Electronic Game Personalization
    51.
    发明申请
    Electronic Game Personalization 审中-公开
    电子游戏个性化

    公开(公告)号:US20140357365A1

    公开(公告)日:2014-12-04

    申请号:US14344795

    申请日:2013-06-04

    Inventor: Ezekiel Kruglick

    CPC classification number: A63F13/65 A63F2300/6027

    Abstract: Technologies are generally described for personalizing an electronic game. In some examples a method for personalizing an electronic game may include intercepting content, extracting particular content from the intercepted content, and personalizing the electronic game based on the extracted content.

    Abstract translation: 技术通常被描述为用于个性化电子游戏。 在一些示例中,用于个性化电子游戏的方法可以包括截取内容,从截获的内容中提取特定内容,以及基于所提取的内容来个性化电子游戏。

    DATACENTER BORDER-ISSUED ANALYTICS FOR MONITORING FEDERATED SERVICES
    52.
    发明申请
    DATACENTER BORDER-ISSUED ANALYTICS FOR MONITORING FEDERATED SERVICES 有权
    用于监测联合服务的DATACENTER边界问题分析

    公开(公告)号:US20140317273A1

    公开(公告)日:2014-10-23

    申请号:US14114732

    申请日:2013-04-17

    Inventor: Ezekiel Kruglick

    CPC classification number: H04L43/04 H04L41/5096

    Abstract: Technologies are generally described for providing datacenter border-issued analytics for monitoring federated services. In some examples, a deployment manager, which manages placement of application deployment instances across a federation and thus already knows which datacenter each instance is in, may register a package trigger with a gateway at each datacenter when an application is placed in each datacenter. The datacenter gateway(s) may then search through data packets for registered package properties such as content of a packet header that indicates it is a monitoring packet, and inject additional data according to instructions from the deployment manager. For example, the deployment manager may instruct the gateway(s) to inject a datacenter identifier or a network location identifier to each monitoring data packet. The additional data may be customer-defined and the modified monitoring data including the additional data may be sent to a monitoring system to be analyzed.

    Abstract translation: 技术通常被描述为提供用于监视联合服务的数据中心边界发布分析。 在一些示例中,部署管理器管理跨联合的应用程序部署实例的布局,从而已经知道每个实例在哪个数据中心,当应用程序放置在每个数据中心时,可以在每个数据中心注册带有网关的包触发器。 然后,数据中心网关可以通过数据分组搜索注册的包属性,例如指示它是监视分组的分组报头的内容,并且根据来自部署管理器的指令注入附加数据。 例如,部署管理器可以指示网关向每个监视数据分组注入数据中心标识符或网络位置标识符。 附加数据可以是客户定义的,并且包括附加数据的修改的监视数据可以被发送到要分析的监视系统。

    RECHARGEABLE BATTERY RECYCLING
    53.
    发明申请
    RECHARGEABLE BATTERY RECYCLING 审中-公开
    可充电电池回收

    公开(公告)号:US20140106185A1

    公开(公告)日:2014-04-17

    申请号:US13996537

    申请日:2012-10-16

    Inventor: Ezekiel Kruglick

    CPC classification number: G06F16/23 H01M10/54 Y02W30/84

    Abstract: Technologies for recycling rechargeable batteries are described. For example, a rechargeable battery may be recycled through a cycle that includes one or more of determining a battery condition while the rechargeable battery may be used in a networkable device, updating a rechargeable battery database with the battery condition over a network, determining recycling instructions, and outputting the recycling instructions on the networkable device. In other examples, multiple rechargeable batteries may be recycled by receiving battery conditions and identification codes over a network, updating a rechargeable battery database with battery conditions and identification codes, and assigning rechargeable batteries to recycling processes according to battery conditions and identification codes.

    Abstract translation: 描述了用于回收可再充电电池的技术。 例如,可再充电电池可循环使用,该循环包括确定电池状态的一个或多个,同时可再充电电池可用于可联网设备中,通过网络更新具有电池状态的可再充电电池数据库,确定再循环指令 并且在可联网设备上输出回收指令。 在其他示例中,可以通过在网络上接收电池条件和识别码来再循环多个可再充电电池,利用电池条件和识别码更新可再充电电池数据库,并根据电池条件和识别码将可再充电电池分配给再循环过程。

    SHARED SECRET IDENTIFICATION FOR SECURE COMMUNICATION
    54.
    发明申请
    SHARED SECRET IDENTIFICATION FOR SECURE COMMUNICATION 有权
    用于安全通信的共享秘密标识

    公开(公告)号:US20140090016A1

    公开(公告)日:2014-03-27

    申请号:US13816717

    申请日:2012-09-26

    Inventor: Ezekiel Kruglick

    CPC classification number: H04L63/08 H04W12/02

    Abstract: Technologies related to shared secret identification for secure communication are generally described. In some examples, devices may exchange hashes, such as file deduplication hashes, to identify a matching hash. The identified matching hash represents a shared data item which may be used as a shared secret to encrypt and/or decrypt subsequent secure communications between the devices. Each device retrieves the shared data item from its respective secure memory and may use the shared data item to encrypt and/or decrypt subsequent secure communications. An eavesdropper may observe the hash exchange, but will not be able to decrypt the secure communications without access to the shared data item, because hashes may be effectively non-invertible.

    Abstract translation: 通常描述与用于安全通信的共享秘密识别相关的技术。 在一些示例中,设备可以交换散列,例如文件重复数据消除散列,以识别匹配的散列。 所识别的匹配散列表示可以用作共享秘密以对设备之间的后续安全通信进行加密和/或解密的共享数据项。 每个设备从其相应的安全存储器检索共享数据项,并且可以使用共享数据项来加密和/或解密后续的安全通信。 窃听者可以观察哈希交换,但是不能在不访问共享数据项的情况下解密安全通信,因为散列可能是非可逆的。

    Scene analysis for improved eye tracking

    公开(公告)号:US10394318B2

    公开(公告)日:2019-08-27

    申请号:US15286222

    申请日:2016-10-05

    Inventor: Ezekiel Kruglick

    Abstract: Technologies related to scene analysis for improved eye tracking are generally described. In some examples, detected gaze targets may be derived from gaze direction information from an eye-facing sensor. Detected gaze target positions and/or motion may be improved by capturing and analyzing digital scene information from a scene visible by the eye. Digital scene information captured by a digital camera may be analyzed to identify potential gaze targets, such as stationary gaze targets, moving gaze targets, and/or accelerating gaze targets. Detected gaze targets may be modified to positions of selected gaze targets.

    Virtual datacenter private sublets for quarantined access to data

    公开(公告)号:US10289616B2

    公开(公告)日:2019-05-14

    申请号:US14873172

    申请日:2015-10-01

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for providing a system that allows data use clients direct access to perform complex analysis on data assets without compromising the assets by sharing the data contained may set up the data assets in virtual datacenters (VDCs) within a physical datacenter and open additional resources within the VDCs to data use clients. The data use clients may be enabled to upload and execute analysis applications with access to valuable data. Data traffic exiting the VDCs through such applications however, ma be controlled by a supervisor that analyzes an output and enforces limitations on content and/or volume based on a level of purchased access.

    Management of chip multiprocessor cooperative caching based on eviction rate

    公开(公告)号:US10049045B2

    公开(公告)日:2018-08-14

    申请号:US15450020

    申请日:2017-03-05

    Inventor: Ezekiel Kruglick

    Abstract: Techniques described herein generally include methods and systems related to cooperatively caching data in a chip multiprocessor. Cooperatively caching of data in the chip multiprocessor is managed based on an eviction rate of data blocks from private caches associated with each individual processor core in the chip multiprocessor. The eviction rate of data blocks from each private cache in the cooperative caching system is monitored and used to determine an aggregate eviction rate for all private caches. When the aggregate eviction rate exceeds a predetermined value, for example the threshold beyond which network flooding can occur, the cooperative caching system for the chip multiprocessor is disabled, thereby avoiding network flooding of the chip multiprocessor.

    Suppression of real features in see-through display

    公开(公告)号:US10013809B2

    公开(公告)日:2018-07-03

    申请号:US15470073

    申请日:2017-03-27

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are described for display of a merged image on a display. A processor may receive first data that relates to a first image of a real object and second data that relates to a second image of a virtual object. The second image, if displayed, may overlap, in an overlap region, at least part of the first image if the first image were displayed. The processor may identify an overlap part in the first data that corresponds to the overlap region, clip the overlap part from the first data to produce clipped data, and blur the clipped data to produce blurred data. The processor may subtract the clipped data from the blurred data to produce an additive blur component, add the additive blur component to the second data to produce merged data, and generate the merged image to be displayed on the display based on the merged data.

Patent Agency Ranking