Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1631 results about "Digital device" patented technology

Definition of: digital device. digital device. A physical unit of equipment that contains a computer or microcontroller. Today, myriad devices are digital including a smartphone, tablet and smartwatch. In contrast, there are numerous non-digital (analog) devices, such as a thermometer, electric fan and bicycle.

Method, apparatus and computer readable medium for multiple messaging session management with a graphical user interfacse

A graphical user interface displays a unique graphical indexing element such as a tab for each engaged and non-engaged messaging session. The user chooses which messaging session to make engaged by selecting its graphical indexing element. The graphical indexing elements have various distinctive characteristics to indicate the status of their respective messaging sessions, such as engaged, non-engaged with no unread messages, or non-engaged with at least one unread message. The messaging sessions may all be docked, in which event the engaged messaging session is displayed in a window pane set and the other messaging sessions are not displayed, or may be selectively undocked, in which event the engaged messaging session and the undocked messaging sessions are displayed in respective window pane sets. The engaged window pane set supports the communication of original or predefined messages between the user's digital device and the pal's messaging-enabled digital device, regardless of capability.
Owner:ECRIO

Method and system for navigating a display screen for locating a desired item of information

A method and a system for navigating a display screen to search for a desired item of information stored in an electronic device. The electronic device includes a novel fly over user interface (FOUI) capable of receiving commands from a user to provide a zoom out view of the display screen. A user may commence a navigation session by touching the display screen in a non active area or by clicking on a specifically designated icon to activate the user interface. During the navigation session, the display screen is zoomed-out and a magnifying area may appear on the display screen. The user interface enables the user to scroll the zoomed-out display screen by dragging the magnifying area towards an edge of the display screen to find a desired item of information. The display screen may be a display screen of a digital device (e.g., portable computer, personal computer, a cellular telephone, a digital watch, etc). The user may terminate a navigation session by removing the pointer from the display screen.
Owner:ACCESS

Wireless home and office appliance management and integration

The present invention provides systems and methods for managing and controlling networked devices. A system comprises a host application executing on, for example, a personal computer, and one or more networked devices executing a client application. A networked device includes a consumer appliance equipped with network capability, a digital device such as MP3 players and DVRs, an electronically-controlled device such as a light circuit or other type of circuit, and the like. The host application automatically establishes communication with the networked device. The networked device configures a user interface for user control of the networked device. The host application provides a graphical layout of the networked device.
Owner:APPLE INC

Malware containment and security analysis on connection

Systems and methods for malware containment and security analysis on connection are provided. Digital devices are quarantined for a predetermined period of time upon connection to the communication network. When a digital device is quarantined, all network data transmitted by the digital device is directed to a controller which then analyzes the network data to identify unauthorized activity and / or malware within the newly connected digital device. An exemplary method to contain malware includes detecting a digital device upon connection with a communication network, quarantining network data from the digital device for a predetermined period of time, transmitting a command to the digital device to activate a security program to identify security risks, and analyzing the network data to identify malware within the digital device.
Owner:FIREEYE SECURITY HLDG US LLC

Washable wearable biosensor

A washable, wearable biosensor that can gather sensor data, communicate the sensed data by wireless protocols, and permits the analysis of sensed data in real-time as a person goes about their normal lifestyle activities. The biosensor can be worn in multiple positions, can be put on or removed quickly without having to apply or remove gels and adhesives, and provides a snug, comfortable fit to gather data with minimal motion artifacts. The textile, wearable device can support integrated photoplethysmography, skin conductance, motion, and temperature sensors in a small wearable package. The supported sensors may be coupled to utilization devices by channel-sharing wireless protocols to enable the transmission of data from multiple users and multiple sensors (e.g. both sides of body, wrists or hands and feet, or multiple people). An on-board processor, or the receiving utilization device, can map patterns of the physiological and motion data to signals or alerts such as a likely seizure, drug craving, or other states that the wearer may exhibit or experience. The sensor data may be sent by wireless transmission and received by a mobile phone or other personal digital device, a computer, a favorite toy, or another wearable device. The sensors may include multiple photoplethysmographs and / or one or more EDAs which perform a time-domain measurement of skin conductance
Owner:MASSACHUSETTS INST OF TECH

Dynamic signature creation and enforcement

A dynamic signature creation and enforcement system can comprise a tap configured to copy network data from a communication network, and a controller coupled to the tap. The controller is configured to receive the copy of the network data from the tap, analyze the copy of the network data with a heuristic to determine if the network data is suspicious, flag the network data as suspicious based on the heuristic determination, simulate transmission of the network data to a destination device to identify unauthorized activity, generate an unauthorized activity signature based on the identification, and transmit the unauthorized activity signature to a digital device configured to enforce the unauthorized activity signature.
Owner:FIREEYE SECURITY HLDG US LLC

In-Ear Biometrics

There is provided according to an embodiment of the present a biometric tracking Apparatus for use with a digital device, said apparatus comprising: a headphone including a sensor wherein said sensor is configured to produce a data signal that is indicative of one or more biometric parameters; an input configured to receive said data signal; and a storage medium configured to store said data signal.
Owner:IMATION

Digital device for providing text messaging service and method for controlling the same

The present disclosure relates to a digital device and a method for controlling the same, which displays an application related to a text message, extracts additional information from the application and inserts the extracted additional information to the text message, in order to provide additional information associated with a text message.
Owner:LG ELECTRONICS INC

Distributed systems and methods for automatically detecting unknown bots and botnets

Techniques may automatically detect bots or botnets running in a computer or other digital device by detecting command and control communications, called “call-backs,” from malicious code that has previously gained entry into the digital device. Callbacks are detected using a distributed approach employing one or more local analyzers and a central analyzer. The local analyzers capture packets of outbound communications, generate header signatures, and analyze the captured packets using various techniques. The techniques may include packet header signature matching against verified callback signatures, deep packet inspection. The central analyzer receives the header signatures and related header information from the local analyzers, may perform further analysis (for example, on-line host reputation analysis); determines using a heuristics analysis whether the signatures correspond to callbacks; and generally coordinates among the local analyzers.
Owner:FIREEYE SECURITY HLDG US LLC

Personal digital device with adjustable interface

InactiveUS7558057B1High trafficPrecise and quick and comfortable mannerDetails for portable computersSubstation equipmentGraphicsVariable stiffness
A personal digital device comprises a variable stiffness screen capable of varying its display size by managing its stiffness, and a body carrying means for wireless communication and for storing and processing information. The functional flexibility of the screen allows for creating an adjustable visual interface between the user and the device: with the screen inside the device for compact storage, and with the screen extended to display high-quality graphics and images. In some particular embodiments the device incorporates a detachable audio unit allowing configuration of the user audio interface depending on the specifics of usage.
Owner:NAKSEN ALEX +1

Transceiver for fixed wireless access network applications

A combined wireless transceiver and signal conversion unit comprises a radio receiver for receiving a wireless radio signal, and a converter for converting the signal into a form having a communications protocol supported by a communications port of a user digital device. An output device is provided for transmitting the converted signal to a user digital device via a wireline or other suitable medium for carrying the converted signal. The unit includes an input device for receiving a communications signal from the communication port of a user digital device via a wireline or other suitable signal transmission medium, and a transmitter for converting the received signal to a form for wireless transmission.
Owner:DRAGONWAVE

Systems and Methods for Virtualized Malware Detection

Systems and methods for virtualized malware enabled detection are described. In some embodiments, a method comprises intercepting an object provided from a first digital device, determining one or more resources the object requires, instantiating a virtual environment with the one or more resources, processing the object within the virtual environment, tainting operations of the object within the virtual environment, monitoring the operations of the object, identifying an additional resource of the object while processing that is not provided in the virtual environment, re-instantiating the virtual environment with the additional resource, monitoring the operations of the object while processing within the re-instantiated virtual environment, identifying untrusted actions from the monitored operations, and generating a report identifying the operations and the untrusted actions of the object.
Owner:CYPHORT

Method and system for generating a permanent record of a service provided to a mobile device

System and methods are disclosed that provide users of mobile digital devices the opportunity to obtain a permanent record of the service rendered at the mobile device for all modes of web based services, location based services, services originating at the mobile device and not related to the location of the device, services originating via a voice portal, web based services originating via voice communication. Services include location independent services, such as tickets and coupons, and location based services, such as obtaining directions / or and maps to the nearest store or hotel or to a given location, obtaining traffic information, and receiving location-based coupons at the mobile device.
Owner:INTELLECTUAL VENTURES I LLC

Washable wearable biosensor

A washable, wearable biosensor that can gather sensor data, communicate the sensed data by wireless protocols, and permits the analysis of sensed data in real-time as a person goes about their normal lifestyle activities. The biosensor can be worn in multiple positions, can be put on or removed quickly without having to apply or remove gels and adhesives, and provides a snug, comfortable fit to gather data with minimal motion artifacts. The textile, wearable device can support integrated photoplethysmography, skin conductance, motion, and temperature sensors in a small wearable package. The supported sensors may be coupled to utilization devices by channel-sharing wireless protocols to enable the transmission of data from multiple users and multiple sensors (e.g. both sides of body, wrists or hands and feet, or multiple people). An on-board processor, or the receiving utilization device, can map patterns of the physiological and motion data to signals or alerts such as a likely seizure, drug craving, or other states that the wearer may exhibit or experience. The sensor data may be sent by wireless transmission and received by a mobile phone or other personal digital device, a computer, a favorite toy, or another wearable device. The sensors may include multiple photoplethysmographs and / or one or more EDAs which perform a time-domain measurement of skin conductance.
Owner:MASSACHUSETTS INST OF TECH

Digital rights management of a digital device

According to one embodiment, an apparatus involves the descrambling of scrambled digital content using a one-time programmable key and digital rights management. The apparatus comprises a processor and a descrambler. The processor is adapted to execute a Digital Rights Management (DRM) function in order to determine whether each entitlement needed to access the digital content is pre-stored. The descrambler is adapted to decrypt encrypted information using a Unique Key stored within the one-time programmable memory. After determining that each entitlement needed to access the digital content is pre-stored, the decrypted information is used to generate a key, which is used to decrypt at least one service key for descrambling the scrambled digital content.
Owner:SONY CORP +1

Live concert/event video system and method

One aspect of the invention is a method of providing video to attendees of a live concert. Video of different views of the live concert is captured. A plurality of video streams are provided to attendees of the live concert while the live concert is occurring. The plurality of digital video streams enable an attendee of the live concert to select which of the plurality of digital video streams to view using a portable digital device associated with that attendee such that the attendee may choose from among the different views of the live concert.
Owner:LIVE NATION WORLDWIDE

Systems and methods for provisioning a host device for enhanced services in a cable system

Flexible systems and methods are disclosed that may be used for provisioning, configuring, and controlling a host embodied in a cable set top box or other digital device attached to a digital communication network, such as cable distribution network. An enhanced services system maintains various host files for various types of hosts that a cable subscriber may purchase and connect to the cable network. The Enhanced Services Server interacts with the host using the host files. The host files may be downloaded from the host manufacturer into a database that distributes the modules as required to the various enhanced services systems. The host may be purchased by the cable subscriber and provisioning may be initiated by the retailer at the time of purchase using a provisioning network interacting with the appropriate cable system serving the subscriber. This abstract is not intended to limit or construe the scope of the claims.
Owner:ERICSSON TELEVISION

Classifying sets of malicious indicators for detecting command and control communications associated with malware

Techniques may automatically detect bots or botnets running in a computer or other digital device by detecting command and control communications, called “call-backs,” from malicious code that has previously gained entry into the digital device. Callbacks are detected using an approach employing both a set of high quality indicators and a set of supplemental indicators. The high quality indicators are selected since they provide a strong correlation with callbacks, and may be sufficient for the techniques to determine that the network outbound communications actually constitute callbacks. If not, the supplemental indicators may be used in conjunction with the high quality indicators to declare the outbound communications as callbacks.
Owner:FIREEYE SECURITY HLDG US LLC

Systems and Methods for Obtaining Network Credentials

Systems and methods for obtaining network credentials are disclosed. In some embodiments, a method comprises receiving, with a digital device, a network identifier from a network device, providing a first credential request including the network identifier to another digital device on a network, receiving a request for additional network information from the other digital device, providing a second credential request including additional network information to the other digital device, receiving a credential request response including network credentials from the other digital device, and providing the network credentials from the credential request response to a network device.
Owner:CHANNEL VENTURES GRP LLC

Systems and methods for decentralized computing

Methods and systems for providing decentralized computing are provided. An exemplary method includes generating one or more virtual machine images including at least one application and a virtual machine, associating the one or more virtual machine images with user information, receiving user information from a digital device, selecting one or more associated virtual machine images based on the user information, and providing the one or more virtual machine images to the digital device.
Owner:CITRIX SYST INC

Method and apparatus for providing fixed bandwidth communications over a local area network

The present invention is a method and apparatus for transferring data between a wide area network and a computer system located on an Ethernet type local area network. When characterized as a method, the present invention initially receives data from the wide area network using a digital device that is connected to both the wide area network and the local area network, the data received by the digital device being destined for a computer system attached to the local area network. Next, the digital device receives a signal from systems in the wide area network indicating that the data is to be transferred to and from the computer system at a predetermined guaranteed quality of service (QoS) and bandwidth. Packets that contain the data are then formatted to indicate that the data is to be transmitted at a “guaranteed” rate of throughput higher than the minimum rate. Finally, the packets that contain the data are sent to the computer system, thereby establishing a communication link for the packet stream between the wide area network and the local area network that transmits data at the guaranteed QoS.
Owner:CORPS OF DISCOVERY PATENT HLDG

Bookmarking and annotating in a media diary application

A media diary or media management application implemented in a digital device that incorporates a bookmarking and / or annotating mechanism for providing graphical enhancement to media files, calendar events and time periods displayed in the media management application. In addition, the bookmarking and annotation mechanism provides for text notes to be associated with the media files, calendar event or time period and for the text note to be accessible through the bookmark or annotation.
Owner:NOKIA CORP

System for coordinating the presentation of digital content data feeds

A reader for obtaining a plurality of categorized digital content from a content aggregator framework over a communications network based on a content subscription with the aggregator framework, the reader configured for operation on a digital device. The reader includes an interface module configured for receiving content category selections from a user of the device and for identifying a profile of the user including one or more user definitions. A communications module communicates the profile and the content selections to the aggregator framework; and a generation module configured presents updated versions of the digital content to device user when the updated digital content becomes available from the aggregator framework, such that the digital content is assigned to one or more of the content categories as selected by the user. The user definitions of the profile and the content selections of the user are used to determine the contents of the updated digital content obtained by the reader. An aggregator framework is also provided that is configured to communicate with the reader.
Owner:MATHENY JOSEPH +1

Method of transacting an electronic mail, an electronic commerce, and an electronic business transaction by an electronic commerce terminal using a wirelessly networked plurality of portable digital devices

The present invention relates to a method of transacting e-mail, e-commerce, e-business and for transaction of other data communications having associated transaction data for use with a universal server by wirelessly networking a plurality of portable digital devices to an electronic commerce terminal. The system can also effectuate electronic commerce and interactive advertising at the point of sale. Vending equipment can be networked to each other through a first network, programmable and accessible by a PC, server, point of sale (POS) system, property or management information system (PMS / MIS), and networked to a second network. Complete control of a vending machine's functionality including usage, control, diagnostics, inventory, and marketing data capture can be effectuated locally or by remote connection to the network. Remote connection to the network includes Internet type connections, telecommunication (telephone, ISDN, ADSL), VSAT satellite, and other wire and wireless transmission.
Owner:CANTALOUPE INC

Time bar navigation in a media diary application

A time bar that is navigable within a media diary application for the purpose of efficiently locating a date associated with a media file. The media diary is an application implemented on a digital device for the purpose of organizing by timeframe the digital media files that exist on the device. The time bar feature provides a means to easily and efficiently locate media files within the diary.
Owner:BEIJING XIAOMI MOBILE SOFTWARE CO LTD

Digital device control system using smart phone

There is provided a digital device control system using a smart phone, including a smart phone having an application of a remote control function, a digital device of which on / off of a power supply, channel or volume is controlled according to a signal received from the smart phone, and an IR repeater functioning as a central control unit connected to the smart phone through Bluetooth or Wi-Fi communication and connected to the digital device through a plurality of infrared ray communications in order to remotely control the digital device, and therefore, the digital device can be controlled using the smart phone instead of a remote controller. In addition, since a plurality of LEDs capable of performing infrared ray communication is included in the IR repeater so as to transmit and receive an infrared signal of a wide range, a digital device desired to be controlled can be remotely controlled even when the digital device is placed at a far distance or at a blind spot in a room, and a plurality of digital devices can be controlled simultaneously.
Owner:DIGIENCE +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products