A computer system provides a method for delivering a video stream to a viewer and delivering, in synchrony with the video stream, social media content created during the current and previous viewings of the video stream by first-time viewers of the video stream.
H04N 21/242 - Synchronization processes, e.g. processing of PCR [Program Clock References]
H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/2665 - Gathering content from different sources, e.g. Internet and satellite
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video streamElementary client operations, e.g. monitoring of home network or synchronizing decoder's clockClient middleware
H04N 21/432 - Content retrieval operation from a local storage medium, e.g. hard-disk
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
H04N 21/435 - Processing of additional data, e.g. decrypting of additional data or reconstructing software from modules extracted from the transport stream
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/4788 - Supplemental services, e.g. displaying phone caller identification or shopping application communicating with other users, e.g. chatting
Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service providers. Users may select and configure additional identification factors that are unique and convenient for them. These factors, along with additional environmental variables, feed into a trust score computation that weights the trustworthiness of the device context requesting communication with a service provider. Service providers rely on the trust score rather than enforce a specific identification routine themselves. A combination of identification factors selected by the user can be aggregated together to produce a trust score high enough to gain access to a given online service provider. A threshold of identification risk may be required to access a service or account provided by the online service provider.
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.
A system and method may cause a computing device to operate according to a selected operational mode. A diagnostic application may selectively execute one or more tests on the computing device; record a result of executing a test; and perform an action based on the result. An operational mode selected may be a safe mode that includes executing only a portion of an operating system and the diagnostic application. A test may include executing an application and selectively validating performance of one or more resources of a computing device while the application is executing. A test may include executing an application selected based on a rule related to a category of applications.
A method and system for detecting imperfections on a surface of a touchscreen of an electrical device, comprising: swiping a test object, such as a fingertip, a fingernail or a pin, along at least a portion of the touchscreen; producing, by the touchscreen, an electric signal indicative of the test object's contact with the touchscreen; receiving an acoustic signal by an acoustic sensor, during the swipe of the test object along the touchscreen; analyzing, by a processor, at least one of the electric signal and received acoustic signal; and determining existence of imperfections on the touchscreen's surface based on the analysis.
G06F 3/044 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means by capacitive means
G01N 29/12 - Analysing solids by measuring frequency or resonance of acoustic waves
G01N 29/14 - Investigating or analysing materials by the use of ultrasonic, sonic or infrasonic wavesVisualisation of the interior of objects by transmitting ultrasonic or sonic waves through the object using acoustic emission techniques
G01N 29/46 - Processing the detected response signal by spectral analysis, e.g. Fourier analysis
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
7.
Method and system for providing social media content synchronized to media presentation
A computer system provides a method for delivering a video stream to a viewer and delivering, in synchrony with the video stream, social media content created during the current and previous viewings of the video stream by first-time viewers of the video stream.
H04N 21/242 - Synchronization processes, e.g. processing of PCR [Program Clock References]
H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/2665 - Gathering content from different sources, e.g. Internet and satellite
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video streamElementary client operations, e.g. monitoring of home network or synchronizing decoder's clockClient middleware
H04N 21/432 - Content retrieval operation from a local storage medium, e.g. hard-disk
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
H04N 21/435 - Processing of additional data, e.g. decrypting of additional data or reconstructing software from modules extracted from the transport stream
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/4788 - Supplemental services, e.g. displaying phone caller identification or shopping application communicating with other users, e.g. chatting
A method and system for detecting imperfections on a surface of a touchscreen of an electrical device, comprising: swiping a test object, such as a fingertip, a fingernail or a pin, along at least a portion of the touchscreen; producing, by the touchscreen, an electric signal indicative of the test object's contact with the touchscreen; receiving an acoustic signal by an acoustic sensor, during the swipe of the test object along the touchscreen; analyzing, by a processor, at least one of the electric signal and received acoustic signal; and determining existence of imperfections on the touchscreen's surface based on the analysis.
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
G01N 29/12 - Analysing solids by measuring frequency or resonance of acoustic waves
G01N 29/46 - Processing the detected response signal by spectral analysis, e.g. Fourier analysis
G01N 29/14 - Investigating or analysing materials by the use of ultrasonic, sonic or infrasonic wavesVisualisation of the interior of objects by transmitting ultrasonic or sonic waves through the object using acoustic emission techniques
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
9.
GENERATION AND APPLICATION OF PERSONNEL WORK GRAPH
A system, method, and computer-readable medium are disclosed for improved generation and use of personnel work graphs that show relations between entities, such as people, communication between people, work artifacts with people, and work artifacts with other work artifacts. Data from different importers are identified, where new data sources can be added at a later time and data is seamlessly added to the graphical representation of the work graphs. Data includes personnel and work artifacts. Since object related data, such as work, roles and responsibilities continuously change, in at least one embodiment, a continuous process of importing and synchronization is performed for the data, and a graphical representation of the data is created.
A method for determining a State of Health (SoH) of a power source of a portable device involves extracting a start voltage value of an examined power source; activating one or more hardware components of the portable device by a software, to increase the current consumption of the device, identifying a voltage drop rate of the examined power source and comparing a calculated voltage drop rate to pre-calculated threshold values stored on a database of a main server. A system for executing the method is also disclosed.
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.
Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service providers. Users may select and configure additional identification factors that are unique and convenient for them. These factors, along with additional environmental variables, feed into a trust score computation that weights the trustworthiness of the device context requesting communication with a service provider. Service providers rely on the trust score rather than enforce a specific identification routine themselves. A combination of identification factors selected by the user can be aggregated together to produce a trust score high enough to gain access to a given online service provider. A threshold of identification risk may be required to access a service or account provided by the online service provider.
A computer system provides a method for delivering a video stream to a viewer and delivering, in synchrony with the video stream, social media content created during the current and previous viewings of the video stream by first-time viewers of the video stream.
H04N 21/242 - Synchronization processes, e.g. processing of PCR [Program Clock References]
H04N 21/2665 - Gathering content from different sources, e.g. Internet and satellite
H04N 21/432 - Content retrieval operation from a local storage medium, e.g. hard-disk
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
H04N 21/435 - Processing of additional data, e.g. decrypting of additional data or reconstructing software from modules extracted from the transport stream
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/4788 - Supplemental services, e.g. displaying phone caller identification or shopping application communicating with other users, e.g. chatting
H04N 21/84 - Generation or processing of descriptive data, e.g. content descriptors
H04N 21/8547 - Content authoring involving timestamps for synchronizing content
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video streamElementary client operations, e.g. monitoring of home network or synchronizing decoder's clockClient middleware
H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.
A method and system for detecting imperfections on a surface of a touchscreen of an electrical device, comprising: swiping a test object, such as a fingertip, a fingernail or a pin, along at least a portion of the touchscreen; producing, by the touchscreen, an electric signal indicative of the test object's contact with the touchscreen; receiving an acoustic signal by an acoustic sensor, during the swipe of the test object along the touchscreen; analyzing, by a processor, at least one of the electric signal and received acoustic signal; and determining existence of imperfections on the touchscreen's surface based on the analysis.
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
G01N 29/12 - Analysing solids by measuring frequency or resonance of acoustic waves
G01N 29/46 - Processing the detected response signal by spectral analysis, e.g. Fourier analysis
G01N 29/14 - Investigating or analysing materials by the use of ultrasonic, sonic or infrasonic wavesVisualisation of the interior of objects by transmitting ultrasonic or sonic waves through the object using acoustic emission techniques
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
16.
BUSINESS GRAPH ENGINE FOR CONNECTION RECOMMENDATIONS
A method and apparatus are disclosed for recommending business connections by receiving connection network data from multiple social networking systems defining a first plurality of entities connected to at least a first user, preprocessing a newsfeed with NLP services to identify a second plurality of entities and topics in the newsfeed, generating a business graph data structure which defines a relationships map between the first user and the first and second plurality of entities, and applying query processing services to generate a search report in response to a search query, where the search report comprises a contact panel populated with business connection recommendations from the business graph data structure which correspond to the search query, and a news panel populated with one or more newsfeed articles which correspond to the search query and which are tagged with a sentiment score and one or more entity and topic tags.
G06Q 30/02 - MarketingPrice estimation or determinationFundraising
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
17.
Method and system for providing social media content synchronized to media presentation
A computer system provides a method for delivering a video stream to a viewer and delivering, in synchrony with the video stream, social media content created during the current and previous viewings of the video stream by first-time viewers of the video stream.
H04N 21/242 - Synchronization processes, e.g. processing of PCR [Program Clock References]
H04N 21/2665 - Gathering content from different sources, e.g. Internet and satellite
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video streamElementary client operations, e.g. monitoring of home network or synchronizing decoder's clockClient middleware
H04N 21/432 - Content retrieval operation from a local storage medium, e.g. hard-disk
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
H04N 21/435 - Processing of additional data, e.g. decrypting of additional data or reconstructing software from modules extracted from the transport stream
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/4788 - Supplemental services, e.g. displaying phone caller identification or shopping application communicating with other users, e.g. chatting
H04N 21/84 - Generation or processing of descriptive data, e.g. content descriptors
H04N 21/8547 - Content authoring involving timestamps for synchronizing content
H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
A method for determining a State of Health (SoH) of a power source of a portable device involves extracting a start voltage value of an examined power source; activating one or more hardware components of the portable device by a software, to increase the current consumption of the device, identifying a voltage drop rate of the examined power source and comparing a calculated voltage drop rate to pre-calculated threshold values stored on a database of a main server. A system for executing the method is also disclosed.
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.
Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service providers. Users may select and configure additional identification factors that are unique and convenient for them. These factors, along with additional environmental variables, feed into a trust score computation that weights the trustworthiness of the device context requesting communication with a service provider. Service providers rely on the trust score rather than enforce a specific identification routine themselves. A combination of identification factors selected by the user can be aggregated together to produce a trust score high enough to gain access to a given online service provider. A threshold of identification risk may be required to access a service or account provided by the online service provider.
The present invention relates to computerized (“smart”) mobile electronic devices and more particularly, to a system and methods of diagnosing and repairing malfunctions in smart mobile electronic devices, including a diagnostic process that utilizes decisions based on Big Data that holds information of multiple devices and offers a “disable components” (i.e., turn-off components) solution in order to overcome the problem without flashing a firmware or doing a factory-reset.
A method and system for detecting imperfections on a surface of a touchscreen of an electrical device, comprising: swiping a test object, such as a fingertip, a fingernail or a pin, along at least a portion of the touchscreen; producing, by the touchscreen, an electric signal indicative of the test object's contact with the touchscreen; receiving an acoustic signal by an acoustic sensor, during the swipe of the test object along the touchscreen; analyzing, by a processor, at least one of the electric signal and received acoustic signal; and determining existence of imperfections on the touchscreen's surface based on the analysis.
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
G01N 29/12 - Analysing solids by measuring frequency or resonance of acoustic waves
G01N 29/46 - Processing the detected response signal by spectral analysis, e.g. Fourier analysis
G01N 29/14 - Investigating or analysing materials by the use of ultrasonic, sonic or infrasonic wavesVisualisation of the interior of objects by transmitting ultrasonic or sonic waves through the object using acoustic emission techniques
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
23.
Security systems and methods for encoding and decoding digital content
Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A policy may be defined to control which users are permitted access to a key to decode the encoded content. The policy may defer to a third party policy node in determining key access. An account for a controlling entity, such as a guardian or employer, may be configured to control the encoding status of posts made by another. The controlling entity may control who has key access to decode posts made by the other account. The guardian account may be configured to have preemptive rights over posting decisions made by the minor.
A computer system for analyzing source code is disclosed. The computer system includes a processor and electronic memory storage. The electronic memory storage includes source code and executable instructions. The processor runs the executable instructions to: access the source code from the electronic memory storage; analyze code elements of the accessed source code to extract node data, edge data, and bindings data; and store the node data, edge data, and bindings data, in a graph database structure in the electronic memory storage.
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.
A method and system for detecting imperfections on a surface of a touchscreen of an electrical device, comprising: swiping a test object, such as a fingertip, a fingernail or a pin, along at least a portion of the touchscreen; producing, by the touchscreen, an electric signal indicative of the test object's contact with the touchscreen; receiving an acoustic signal by an acoustic sensor, during the swipe of the test object along the touchscreen; analyzing, by a processor, at least one of the electric signal and received acoustic signal; and determining existence of imperfections on the touchscreen's surface based on the analysis.
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
G01N 29/12 - Analysing solids by measuring frequency or resonance of acoustic waves
G01N 29/46 - Processing the detected response signal by spectral analysis, e.g. Fourier analysis
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
27.
System and method for determining a state of health of a power source of a portable device
A method for determining a State of Health (SoH) of a power source of a portable device involves extracting a start voltage value of an examined power source; activating one or more hardware components of the portable device by a software, to increase the current consumption of the device, identifying a voltage drop rate of the examined power source and comparing a calculated voltage drop rate to pre-calculated threshold values stored on a database of a main server. A system for executing the method is also disclosed.
A system and method may cause a computing device to operate according to a selected operational mode. A diagnostic application may selectively execute one or more tests on the computing device; record a result of executing a test; and perform an action based on the result. An operational mode selected may be a safe mode that includes executing only a portion of an operating system and the diagnostic application. A test may include executing an application and selectively validating performance of one or more resources of a computing device while the application is executing. A test may include executing an application selected based on a rule related to a category of applications.
Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A policy may be defined to control which users are permitted access to a key to decode the encoded content. The policy may defer to a third party policy node in determining key access. An account for a controlling entity, such as a guardian or employer, may be configured to control the encoding status of posts made by another. The controlling entity may control who has key access to decode posts made by the other account. The guardian account may be configured to have preemptive rights over posting decisions made by the minor.
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.
The present invention relates to computerized (“smart”) mobile electronic devices and more particularly, to a system and methods of diagnosing and repairing malfunctions in smart mobile electronic devices, including a diagnostic process that utilizes decisions based on Big Data that holds information of multiple devices and offers a “disable components” (i.e., turn-off components) solution in order to overcome the problem without flashing a firmware or doing a factory-reset.
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.
Data may be masked on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group has access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.
Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A policy may be defined to control which users are permitted access to a key to decode the encoded content. The policy may defer to a third party policy node in determining key access. An account for a controlling entity, such as a guardian or employer, may be configured to control the encoding status of posts made by another. The controlling entity may control who has key access to decode posts made by the other account. The guardian account may be configured to have preemptive rights over posting decisions made by the minor.
Systems and methods for determining search results. The method may include receiving an at least partial search term, and identifying keywords based on the at least partial search term, wherein each keyword has an associated keyword measure based on the number of times each keyword has been previously searched for within a predetermined time period. For each keyword search results associated with the keyword may be identified, wherein each result has an associated search measure. A relevance measure may be determined for each result using the keyword measure the search measure, and used to provide at least one of the results as a search result for the at least partial search term.
Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service providers. Users may select and configure additional identification factors that are unique and convenient for them. These factors, along with additional environmental variables, feed into a trust score computation that weights the trustworthiness of the device context requesting communication with a service provider. Service providers rely on the trust score rather than enforce a specific identification routine themselves. A combination of identification factors selected by the user can be aggregated together to produce a trust score high enough to gain access to a given online service provider. A threshold of identification risk may be required to access a service or account provided by the online service provider.
G10L 21/00 - Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
38.
Method and system for providing social media content synchronized to media presentation
H04N 21/242 - Synchronization processes, e.g. processing of PCR [Program Clock References]
H04N 21/2665 - Gathering content from different sources, e.g. Internet and satellite
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video streamElementary client operations, e.g. monitoring of home network or synchronizing decoder's clockClient middleware
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/4788 - Supplemental services, e.g. displaying phone caller identification or shopping application communicating with other users, e.g. chatting
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/432 - Content retrieval operation from a local storage medium, e.g. hard-disk
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
H04N 21/435 - Processing of additional data, e.g. decrypting of additional data or reconstructing software from modules extracted from the transport stream
H04N 21/84 - Generation or processing of descriptive data, e.g. content descriptors
H04N 21/8547 - Content authoring involving timestamps for synchronizing content
H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
Aspects of the present invention relate to methods and systems for controlling the distribution of supplementary content by generating a first control signal when known content is initially detected in a broadcast stream, and after generating the first control signal, generating a second control signal when the detected content is no longer detected in the broadcast stream. The first and second control signals may be used to control the distribution of supplementary content.
H04N 7/10 - Adaptations for transmission by electrical cable
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/2668 - Creating a channel for a dedicated end-user group, e.g. by inserting targeted commercials into a video stream based on end-user profiles
40.
Methods and systems for distributing interactive content
Aspects of the present invention relate to methods and systems for controlling the distribution of supplementary content by generating a first control signal when known content is initially detected in a broadcast stream, and after generating the first control signal, generating a second control signal when the detected content is no longer detected in the broadcast stream. The first and second control signals may be used to control the distribution of supplementary content.
H04N 7/10 - Adaptations for transmission by electrical cable
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/2668 - Creating a channel for a dedicated end-user group, e.g. by inserting targeted commercials into a video stream based on end-user profiles
41.
System and method for determining a state of health of a power source of a portable device
A method for determining a State of Health (SoH) of a power source of a portable device involves extracting a start voltage value of an examined power source; activating one or more hardware components of the portable device by a software, to increase the current consumption of the device, identifying a voltage drop rate of the examined power source and comparing a calculated voltage drop rate to pre-calculated threshold values stored on a database of a main server. A system for executing the method is also disclosed.
G01R 31/36 - Arrangements for testing, measuring or monitoring the electrical condition of accumulators or electric batteries, e.g. capacity or state of charge [SoC]
42.
Methods and systems for monitoring a media stream and selecting an action
Aspects of the present invention are related to systems, methods and apparatus for selecting an action when known content is detected in a media stream.
H04H 60/37 - Arrangements for identifying or recognising characteristics with a direct linkage to broadcast information or to broadcast space-time, e.g. for identifying broadcast stations or for identifying users for identifying segments of broadcast information, e.g. scenes or extracting programme ID
H04N 21/8352 - Generation of protective data, e.g. certificates involving content or source identification data, e.g. UMID [Unique Material Identifier]
H04N 21/6543 - Transmission by server directed to the client for forcing some client operations, e.g. recording
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/434 - Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams or extraction of additional data from a video streamRemultiplexing of multiplex streamsExtraction or processing of SIDisassembling of packetised elementary stream
H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service providers. Users may select and configure additional identification factors that are unique and convenient for them. These factors, along with additional environmental variables, feed into a trust score computation that weights the trustworthiness of the device context requesting communication with a service provider. Service providers rely on the trust score rather than enforce a specific identification routine themselves. A combination of identification factors selected by the user can be aggregated together to produce a trust score high enough to gain access to a given online service provider. A threshold of identification risk may be required to access a service or account provided by the online service provider.
Systems and methods for determining search results. The method may include receiving an at least partial search term, and identifying keywords based on the at least partial search term, wherein each keyword has an associated keyword measure based on the number of times each keyword has been previously searched for within a predetermined time period. For each keyword search results associated with the keyword may be identified, wherein each result has an associated search measure. A relevance measure may be determined for each result using the keyword measure the search measure, and used to provide at least one of the results as a search result for the at least partial search term.
Aspects of the present invention relate to methods and systems for controlling the distribution of supplementary content by generating a first control signal when known content is initially detected in a broadcast stream, and after generating the first control signal, generating a second control signal when the detected content is no longer detected in the broadcast stream. The first and second control signals may be used to control the distribution of supplementary content.
H04N 7/10 - Adaptations for transmission by electrical cable
H04N 21/2668 - Creating a channel for a dedicated end-user group, e.g. by inserting targeted commercials into a video stream based on end-user profiles
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
46.
Method and system for providing social media content synchronized to media presentation
A computer system provides a method for delivering a video stream to a viewer and delivering, in synchrony with the video stream, social media content created during the current and previous viewings of the video stream by first-time viewers of the video stream.
H04N 9/87 - Regeneration of colour television signals
H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video streamElementary client operations, e.g. monitoring of home network or synchronizing decoder's clockClient middleware
H04N 21/432 - Content retrieval operation from a local storage medium, e.g. hard-disk
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
H04N 21/435 - Processing of additional data, e.g. decrypting of additional data or reconstructing software from modules extracted from the transport stream
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/4788 - Supplemental services, e.g. displaying phone caller identification or shopping application communicating with other users, e.g. chatting
H04N 21/84 - Generation or processing of descriptive data, e.g. content descriptors
H04N 21/8547 - Content authoring involving timestamps for synchronizing content
H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
H04N 21/242 - Synchronization processes, e.g. processing of PCR [Program Clock References]
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/2665 - Gathering content from different sources, e.g. Internet and satellite
The system provides a technique for finding relevant content and content sources based on the aggregation and analysis of individual indications of relevance. The system identifies and provides selections of relevant content. It may comprise a selection acquisition subsystem, a selection network repository subsystem, a scoring engine, and a recommendation engine, and is used to generate sources of content comprising sets of prioritized links directed to a topic or community of interest.
Systems and methods for preserving digital evidence using a self-protecting storage device are provided, by copying digital evidence from a source drive to a self-protecting storage device, writing and storing metadata relating to the copying such as date, time, and those present, and engaging the self-protecting features of the storage device such that the copied digital evidence cannot be altered.
Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.
Data may be masked on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group has access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.
Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A policy may be defined to control which users are permitted access to a key to decode the encoded content. The policy may defer to a third party policy node in determining key access. An account for a controlling entity, such as a guardian or employer, may be configured to control the encoding status of posts made by another. The controlling entity may control who has key access to decode posts made by the other account. The guardian account may be configured to have preemptive rights over posting decisions made by the minor.
A computer system is used to distribute an application using a data resource. An application using a data resource is created using an authoring environment. The application is converted into a certified master application template. The certified master application template is used to create a certified application and certified data resource. The certified application and certified data resource are distributed. During the distribution of the application, the certified master application template is modified and a new certified data resource is created. The new certified data resource is distributed.
A first check code is computed by applying an algorithm to a proper subset of a first body of data. A second check code is computed by applying the algorithm to an equivalent proper subset of a second equivalent body of data. The two check codes are compared. The extent of the proper subset of the first body of data is determined by a semantic analysis of the first body of data. Multiple versions of an application, when the semantic changes between the applications are inconsequential, may then be certified by ignoring the non-significant modifications and ensuring the integrity of the remainder of the content.
A computer system is used to create an application. An application is created using an authoring environment. The application is converted into a master application template by creating an application representation and creating associated metadata that define at least one allowable modification that may be made to the application representation. An application is created from the master application template, and the application and master application template are submitted to a certification body for certification. The certification process affirms that the application, with any modification to the application specified by the master application template metadata, meets all requirements for certification. The certified master application template is used to create a certified application.
A computer system is used to create an application. An application is created using an authoring environment. The application is converted into a master application template by creating an application representation and creating associated metadata that define at least one allowable modification that may be made to the application representation. The master application template may be certified. A child application template is derived from the master application template by deleting at least one allowable modification of the master application template, or by deleting, adding, or modifying at least one constraint to at least one allowable modification of the master application template, where the effect of the deletion, addition, or modification is to reduce the scope of the allowable modification to the child application template source code. The child application template is used to create an application.
A computer system is used to distribute an application using a data resource. An application using a data resource is created using an authoring environment. The application is converted into a certified master application template. The certified master application template is used to create a certified application and certified data resource. The certified application and certified data resource are distributed. During the distribution of the application, the certified master application template is modified and a new certified data resource is created. The new certified data resource is distributed.
A computer system is used to create and distribute applications. An audience qualifier and a set of categories corresponding to the audience qualifier are selected. A master application template is selected. The master application template may be pre-certified. For each of the selected categories, an application instance is created from the master application template, where the modifications to the master application template for each category are determined at least in part by the characteristics of the category. Metadata describing the audience qualifier and category are associated with each application instance. The application instances may be certified. The application instances are distributed in accordance with the metadata.
A computer system is used to create an application. A multi-platform application intended for two or more target platforms is created using an authoring environment. The application is converted into a multi-platform master application template by creating an application representation and creating associated metadata that define at least one allowable modification that may be made to the application representation. For each target platform, an application is created from the multi-platform master application template suitable for the target platform, and the application and multi-platform master application template are submitted to a certification body for certification on the target platform. The certification process affirms that the application, with any modification to the application specified by the multi-platform master application template metadata, meets all requirements for certification. The certified multi-platform master application template is used to create a certified application for each target platform.
The system provides a technique for finding relevant content and content sources based on the aggregation and analysis of individual indications of relevance. The system identifies and provides selections of relevant content. It may comprise a selection acquisition subsystem, a selection network repository subsystem, a scoring engine, and a recommendation engine, and is used to generate sources of content comprising sets of prioritized links directed to a topic or community of interest.
G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
G06F 17/30 - Information retrieval; Database structures therefor
G06F 15/18 - in which a program is changed according to experience gained by the computer itself during a complete run; Learning machines (adaptive control systems G05B 13/00;artificial intelligence G06N)
Methods, systems and computer product for allowing flexible definition of appearance and behavior states for an interactive application. A state table includes a first dimension and a second dimension, the first dimension configured to identify at least one programming element and the second dimension configured to identify a plurality of states of the computer system. When a state table creation operating mode is activated and alteration of at least one programming element is identified, an operand is automatically stored in a cell at each intersection of the first dimension and the second dimension. Alterations that are identified include movement of a graphical object, changes of size, color, associated text, or other graphical feature of a graphical object.
Systems, methods and graphical user interfaces for creating interactive television applications are provided. A template author creates a template application and assigns placeholder objects do display elements. An episodic creator creates an episodic application by making changes to display elements associated with a presented placeholder object.
A system method and apparatus for selectively recording on a VCR cassette, those news items of interest to a particular subscriber includes selecting video news items in accordance with previously entered user selected key word criteria. An advance data stream representing the text of each upcoming broadcast news item is provided in advance of the video broadcast of that news item. The advance data stream is searched for a match with any of the key word criteria previously entered by the subscriber. If a match between the stored user selected key word criteria and the advance data stream is found, the subscriber's VCR is enabled at the appropriate later time to record the desired news item. The VCR cassette contains those news items of interest to the particular subscriber, which the subscriber may watch at, any convenient later time.
The current invention describes a virtual machine designed to run on a variety of platforms of varied capabilities, and in particular describes support in the coding and development environment for assessing and managing the variation in capability and performance among the platforms.
A method, a computer readable medium, and a system are provided for generating control information for controlling computer system operation during execution of the computer system. At least one attribute change of a computer system to occur during execution of the computer system is identified. The attribute change is associated with an event taking place during computer system execution. An index point is created identifying the attribute point as triggering the attribute change, and the index point is associated with the attribute change in the computer system. The index point is stored in a format configured to be used by the computer system to initiate the attribute change upon the index point being reached during the execution of the computer system.
A simple display of items from a list, which changes in synchrony with the corresponding video display, and permits simple navigation under user control. The display includes three control objects positioned below a video frame window on a display screen. A middle displayed object is located in a focus position and corresponds to the video segment currently being played in the video window. When play of the segment is complete, the object located to the right of the focus position moves and displaces the middle displayed object, most recently displayed within the focus position, to indicate a forward progression within the viewed video sequence.