Patent application number | Description | Published |
20130080092 | SYSTEMS AND METHODS FOR DATA COMPRESSION AND FEATURE EXTRACTION FOR THE PURPOSE OF DISAGGREGATING LOADS ON AN ELECTRICAL NETWORK - Some embodiments concern a method of detecting usage of one or more electrical devices coupled to an electrical power line. An electrical power signal with a predetermined period is on the electrical power line. The one or more electrical devices place one or more noise signals on the electrical power line. The electrical power signal comprises the one or more noise signals. The method can include: using a data acquisition device to acquire first data about the electrical power signal on the electrical power line such that the acquiring of the first data is synchronized with the predetermined period of the electrical power signal; processing the first data to create frequency domain data; and applying a feature extraction algorithm to the frequency domain data to determine a transition of an electrical state of at least a first one of the one or more electrical devices. Other embodiments are disclosed. | 03-28-2013 |
20130181517 | System and Method for a Variable Impedance Transmitter Path for Charging Wireless Devices - In one embodiment, a method includes wirelessly coupling a transmitter to the wireless device; determining a first power transfer value of a signal transmitted from the transmitter to the wireless device with a first transmit impedance; determining a second power transfer value of the signal transmitted from the transmitter to the wireless device with a second transmit impedance; and selecting one of the first transmit impedance and the second transmit impedance based on the first power transfer value and the second power transfer value. | 07-18-2013 |
20130182641 | System and Method for Distance-Dependent Data Exchange Between Wireless Communication Devices - In one embodiment, a method includes identifying a plurality of data types; identifying a plurality of communication ranges for data transmission, wherein a first communication range of the plurality of communication ranges is less than a second communication range of the plurality of communication ranges, and wherein the first communication range corresponds to a first data type of the plurality of data types and the second communication range corresponds to a second data type of the plurality of data types; transmitting data in the first data type to a first wireless communication device located within the first communication range; and transmitting data in the second data type to a second wireless communication device located within the second communication range. | 07-18-2013 |
20130303225 | Dual Mode Wireless Communications Device - A wireless communications device includes a battery, a processing section coupled to the battery, and an RF interface. The battery is configured to provide power to operate the wireless communications device in a first mode of operation. The processing section is configured to operate on battery power in the first mode of operation. The RF interface is configured to receive an RF signal and generate operating power for the wireless communication device from the RF signal in a second mode of operation. The wireless communications device is configured to detect available RF power and enter the second mode of operation from the first mode of operation. | 11-14-2013 |
20130324056 | Sensing Proximity Utilizing A Wireless Radio Subsystem - In particular embodiments, a wireless communications device includes an RF transceiver, a plurality of antennas coupled to the transceiver, and processing circuitry. The device may transmit an RF reference signal using the RF transceiver. When the RF reference signal is reflected back from each of the plurality of antennas, the device may determine at least one characteristic of the RF reference signal (e.g., amplitude, phase, dispersion, waveform shape, or distortion). The device may then characterize at least one aspect of the environment around the device based on the characteristic and control a function of the device based on the at least one aspect. For example, the device may detect that an object (e.g., a hand or other body part) is approaching the device but not yet in contact with the device and activate a first feature of the device based on the characterization. | 12-05-2013 |
20140052764 | File Storage System Based on Coordinated Exhaustible and Non-Exhaustible Storage - A file storage system may be implemented by coordinating non-exhaustible and exhaustible storage devices. The exhaustible storage devices may be lower grade flash based storage devices. The non-exhaustible storage devices may be storage devices based on magnetic recording mechanisms or higher grade flash storage. The file storage system may store received content items on the exhaustible storage devices. The file storage system may additionally store metadata for the content items and/or the file storage system on the non-exhaustible storage devices. During operation, the file storage system may globally optimize the content items on the exhaustible storage devices such that more heavily accessed items are moved to exhaustible storage devices that have experienced relatively few data operations. The file storage system can move less frequently accessed content items to exhaustible storage devices that have experienced a relatively large number of data operations. As such, the operation lifetime of the exhaustible storage devices as a whole can be prolonged. | 02-20-2014 |
20140099729 | Methods and Apparatus for Artificial Olfaction - In exemplary implementations of this invention, an electronic olfactor determines whether a scent being tested matches the scent of a positive control. The electronic olfactor can perform this scent matching even in a changing olfactory environment, and even if the positive control scent is a combination of hundreds or thousands of different odorants. No prior training is needed, and no attempt is made to identify a single odorant that is unambiguously responsible for a scent. Instead, a computer compares the total scent pattern of a positive control sample with the total scent pattern of a test sample, across a sweep of many permutations of electrical inputs to scent sensors, to try to find any condition under which the total scent patterns do not match. If such a condition cannot be found, then the computer declares a match between the test and target scents. | 04-10-2014 |
20140196116 | Distance-Dependent or User-Dependent Data Exchange Between Wireless Communication Devices - In one embodiment, a method includes sending, by a first wireless device associated with a first user, first data such that the first data are only available to one or more second wireless devices respectively associated with one or more second users and within a first distance from the first wireless device. The method further includes sending, by the first wireless device associated with the first user, second data such that the second data are only available to one or more third wireless devices respectively associated with one or more third users and within a second distance from the first wireless device. | 07-10-2014 |
20140274122 | Multi-Factor Location Verification - In one embodiment, a method includes accessing at least two determinations of the location of a mobile computing device, with each determined location having been determined without reference to explicit location information manually input by a user of the mobile computing device. At least one first determined location is compared with at least one second determined location, with comparisons being made between location determinations made based on different location determination input. A functionality associated with the mobile computing device is allowed if the first determined location corresponds to at least one of the second determined locations. | 09-18-2014 |
20140280941 | WIRELESS DATA PRIVACY MAINTAINED THROUGH A SOCIAL NETWORK - In one embodiment, one or more servers providing an on-line service send a token to a first client computing device associated with a first user of the on-line service, the token being generated by the servers based at least in part on a user identifier of the first user; the serves receive the token from a second client computing device associated with a second user of the on-line service, the token being sent to the second client computing device from the first client computing device through a wireless connection; the servers verify the token based at least in part on the user identifier of the first user; the servers determine data accessible to the second user if the token is verified; the servers also send to the second client computing device at least some of the data accessible to the second user. | 09-18-2014 |
20150052180 | FILE STORAGE SYSTEM BASED ON COORDINATED EXHAUSTIBLE AND NON-EXHAUSTIBLE STORAGE - A file storage system may be implemented by coordinating non-exhaustible and exhaustible storage devices. The exhaustible storage devices may be lower grade flash based storage devices. The non-exhaustible storage devices may be storage devices based on magnetic recording mechanisms or higher grade flash storage. The file storage system may store received content items on the exhaustible storage devices. The file storage system may additionally store metadata for the content items and/or the file storage system on the non-exhaustible storage devices. During operation, the file storage system may globally optimize the content items on the exhaustible storage devices such that more heavily accessed items are moved to exhaustible storage devices that have experienced relatively few data operations. The file storage system can move less frequently accessed content items to exhaustible storage devices that have experienced a relatively large number of data operations. As such, the operation lifetime of the exhaustible storage devices as a whole can be prolonged. | 02-19-2015 |
20150079935 | TECHNIQUES FOR MOBILE DEVICE PERSONALIZATION - Techniques for mobile device personalization are described. In an embodiment, user credentials for an online service are received at a mobile device kiosk. The user credentials may be authenticated and, upon authentication, user data associated with the user credentials may be transferred to a mobile device of the mobile device kiosk. The user data may be transferred between the mobile device kiosk and a wireless transmitter embedded on a printed circuit board (PCB) of the mobile device. Further, the user data may be transferred to the mobile device without powering on the mobile device. Once the data transfer is complete, the mobile device may be provided to a user. | 03-19-2015 |
20150079961 | TECHNIQUES FOR PHONE NUMBER AND DATA MANAGEMENT - Techniques for phone number and data management are described. A storage module may be configured to store contact information for a plurality of users, which may be members of a social network. A server device may be configured to receive a SIM change event from a mobile device associated with a first user of the plurality of users. The SIM change event may include updated contact information for the first user. The server may further be configured to identify one or more users from the plurality of users associated with the first user, and provide the updated contact information to one or more mobile devices associated with the one or more identified users. | 03-19-2015 |
20150081884 | TECHNIQUES FOR SMART DATA ROUTING - Techniques for smart data routing are described. A system may include a storage module configured to store network conditions for a plurality of networks and locations and a server device. The server device may be configured to determine network conditions for each of a plurality of networks and locations based upon detected usage of at least one mobile application being accessed via each of the plurality of networks and in each of the locations. Determined network conditions may be stored at the storage module. The server may be further configured to receive a request for a communication from a client device. Based upon at least the determined network conditions, the server may be configured to determine routing information for the communication. Once determined, the server may be configured to provide the routing information for the communication to the client device. | 03-19-2015 |
20150082382 | TECHNIQUES FOR MULTI-STANDARD PEER-TO-PEER CONNECTION - Techniques for multi-protocol peer-to-peer connection are described. An apparatus may comprise a discovery component to discover a remote device using a first protocol, and receive discovery information from the remote device, the discovery information including protocol information. The apparatus may comprise an authentication component to authenticate the remote device. The apparatus may comprise a connection component to establish a peer-to-peer connection with the remote device using a second protocol based on the protocol information. Other embodiments are described and claimed. | 03-19-2015 |