session progress is predicted based on historical observations of how users have interacted with a repository of digital content. This is approached as a matrix completion problem. Information extracted from tracking logs maintained by one or more content providers is used to estimate the extent to which various content items are consumed. The extracted session progress data is used to populate a session progress matrix in which each matrix element represents a session progress for a particular user consuming a particular content item. This matrix, which in principle will be highly (≳95%) sparse, can be completed using a collaborative filtering matrix completion technique. The values obtained as a result of completing the session progress matrix represent predictions with respect to how much of a given content item will be consumed by a given user. | 04-07-2016 |
20160105732 | Optimizing Caches For Media Streaming - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for establishing a grouping rule and a mapping protocol at a cache server system for caching fragments of a media stream that includes a timed-sequence of video frames. The fragments can be generated and identified at media source systems in accordance with a fragmenting format and an indexing protocol, respectively, which are common across the media source systems. Further, the established mapping protocol can be different from the indexing protocol. The methods include retrieving at least a portion of the fragments of the media stream by the cache server system from the media source systems. The methods also include allocating the retrieved fragments to local fragment groups at the cache server system based on the established grouping rule. The methods further include mapping the allocated fragments to the local fragment groups based on the established mapping protocol. | 04-14-2016 |