PRODUCT ASSEMBLY ASSISTANCE EMPLOYING TAGGED COMPONENTS
    221.
    发明申请
    PRODUCT ASSEMBLY ASSISTANCE EMPLOYING TAGGED COMPONENTS 审中-公开
    使用标签组件的产品组装辅助

    公开(公告)号:US20160104386A1

    公开(公告)日:2016-04-14

    申请号:US14894999

    申请日:2013-06-05

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for providing instructional media for assembly of a product from multiple components. In some examples, a standalone or web-based application for assisting with assembly of items may be informed of the state of the ongoing unpacking and/or assembly through optically, wirelessly, or comparably readable tags associated with the individual components of a disassembled item. Based on received data on state of assembly and which parts a user is accessing, the application may select appropriate instructional media, including detection of when assembly has gone wrong in order to coach the user through the assembly process and/or corrections.

    Abstract translation: 通常描述技术来提供用于组装来自多个部件的产品的教学介质。 在一些示例中,可以通过与拆卸的物品的各个部件相关联的光学,无线或可比较地读取的标签来通知用于协助装配物品的独立或基于网络的应用程序的持续拆包和/或组装的状态。 基于接收到的组装状态数据和用户正在访问哪些部件,应用程序可以选择适当的教学媒体,包括检测组装何时出错以通过组装过程和/或校正来教导用户。

    Smart power background to validate user
    222.
    发明授权
    Smart power background to validate user 有权
    智能电源背景验证用户

    公开(公告)号:US09306963B2

    公开(公告)日:2016-04-05

    申请号:US14352655

    申请日:2013-08-28

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described to implement intrusion detection based on smart power background. In some examples, upon detection of an attempt to access a resource, a power line ambiance may be determined at a location of a device on which the attempt to access the resource is executed. The power line ambiance may be based on a connection of the device and/or one or more other devices at the location to a power line. The captured/received power profiles may identify device signatures enabling generation of a digest of the location. An intrusion detection system (IDS), may receive the digest of the location and compare the digest to previous digests associated with an authorized client of the resource to evaluate an authenticity of the attempt. If the authenticity of the attempt is suspicious, the IDS may elevate security by employing one or more verification levels and/or one or more authentication techniques.

    Abstract translation: 技术通常被描述为实现基于智能电源背景的入侵检测。 在一些示例中,在检测到访问资源的尝试时,可以在执行尝试访问资源的设备的位置处确定电力线路环境。 电力线环境可以基于设备和/或位于电力线路处的一个或多个其他设备的连接。 捕获/接收的功率简档可以识别能够生成位置的摘要的设备签名。 入侵检测系统(IDS)可以接收位置的摘要,并将摘要与与资源的授权客户端相关联的以前的摘要进行比较,以评估尝试的真实性。 如果尝试的真实性是可疑的,则IDS可以通过采用一个或多个验证级别和/或一种或多种认证技术提高安全性。

    Application Copy Counting Using Snapshot Backups For Licensing
    223.
    发明申请
    Application Copy Counting Using Snapshot Backups For Licensing 审中-公开
    应用程序复制计数使用快照备份进行许可

    公开(公告)号:US20160092313A1

    公开(公告)日:2016-03-31

    申请号:US14496092

    申请日:2014-09-25

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are described herein to use snapshot backups for licensing. Some example technologies may access a snapshot backup that is taken during an execution of a virtual machine on a server. One or more snapshot backups may be examined to detect applications that executed on the server at a time the snapshot backup was taken. A determination may be made as to what applications that were identified are subject to a license. Licensing information may be provided that includes information associated with the one or more of the applications that are subject to the license.

    Abstract translation: 技术在这里被描述为使用快照备份进行许可。 一些示例技术可以访问在服务器上执行虚拟机期间采取的快照备份。 可以检查一个或多个快照备份,以检测在快照备份时在服务器上执行的应用程序。 可以确定所识别的应用程序是否受许可证的限制。 可以提供许可信息,其中包括与受许可的一个或多个应用相关联的信息。

    NETWORK CONTROL SECURITY
    224.
    发明申请
    NETWORK CONTROL SECURITY 有权
    网络控制安全

    公开(公告)号:US20160087994A1

    公开(公告)日:2016-03-24

    申请号:US14492938

    申请日:2014-09-22

    CPC classification number: H04L63/105 H04L45/308 H04L63/18 H04L63/20

    Abstract: Technologies are generally described for systems, devices and methods effective to allow a network element to retrieve a control command. In some examples, a network controller device may associate an identifier with the control command. The network controller device may send the identifier and the associated control command over a first network with a first level of security to a computing device. The network controller device may send an activation signal to the network element over a second network with a second level of security different from the first level of security. The network controller device may send the identifier to the network element over the second network. The identifier may be effective to allow the network element to retrieve the control command.

    Abstract translation: 通常描述了有效地允许网络元件检索控制命令的系统,设备和方法的技术。 在一些示例中,网络控制器设备可以将标识符与控制命令相关联。 网络控制器设备可以通过具有第一级安全性的第一网络向计算设备发送标识符和相关联的控制命令。 网络控制器设备可以通过不同于第一安全级别的第二安全级别在第二网络上向网络元件发送激活信号。 网络控制器设备可以通过第二网络将标识符发送到网络元件。 标识符可以有效地允许网络元件检索控制命令。

    MODIFYING SOUND OUTPUT IN PERSONAL COMMUNICATION DEVICE
    226.
    发明申请
    MODIFYING SOUND OUTPUT IN PERSONAL COMMUNICATION DEVICE 有权
    在个人通信设备中修改声音输出

    公开(公告)号:US20160080537A1

    公开(公告)日:2016-03-17

    申请号:US14784595

    申请日:2014-04-04

    Inventor: Seungil KIM

    Abstract: Technologies are generally described for modifying sound output in a personal communication device. Example devices described herein may include one or more of a communication unit, an audio processor, and/or a sound leakage detector. A communication signal may be received from the other party during personal communication by the communication unit. The communication signal may be converted by the audio processor into receiver sound for output by a receiver speaker. The sound leakage detector may provide a sound leakage indication if the sound leakage detector receives an input indicating a leakage of the receiver sound being output by the receiver speaker. Further, the audio processor may modify the receiver sound based on the sound leakage indication.

    Abstract translation: 通常描述用于修改个人通信设备中的声音输出的技术。 本文描述的示例设备可以包括通信单元,音频处理器和/或声音泄漏检测器中的一个或多个。 在通信单元进行个人通信期间,可以从另一方接收通信信号。 通信信号可以被音频处理器转换成接收机声音,以便由接收器扬声器输出。 如果声音泄漏检测器接收到指示由接收器扬声器输出的接收机声音的泄漏的输入,则声音泄漏检测器可以提供声音泄漏指示。 此外,音频处理器可以基于声音泄漏指示来修改接收机声音。

    NETWORK INJECTED STORAGE REDIRECTION FOR EMBEDDED APPLICATIONS
    227.
    发明申请
    NETWORK INJECTED STORAGE REDIRECTION FOR EMBEDDED APPLICATIONS 有权
    网络注入用于嵌入式应用程序的存储重定向

    公开(公告)号:US20160080515A1

    公开(公告)日:2016-03-17

    申请号:US14376133

    申请日:2013-11-20

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described to redirect local storage for embedded applications. In some examples, a computing device such as a redirection router, coupled to network-attached storage, may detect a request for an application being delivered from a server to a destination device such as a ubicomp device and intercept the requested application. The redirection router may determine whether the destination device has sufficient local storage. In response to determination that the destination device does not have sufficient local storage or a predefined configuration such as requesting device being configured for local storage, a reference to the client-side storage associated with the application may be replaced with a link, to the network-attached storage prior to delivery of the application. Subsequent retrievals of the application or portions thereof may be from the network-attached storage directly or via the redirection router.

    Abstract translation: 技术通常被描述为重定向用于嵌入式应用的本地存储。 在一些示例中,耦合到网络连接存储器的诸如重定向路由器的计算设备可以检测对从服务器传递到诸如ubicomp设备的目的地设备的应用的请求,并拦截所请求的应用。 重定向路由器可以确定目的地设备是否具有足够的本地存储。 响应于确定目的地设备不具有足够的本地存储或诸如请求设备被配置为用于本地存储的预定义配置,可以将与应用相关联的客户端存储器的引用替换为链路到网络 在交付应用程序之前的附加存储。 应用程序或其部分的后续检索可以直接地或经由重定向路由器来自网络连接的存储器。

    DATA STORAGE BASED ON RANK MODULATION IN SINGLE-LEVEL FLASH MEMORY
    228.
    发明申请
    DATA STORAGE BASED ON RANK MODULATION IN SINGLE-LEVEL FLASH MEMORY 有权
    基于单级闪速存储器中RANK调制的数据存储

    公开(公告)号:US20160077765A1

    公开(公告)日:2016-03-17

    申请号:US14488125

    申请日:2014-09-16

    Inventor: Edwin Kan

    CPC classification number: G06F12/00 G11C7/1006 G11C16/10

    Abstract: Technologies are generally described to store data in single-level memory using rank modulation. In some examples, data to be encoded to single-level memory may be represented with a bit ranking for a group of bits. A program vector may then be determined from the bit ranking and partial program characteristics associated with the memory group(s). The memory group(s) may then be programmed according to the program vector. The encoded data may be subsequently retrieved by performing a series of partial programming operations on the memory group(s) to recover the bit ranking and derive the data represented.

    Abstract translation: 技术通常被描述为使用秩调制将数据存储在单级存储器中。 在一些示例中,要编码到单级存储器的数据可以用一组位的比特排列来表示。 然后可以根据与存储器组相关联的比特排序和部分程序特征来确定程序向量。 然后可以根据程序向量对存储器组进行编程。 可以随后通过对存储器组执行一系列部分编程操作来恢复编码数据,以恢复比特排序并导出表示的数据。

    GRADED STRUCTURE FILMS
    229.
    发明申请
    GRADED STRUCTURE FILMS 审中-公开
    分级结构薄膜

    公开(公告)号:US20160077057A1

    公开(公告)日:2016-03-17

    申请号:US14784535

    申请日:2013-04-16

    Inventor: Yasuhisa FUJII

    Abstract: Devices, films, and methods for the detection of target molecules are provided. The devices, films and methods can include graded layers and a vibration detecting unit. The vibration detecting unit can be a convex or an inverse mesa vibration detecting unit.

    Abstract translation: 提供了用于检测靶分子的装置,膜和方法。 装置,膜和方法可以包括分级层和振动检测单元。 振动检测单元可以是凸面或逆台面振动检测单元。

Patent Agency Ranking