Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

615results about How to "Limit scope" patented technology

Composition of local media playback with remotely generated user interface

A media server in a home entertainment network coordinates with a media player connected with the network to provide a media presentation with a combined user interface (UI) on an attached display device. Media content is sourced locally on a networked media player. The media player extracts metadata related to the media content and transmits the metadata to the media server. The media server creates the UI to include components related to the media content rendered by the media player. The media server then transmits the UI to the media player for combination with the rendered media content for a composite output to a presentation device. The media server may further develop and transmit compositing instructions and additional media content to the media player for inclusion in the composite output.
Owner:MICROSOFT TECH LICENSING LLC

Authentication methods for use in financial transactions and information banking

A method for conducting a financial transaction can be used by a person using a mobile device to conduct the transaction. The mobile device receives information related to the person that can be used for authentication purposes, such as a PIN or biometric data. The mobile device then authenticates the person by verifying the information received. If the person is authenticated, the transaction is completed using the mobile device, and if the person is not authenticated, the transaction is prevented.
Owner:BANK OF AMERICA CORP

Accessing Service Guide Information in a Broadcast System

Apparatuses may perform and methods may include receiving a broadcast signal that includes a physical layer pipe identified by a predetermined identifier indicating that the physical layer pipe includes service guide bootstrap information. The bootstrap information may identify one or more service guides available for download. The physical layer pipe may include a header that includes version values that identify changes in signaling data and changes in the service guides. Based on receiving the header only, an apparatus may determine whether the signaling data and / or service guides previously stored in the apparatus need to be updated.
Owner:NOKIA CORP

Automatic tag generation based on image content

Automatic extraction of data from and tagging of a photo (or video) having an image of identifiable objects is provided. A combination of image recognition and extracted metadata, including geographical and date / time information, is used to find and recognize objects in a photo or video. Upon finding a matching identifier for a recognized object, the photo or video is automatically tagged with one or more keywords associated with and corresponding to the recognized objects.
Owner:MICROSOFT TECH LICENSING LLC

Methods, apparatus and media for control scheme for parallel high-side switching mosfets

The present disclosure relates to a power regulator including an inductor and a high-side switch comprising a first MOSFET and a second MOSFET in parallel. The regulator may also include an electrical pathway between the high-side switch and the inductor. A controller may also be communicatively coupled to the high-side switch. The controller may comprise logic to operate the high-side switch by simultaneously enabling the first MOSFET and disabling the second MOSFET.
Owner:DELL PROD LP

Destination information sharing for the automobile environment

An in-vehicle system may detect an occurrence of a triggering event, detect a short-range communication connection between the in-vehicle system and a mobile communication device, send a prompt, including a request for information, to the mobile communication device, and receive a response, including the requested information, from the mobile communication device via the short-range communication module. In some embodiments, a business review, an advertisement, or a redeemable electronic coupon may be sent to the mobile communication device after the requested information is provided. Furthermore, destination information may be shared between the in-vehicle system and the mobile communication device in response to the triggering event.
Owner:HONDA MOTOR CO LTD

Joint disambiguation of the meaning of a natural language expression

At least two ambiguous aspects of the meaning of a natural language expression are disambiguated jointly. In the preferred embodiment, word sense ambiguity, reference ambiguity, and relation ambiguity are resolved simultaneously, finding the disambiguation result(s) that simultaneously optimize the weight of the solution, taking into account semantic information, constraints, and common sense knowledge. Choices are enumerated for each constituent being disambiguated, combinations of choices are constructed and evaluated according to semantic information on which meanings are sensible, and the choices with the best weights are selected, with the enumeration pruned aggressively to reduce computational cost.
Owner:CLAUSAL COMPUTING

Incrementally Perfected Digital Asset Collateral Wallet

A multisig digital asset wallet stores collateral for a loan between a borrower and a lender. The borrower and lender agree to loan terms including collateralization requirements. Over the course of the loan repayment period, a Loan-to-Value (LTV) ratio between the digital asset collateral and the loan principal balance will change due to fluctuations in the market exchange value of the digital asset and a declining loan principal balance due to regular loan repayments by the borrower. If the LTV exceeds the collateral requirements by an overage amount, then the borrower may sign a transaction and request signatures from other participants to withdraw funds from the multisig collateral wallet. If the LTV fails to satisfy the collateral requirements, participants may spend funds from the multisig collateral wallet to improve the LTV, catch up after a missed payment by the borrower, or pay down the loan principal.
Owner:SALT BLOCKCHAIN INC

Architecture for controlling clock characteristics

An architecture for controlling the clock waveform characteristics, including but not limited to the clock amplitude and clock rise and / or fall times, of resonant clock distribution networks is proposed. This architecture relies on controlling the size of clock drivers and the duty cycles of reference clocks. It is targeted at resonant clock distribution networks and allows for the adjustment of resonant clock waveform characteristics with no need to route an additional power grid. Such an architecture is generally applicable to semiconductor devices with multiple clock frequencies, and high-performance and low-power clocking requirements such as microprocessors, ASICs, and SOCs.
Owner:CYCLOS SEMICON

Analytics for mobile applications

A tag delivery network is disclosed for delivering tags to collect analytics related to use of mobile applications. The tag delivery network may include multiple servers for communicating with mobile devices executing mobile applications. The mobile applications may be any mobile application that has been recompiled with, for example, a particular line of code and a static library. A recompiled mobile application may initiate a browser when executed by a mobile device. The tag delivery network may deliver a tag container to the browser. The tag container may load a bootstrap file which in turn may load one or more rule files and code files. These files may cause the mobile device to modify an appearance of the mobile application. The modification may be performed to carry out multivariate testing (e.g., A / B testing), content swapping, optimization of the mobile application, or personalization of the mobile application.
Owner:ENSIGHTEN

Memory Whitelisting

An enhanced whitelisting module associated within a system whitelists unknown files for execution on the system. The whitelisting module may oversee the computation of a hash of a file loaded into the memory and comparison of the hash to hashes within a hash table generated from clean files located on a clean system. The whitelisting module may communicate to a device internal and / or external to the system to retrieve the hash table of clean files. In certain embodiments, a rolling hash (or other piecewise hash) may be used to determine the location and / or extent of the differences between a modified file and a clean file.
Owner:BANK OF AMERICA CORP

Tactile overlay for virtual keyboard

The present disclosure provides for a computing system having virtual keyboard functionality that can be selectively enhanced through use of a tactile keyboard overlay. The tactile keyboard overlay includes a plurality of depressible key portions, and is placed onto an operative surface of a touch interactive display. The computing system configures the virtual keyboard functionality, so that each of the depressible key portions is operable to produce a touch input on the touch interactive display that causes performance of a corresponding input operation. The virtual keyboard functionality is dynamically and automatically located on the touch interactive display based on user placement of the tactile keyboard overlay.
Owner:MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products