Abstract: A system and method for curtailing objectionable behavior in a web-based social network is disclosed. The method includes monitoring various actions of users of a web-based social network for objectionable behavior. The monitored actions are those that affect other users of the social network. A policy is determined based on behaviors of users. The policy may be violated by a user if the user exceeds a policy threshold. Some monitored actions include the poking, friend requesting, and wall posting. A policy may be violated by multiple occurrences of a single type of action or by a combination of different types of actions. Upon a policy violation, a warning may be issued to the user or the user's account may be suspended.
Type:
Grant
Filed:
February 2, 2007
Date of Patent:
October 23, 2012
Assignee:
Facebook, Inc.
Inventors:
Andrew Bosworth, Scott Marlette, Chris Putnam, Akhil Wable
Abstract: A MEMS device and method of making same is disclosed. In one embodiment, a micro-switch includes a base assembly comprising a movable structure bearing a contact pad. The base assembly is wafer-scale bonded to a lid assembly comprising an activator and a signal path. The movable structure moves within a sealed cavity formed during the bonding process. The signal path includes an input line and an output line separated by a gap, which prevents signals from propagating through the micro-switch when the switch is deactivated. In operation, a signal is launched into the signal path. When the micro-switch is activated, a force is established by the actuator, which pulls a portion of the movable structure upwards towards the gap in the signal path, until the contact pad bridges the gap between the input line and output line, allowing the signal to propagate through the micro-switch.
Abstract: A security module detects attempted exploitations of vulnerabilities of applications executing on a computer. The security module hooks an application on the computer. The hook transfers control flow to the security module if execution reaches a hooked location. When a hook is followed, the security module saves the state of the computer and activates an analysis environment. A virtual machine within the analysis environment executes signatures that programmatically analyze the state of the computer to determine whether a vulnerability in the application is being exploited. If a signature detects an exploit, the security module blocks the exploit by skipping over the one or more instructions that constitute the exploit, terminating the application, or performing a different action. The security module reports the detected exploit attempt to the user of the client. The security module returns control flow back to the application if it does not detect an exploit.
Type:
Grant
Filed:
June 20, 2007
Date of Patent:
October 23, 2012
Assignee:
Symantec Corporation
Inventors:
Kent E. Griffin, Carey S. Nachenberg, Shane A. Pereira
Abstract: A targeted advertisement placement system allows an advertiser to place an ad in front of an audience based on specific interests of the users in that audience, and based on the advertiser's own specific interests in users who should view the ad. The ad placement system collects information about a population of users and a population of advertisers to create profiles that can include both explicit and implicit criteria defining the user's/advertiser's interest. The explicit criteria can be explicitly provided to the ad placement system, can be extracted from documents provided by the user and/or the advertiser, etc. The implicit criteria include information learned by the system about the interests of both advertisers and users based on preferences implicitly expressed when providing feedback on search results. Using these criteria collected from advertisers and users to build profiles, the system can compare the profiles for matches to determine the best audience before which to place an advertisement.
Abstract: Methods, apparatuses, and systems enabling an interactive information retrieval system that includes a user interface allowing users to graphically generate information queries for objects of interest found in various media, such as television, video, and print. The invention can allow users to designate objects of interest within a television or video display and receive information related to the objects of interest. The invention can also allow users to generate queries designating objects of interest within a graphical image using a GUI.
Type:
Grant
Filed:
December 29, 2006
Date of Patent:
October 23, 2012
Assignee:
expHand, Inc.
Inventors:
Frank Robert Nemirofsky, Larry A. Lincoln
Abstract: Architecture, system and method for providing compression of repair data in an IC design having a plurality of memory instances. In one embodiment, the repair data storage method includes determining repair data for each of the memory instances and compressing the repair data into a compressed format that is stored in a shared nonvolatile storage common to the memory instances.
Abstract: The features of the present invention relate to compounds, compositions and methods useful for modulating the expression of vascular endothelial growth factor (VEGF), such as by the mechanism of RNA interference (RNAi). The compounds and compositions include iRNA agents that can be unmodified or chemically-modified.
Type:
Grant
Filed:
March 8, 2011
Date of Patent:
October 23, 2012
Assignee:
Alnylam Pharmaceuticals, Inc.
Inventors:
Antonin De Fougerolles, Maria Frank-Kamenetsky, Muthiah Manoharan, Kallanthottathil G. Rajeev, Philipp Hadwiger
Abstract: An analysis tool analyzes a software system by simulating runtime binding in order to identify function-level code dependencies. The tool receives a list of one or more entry point functions and identifies other functions that can be invoked if the entry point functions are executed. The tool generates a tracker graph having tracker nodes representing classes that can be instantiated from the entry points. Each tracker node identifies functions/methods in that class that can be invoked from the entry points. If the software system uses an object-relational mapping to a database, the tracker graph also identifies the portions of the database that can be accessed from the entry points. The tool can be used to partition the functionalities of the software system into core and non-core functionalities in order to support upgrading while maintaining high-availability.
Abstract: A method and system for providing an online reputation of a client participating in one or more online forums. The method includes providing a unique client identifier associated with the client. In addition, a plurality of forum identifiers is provided for a plurality of online forums within which the client is participating, wherein each online forum is associated with a corresponding user profile. A plurality of unique verification codes is provided that is based on the plurality of forum identifiers and the client identifier. A plurality of verification sequences is provided for purposes of verifying a plurality of user profiles of the client associated with the plurality of online forums, wherein each of the plurality of verification sequences includes a corresponding verification code. Verification of a plurality of credentials associated with the plurality of user profiles is performed.
Abstract: User data is securely transferred from a client device to a mobile device. Data transfer activities at the client are monitored to detect a request to transfer data via a displayed code (e.g., QR code). The data being transfer are verified as being legitimate (e.g., not compromised by malware or otherwise malicious) before the transfer. Responsive to verifying that the transfer data are legitimate, a code encoding the transfer data is displayed on a display device of the client. A user of the mobile device captures the code using a digital camera or other data scanning device and decodes the code to obtain the transfer data. The mobile device may then perform an action using the transfer data, such as connecting to a website or composing an email to an address included in the transfer data.
Abstract: The present invention provides a universal demodulation circuit, a load modulation circuit and associated method, and an associated power transfer system, all suitable for use in wireless power transfer. A power receiver with signal strength detection is also provided. Modulation of the impedance of the demodulation circuit is determinable by detecting the amplitudes of a first and a second electrical parameter, thereby demodulating data communicated by modulation of the impedance of the demodulation circuit. The modulation circuit has a communication modulator to modulate the impedance of the modulation circuit, to a predetermined minimum modulation depth, thereby to communicate data.
Abstract: A robust hashing method is applied to media data (e.g., video, image, and/or audio data), producing a hash output that is robust with respect to at least one attribute of the media data. A histogram is generated for the media data and the histogram is hashed using a weighted hashing procedure. The histogram can be derived from a plurality of randomized versions of the media file, each randomized version of the media file altered to a random extent with respect to the attribute. The histogram can also be derived from a plurality of feature descriptors computed for the media data that are coarsely encoded with respect to the attribute. The weighted hashing procedure includes assigning a weight to components of the histogram and applying a plurality of hash functions to a number of versions of each component, the number of versions based on the assigned weight.
Abstract: Packet ingress/egress block and logic and system and method for receiving, transmitting, and managing packetized data. System including a line port; a computing resource output port; a host interface; a memory, and a block that: receives information on the line port, creates a context including information for managing computation derived from the received information, and sends context out on computing resource output port. Device comprising first circuit component including line port that receives information, second circuit component that generates context information including an information for managing computation derived from the received unit of information; and third circuit component that communicates the generated context out to a computing resource output port.
Type:
Grant
Filed:
December 1, 2006
Date of Patent:
October 16, 2012
Assignee:
Synopsys, Inc.
Inventors:
Stephen John Joseph Fricke, William Charles Jordan, Bryon Irwin Moyer, Roberto Attias, Akash Renukadas Deshpande, Navendu Sinha, Vineet Gupta, Shobhit Sonakiya
Abstract: A system includes a conversion module that preserves the shape of a contour when converting an image to a different resolution. The conversion module receives a first image and divides the first image into regions of pixel values. For each region, a contribution of the region to the pixel values in the second image is determined. The contribution is selected from a set of pre-determined contributions that are a nonlinear function of the values in the region, and the selection is made based at least in part on the values in the region. The contributions are accumulated together to generate a second image. The conversion module may be, for example, part of a design flow for an integrated circuit that connects a mask simulation stage with an optical simulation stage.
Abstract: A system for ranking geospatial entities is described. In one embodiment, the system comprises an interface for receiving ranking data about a plurality of geospatial entities and an entity ranking module. The module uses a ranking mechanism to generate place ranks for the geospatial entities based on the ranking data. Ranked entity data generated by the entity ranking module is stored in a database. The entity ranking module may be configured to evaluate a plurality of diverse attributes to determine a total score for a geospatial entity. The entity ranking module may be configured to organize ranked entity data into placemark layers.
Type:
Grant
Filed:
February 17, 2011
Date of Patent:
October 16, 2012
Assignee:
Google Inc.
Inventors:
Michael T. Jones, Brian McClendon, Amin P. Charaniya, Michael Ashbridge
Abstract: A micro-payment system has buyers, sellers, and a broker. The buyers establish accounts with the broker and provide payment information allowing the broker to invoice the buyers. The sellers establish accounts with the brokers and specify terms for accessing items, including electronic content, available from the sellers. The sellers also provide payment information that allows the broker to credit the sellers for sales of the items. The broker aggregates the buyers' micro-payment purchases and invoices the buyers. The broker also aggregates the sellers' micro-payment sales and credits the sellers.
Type:
Grant
Filed:
January 27, 2012
Date of Patent:
October 16, 2012
Assignee:
Google Inc.
Inventors:
Thomas Alan Nielsen, John Dominick Piscitello, Arturo E. Crespo, Louis Vincent Perrochon, Benjamin Chan-Bin Ling, Georges Harik
Abstract: A controller of an AC/DC flyback switching power supply uses adaptive digital control approaches to control the switching operation of a BJT power switch based on primary-side feedback to regulate the secondary-side constant output voltage and output current, without using the input line voltage. Switching-cycle by switching-cycle peak current control and limit are achieved based on the sensed primary-side current rather than the input line voltage in both constant-voltage and constant-current modes, operating in PWM, PFM and/or combinations of a plurality of PWM and PFM modes. The controller IC does not need a separate pin and ADC circuitry for sensing the input line voltage. The controller IC directly drives the BJT base, and dynamically adjusts the BJT base current amplitude cycle by cycle based on load change.
Type:
Grant
Filed:
December 16, 2009
Date of Patent:
October 16, 2012
Assignee:
iWatt Inc.
Inventors:
Yong Li, Jun Zheng, Junjie Zheng, John William Kesterson
Abstract: Memory networks and methods are provided. Machine intelligence is achieved by a plurality of linked processor units in which child modules receive input data. The input data are processed to identify patterns and/or sequences. Data regarding the observed patterns and/or sequences are passed to a patent module which may receive as inputs data from one or more child modules. the parent module examines its input data for patterns and/or sequences and then provides feedback to the child module or modules regarding the parent-level patterns that correlate with the child-level patterns. These systems and methods are extensible to large networks of interconnected processor modules.
Abstract: A system and method estimates video coding complexity of a source video for adaptively transcoding the source video. A video coding complexity engine of the system is configured to receive the source video in its native format and to encode the source video into an intermediate video format. The video coding complexity engine computes a video coding complexity score for the source video. The coding complexity score can be used by an adaptive bitrate transcoding sub-system and/or an adaptive resolution transcoding sub-system for transcoding the source video.