Patent application number | Description | Published |
20080313233 | Implementing audio substitution options in media works - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary techniques may be used to provide audio and/or visual substitution options in a derivative version of the media work in accordance with applicable alteration guidelines. | 12-18-2008 |
20090037243 | Audio substitution options in media works - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary techniques may be used to provide audio and/or visual substitution options in a derivative version of the media work in accordance with applicable alteration guidelines. | 02-05-2009 |
20090037278 | Implementing visual substitution options in media works - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary techniques may be used to provide audio and/or visual substitution options in a derivative version of the media work in accordance with applicable alteration guidelines. | 02-05-2009 |
20090070459 | High-Performance Context-Free Parser for Polymorphic Malware Detection - The invention provides a method and apparatus for advanced network intrusion detection. The system uses deep packet inspection that can recognize languages described by context-free grammars. The system combines deep packet inspection with one or more grammar parsers ( | 03-12-2009 |
20090150199 | Visual substitution options in media works - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary techniques may be used to provide audio and/or visual substitution options in a derivative version of the media work in accordance with applicable alteration guidelines. | 06-11-2009 |
20090150444 | Media markup for audio content alteration - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content. | 06-11-2009 |
20090151004 | Media markup for visual content alteration - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content. | 06-11-2009 |
20090151008 | Media markup system for content alteration in derivative works - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content. | 06-11-2009 |
20090204475 | Media markup for promotional visual content - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content. | 08-13-2009 |
20090210946 | Media markup for promotional audio content - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content. | 08-20-2009 |
20090235364 | Media markup for promotional content alteration - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or category of an alterable media content component may be implemented for audio, visual, and audio/video alterable content. | 09-17-2009 |
20100039218 | System and method for transmitting illusory and non-illusory identification characteristics - Methods and systems for transmitting illusory identification characteristics are provided. | 02-18-2010 |
20100040214 | System and method for transmitting illusory identification characteristics - Methods and systems for associating one or more fees with transmissions of one or more illusory identification characteristics are provided. | 02-18-2010 |
20100042667 | System and method for transmitting illusory identification characteristics - Methods and systems for transmitting illusory identification characteristics are provided. | 02-18-2010 |
20100042669 | System and method for modifying illusory user identification characteristics - Methods and systems for modifying illusory user identification characteristics are provided. | 02-18-2010 |
20100154065 | Media markup for user-activated content alteration - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various exemplary identifier markup schemes indicative of a location or topic or category of an alterable media content component may be implemented to enable selective audio, visual, and audio/video content alteration. | 06-17-2010 |
20100318595 | System and method for conditionally transmitting one or more locum tenentes - Methods and systems are provided for receiving a conditional directive to associate one or more identified entities with one or more representative locum tenentes, and transmitting the one or more representative locum tenentes in lieu of the one or more identified entities in accordance with the conditional directive. | 12-16-2010 |
20110004939 | Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity - A computationally implemented method includes, but is not limited to: receiving a first communiqué that is affiliated with a source entity and that is directed to a receiving entity; and transmitting to the receiving entity, in lieu of the first communiqué, a second communiqué that is provided in accordance with one or more conditional directives to conditionally obfuscate identity of the source entity, the one or more conditional directives provided by the receiving entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 01-06-2011 |
20110004940 | Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity - A computationally implemented method includes, but is not limited to: receiving a first communiqué that is affiliated with a source entity and that is directed to a receiving entity; and transmitting to the receiving entity, in lieu of the first communiqué, a second communiqué that is provided in accordance with one or more conditional directives to conditionally obfuscate identity of the source entity, the one or more conditional directives provided by the receiving entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 01-06-2011 |
20110041061 | Obfuscating identity of a source entity affiliated with a communique directed to a receiving user and in accordance with conditional directive provided by the receiving user - A computationally implemented method includes, but is not limited to: receiving one or more conditional directives from a receiving user, the one or more conditional directives delineating one or more conditions for obfuscating identity of a source entity affiliated with one or more communiqués directed to the receiving user; and presenting at least a second communiqué in response to at least a reception of a first communiqué affiliated with the source entity and in accordance with the one or more conditional directives, the second communiqué being presented in lieu of presenting the first communiqué. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 02-17-2011 |
20110041185 | Obfuscating identity of a source entity affiliated with a communique directed to a receiving user and in accordance with conditional directive provided by the receiving user - A computationally implemented method includes, but is not limited to: receiving one or more conditional directives from a receiving user, the one or more conditional directives delineating one or more conditions for obfuscating identity of a source entity affiliated with one or more communiqués directed to the receiving user; and presenting at least a second communiqué in response to at least a reception of a first communiqué affiliated with the source entity and in accordance with the one or more conditional directives, the second communiqué being presented in lieu of presenting the first communiqué. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 02-17-2011 |
20110081018 | Obfuscating reception of communique affiliated with a source entity - A computationally implemented method includes, but is not limited to: receiving a communiqué that is affiliated with a source entity and that is directed to a receiving user; and presenting, in lieu of presenting indication of reception of the communiqué, a covert indicator that covertly indicates reception of the communiqué, the presenting of the covert indicator being in accordance with one or more conditional directives of the receiving user to conditionally obfuscate the reception of the communiqué affiliated with the source entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 04-07-2011 |
20110083010 | Conditionally intercepting data indicating one or more aspects of a communique to obfuscate the one or more aspects of the communique - A computationally implemented method includes, but is not limited to: intercepting communiqué aspect data that is directed to an end user entity and that indicates one or more aspects of a communiqué directed to the end user entity and that is affiliated with a particular source entity, the intercepting of the communiqué aspect data being in accordance with one or more conditional directives of the end user entity to conditionally obfuscate the communiqué affiliated with the source entity; and transmitting to the end user entity, in response to intercepting the communiqué aspect data and in lieu of transmitting direct indication of the communiqué to the end user entity, covert indicator data that upon reception by the end user entity covertly indicates the one or more aspects of the communiqué. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 04-07-2011 |
20110087943 | RELIABLE COMMUNICATIONS IN ON-CHIP NETWORKS - Techniques for reliable communication in an on-chip network of a multi-core processor are provided. Packets are tagged with tags that define reliability requirements for the packets. The packets are routed in accordance with the reliability requirements. The reliability requirements and routing using them can ensure reliable communication in the on-chip network. | 04-14-2011 |
20110093806 | Obfuscating reception of communique affiliated with a source entity - A computationally implemented method includes, but is not limited to: receiving a communiqué that is affiliated with a source entity and that is directed to a receiving user; and presenting, in lieu of presenting indication of reception of the communiqué, a covert indicator that covertly indicates reception of the communiqué, the presenting of the covert indicator being in accordance with one or more conditional directives of the receiving user to conditionally obfuscate the reception of the communiqué affiliated with the source entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 04-21-2011 |
20110107427 | Obfuscating reception of communique affiliated with a source entity in response to receiving information indicating reception of the communique - A computationally implemented method includes, but is not limited to: receiving communiqué reception information that indicates reception of a communiqué that is affiliated with a source entity and that is directed to an end user; and presenting, in response to receiving the communiqué reception information and in lieu of presenting direct indication of reception of the communiqué, a covert indicator that covertly indicates reception of the communiqué, the presenting of the covert indicator being in accordance with one or more conditional directives of the end user to conditionally obfuscate the reception of the communiqué affiliated with the source entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 05-05-2011 |
20110110518 | Obfuscating reception of communique affiliated with a source entity in response to receiving information indicating reception of the communique - A computationally implemented method includes, but is not limited to: receiving communiqué reception information that indicates reception of a communiqué that is affiliated with a source entity and that is directed to an end user; and presenting, in response to receiving the communiqué reception information and in lieu of presenting direct indication of reception of the communiqué, a covert indicator that covertly indicates reception of the communiqué, the presenting of the covert indicator being in accordance with one or more conditional directives of the end user to conditionally obfuscate the reception of the communiqué affiliated with the source entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 05-12-2011 |
20110119224 | FEEDBACK DURING SURGICAL EVENTS - Technology is disclosed for communicating surgical information. The technology can receive a first data from a first sensor coupled to a first tool; receive a second data from a second sensor coupled to a second tool; generate a virtual model of a virtual real-time space, wherein the first tool is mapped in the virtual real-time space in relation to a first vital entity and a second vital entity via the first sensor and based on the first data; apply the virtual real-time space against at least a first probabilistic model and a second probabilistic model to obtain a third data about movement of the first tool in relation to the first vital entity and the second vital entity; and output the third data to an output device to convey information about the first tool. | 05-19-2011 |
20110131409 | Conditionally intercepting data indicating one or more aspects of a communique to obfuscate the one or more aspects of the communique - A computationally implemented method includes, but is not limited to: intercepting communiqué aspect data that is directed to an end user entity and that indicates one or more aspects of a communiqué directed to the end user entity and that is affiliated with a particular source entity, the intercepting of the communiqué aspect data being in accordance with one or more conditional directives of the end user entity to conditionally obfuscate the communiqué affiliated with the source entity; and transmitting to the end user entity, in response to intercepting the communiqué aspect data and in lieu of transmitting direct indication of the communiqué to the end user entity, covert indicator data that upon reception by the end user entity covertly indicates the one or more aspects of the communiqué. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 06-02-2011 |
20110145814 | HYPERVISOR DRIVER MANAGEMENT IN VIRTUAL MACHINE ENVIRONMENTS - Techniques for providing access to physical resources in a virtual machine environment are provided. A virtual machine may access physical resources using device drivers that have been divided. After monitoring a performance of device drivers operating in a virtual machine, the device drivers that are underperforming or that experience a high rate of context switches are identified. These device drivers are adapted dynamically into portions that execute in an untrusted domain and in a trusted domain. Running a portion of the device driver in the trusted domain eliminates context switches and improves performance of the virtual machine. | 06-16-2011 |
20110154020 | Conditionally releasing a communique determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects - A computationally implemented method includes, but is not limited to: intercepting a communiqué that is determined to be affiliated with a source entity and that is addressed to an end user to prevent, at least temporarily, the communiqué from being received by a communication device associated with the end user; and releasing the communiqué to the communication device in response to at least detecting occurrence of one or more environmental aspects associated with the communication device, the releasing of the communiqué being in accordance with one or more conditional directives of the end user to conditionally obfuscate the communiqué determined to be affiliated with the source entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 06-23-2011 |
20110161217 | Conditionally obfuscating one or more secret entities with respect to one or more billing statements - A computationally implemented method includes, but is not limited to: associating one or more fees with one or more communiqués affiliated with one or more secret entities and addressed to a particular end user; and providing one or more billing statements that indicate the one or more fees without at least directly identifying the one or more secret entities, the providing of the one or more billing statements being in accordance with one or more conditional directives of the particular end user to conditionally obfuscate the one or more secret entities with respect to the one or more billing statements. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 06-30-2011 |
20110161626 | ROUTING PACKETS IN ON-CHIP NETWORKS - Techniques for packet routing in an on-chip network are provided. In one embodiment, a method for routing packets in a multi-core processor including multiple cores connected by an on-chip network includes identifying ports that are incorrect while routing the packet. After receiving the packet at an input port, some of the ports are excluded from consideration while selecting the output port for the packet. The output port is selected from the remaining ports and the packet is routed to the selected output port. | 06-30-2011 |
20110166972 | Conditionally obfuscating one or more secret entities with respect to one or more billing statements - A computationally implemented method includes, but is not limited to: associating one or more fees with one or more communiqués affiliated with one or more secret entities and addressed to a particular end user; and providing one or more billing statements that indicate the one or more fees without at least directly identifying the one or more secret entities, the providing of the one or more billing statements being in accordance with one or more conditional directives of the particular end user to conditionally obfuscate the one or more secret entities with respect to the one or more billing statements. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 07-07-2011 |
20110166973 | Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiques addressed to the one or more secret entities - A computationally implemented method includes, but is not limited to: associating one or more fees with one or more communiqués that were transmitted by a particular end user and addressed to one or more secret entities; and providing one or more billing statements that indicate the one or more fees without at least directly identifying the one or more secret entities, the providing of the one or more billing statements being in accordance with one or more conditional directives of the particular end user to conditionally obfuscate the one or more secret entities with respect to the one or more billing statements. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 07-07-2011 |
20110166974 | Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiques addressed to the one or more secret entities - A computationally implemented method includes, but is not limited to: associating one or more fees with one or more communiqués that were transmitted by a particular end user and addressed to one or more secret entities; and providing one or more billing statements that indicate the one or more fees without at least directly identifying the one or more secret entities, the providing of the one or more billing statements being in accordance with one or more conditional directives of the particular end user to conditionally obfuscate the one or more secret entities with respect to the one or more billing statements. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 07-07-2011 |
20110173440 | Conditionally releasing a communique determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects - A computationally implemented method includes, but is not limited to: intercepting a communiqué that is determined to be affiliated with a source entity and that is addressed to an end user to prevent, at least temporarily, the communiqué from being received by a communication device associated with the end user; and releasing the communiqué to the communication device in response to at least detecting occurrence of one or more environmental aspects associated with the communication device, the releasing of the communiqué being in accordance with one or more conditional directives of the end user to conditionally obfuscate the communiqué determined to be affiliated with the source entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 07-14-2011 |
20110186625 | FIDUCIAL MARKERS FOR AUGMENTED REALITY - Fiducial markers for augmented reality are provided. A fiducial marker can be located on an object in the environment and includes retroreflectors that reflect light back towards the source of the light. A portion of the fiducial marker is masked or obscured to form a pattern in the fiducial marker including a reflective portion and a less or non-reflective portion. The pattern of the reflective portion and the less or non-reflective portion stores data that can be read by a reading device and used to generate computer-generated content that is included in an augmented image. | 08-04-2011 |
20120090000 | Implementation of media content alteration - A classification method and system for possible content alteration of a media work may include criteria regarding content that is feasible for alteration. Such criteria may be maintained in records that are accessible to an interested party. Some embodiments may include a record of primary authorization rights applicable to a possible content alteration. A further embodiment feature may include a record of secondary authorization rights applicable to substitute altered content incorporated in a derivative version. Various techniques may be used to incorporate substitute altered content in a derivative version of the media work in accordance with applicable substitution guidelines. | 04-12-2012 |
20120303332 | ESTIMATING FORCES ON COMPLEX SURFACES - Techniques for constructing an enhanced model of an object are provided. Sensor data is received from a sensor network that is arranged on the surface of the object. The sensor data includes measurements of surface conditions that the surface of the object experiences. Pressure data, which correlates to locations on the enhanced model, is determined from the sensor data. The enhanced model is enhanced with the pressure data. | 11-29-2012 |
20130138599 | FEEDBACK DURING SURGICAL EVENTS - Technology is disclosed for communicating surgical information. The technology can receive data from one or more sensors coupled to one or more tools in operation by a user, generate a virtual model of a four-dimensional virtual real-time space, receive motion history data for the user's previous movements, generate a prediction of movement of the first tool in each of the four dimensions in relation to the first vital entity and a prediction score, and output an indication of the prediction score. | 05-30-2013 |
20140023073 | PACKET ROUTING WITHIN AN ON-CHIP NETWORK - Techniques for packet routing in an on-chip network are provided. In one embodiment, a method for routing packets in a multi-core processor including multiple cores connected by an on-chip network includes identifying ports that are incorrect while routing the packet. After receiving the packet at an input port, some of the ports are excluded from consideration while selecting the output port for the packet. The output port is selected from the remaining ports and the packet is routed to the selected output port. | 01-23-2014 |