Patents Represented by Attorney, Agent or Law Firm Hickman Palermo Truong & Becker
  • Patent number: 8255792
    Abstract: Techniques for providing information about an object through a graphical interface include providing in a document scalable vector graphics (SVG) statements associated with a graphical representation of the object. The SVG statements are bound to a pointer to a resource that includes information pertaining to the object. The pointer to the resource associated with the SVG statements may then be extracted from the document. Information is then retrieved from the resource based on the pointer. The SVG statements may then be modified based on the information. Then a second graphical representation of the object is presented based on the SVG statements after the modifying. The presentation provides information, or control, or both, for the object.
    Type: Grant
    Filed: April 20, 2007
    Date of Patent: August 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventor: Yishay Mor
  • Patent number: 8255793
    Abstract: To provide valuable information regarding a webpage, the webpage must be divided into distinct semantically coherent segments for analysis. A set of heuristics allow a segmentation algorithm to identify an optimal number of segments for a given webpage or any portion thereof more accurately. A first heuristic estimates the optimal number of segments for any given webpage or portion thereof. A second heuristic coalesces segments where the number of segments identified far exceeds the optimal number recommended. A third heuristic coalesces segments corresponding to a portion of a webpage with much unused whitespace and little content. A fourth heuristic coalesces segments of nodes that have a recommended number of segments below a certain threshold into segments of other nodes. A fifth heuristic recursively analyzes and splits segments that correspond to webpage portions surpassing a certain threshold portion size.
    Type: Grant
    Filed: January 8, 2008
    Date of Patent: August 28, 2012
    Assignee: Yahoo! Inc.
    Inventors: Deepayan Chakrabarti, Manav Ratan Mital, Swapnil Hajela, Emre Velipasaoglu
  • Patent number: 8255955
    Abstract: A method and apparatus for highlighting a program listing in a set of program listings based on selection criteria. The selection criteria may indicate that the a broadcaster has agreed to pay a service provider in return for the service provider ensuring that a program listing, corresponding to the program of the broadcaster, is highlighted in a program page that displays a set of program listings, such as television program listings. If there are multiple program listings, listed in a program page, that are to be highlighted, then details of the respective contracts may be used to determine which program listing to highlight. Such details may include the total contract value, a ratio of contract value-to-page view, and/or the time of contract formation.
    Type: Grant
    Filed: June 16, 2009
    Date of Patent: August 28, 2012
    Assignee: TiVo Inc.
    Inventor: Kirk D. Wong
  • Patent number: 8254396
    Abstract: A checkpointing approach enables BGP peers to reduce the number of UPDATE messages that are exchanged and processed after a router restarts. A router receives update messages to update routing information for the one or more other devices, wherein each of the update messages includes a checkpoint marker and a route. The router stores the route in a checkpoint repository and stores the checkpoint markers in association with information identifying the other routers from which the checkpoint markers were received. In response to a restart event, the router sends each of the stored checkpoint markers to respective other devices and receives from the respective other devices only route updates that occurred later in time than the checkpoint markers.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: August 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Chandrashekhar Appanna, John G. Scudder
  • Patent number: 8250648
    Abstract: A security system for a computer operating system comprising a processor (37) that is independent of the host CPU (13) for controlling access between the host CPU (13) and a security partition formed in the storage device (21) for storing the operating system. A program memory (41) that is independent of the computer memory and the storage device (21) unalterably stores and provides computer programs for operating the processor (37) in a manner so as to control access to the security partition in the storage device (21). All data access by the host CPU (13) to the data storage device (21) is blocked before initialization of the security system and is intercepted immediately after the initialization under the control of the processor (37). The processor (37) effects independent control of the host CPU (13) and configuration of the computer (11) to prevent unauthorised access to the security partition on the storage device (21) during the interception phase.
    Type: Grant
    Filed: March 29, 2004
    Date of Patent: August 21, 2012
    Assignee: Secure Systems Limited
    Inventors: Richard Kabzinski, Michael Alfred Hearn, Russell E. Powers
  • Patent number: 8249385
    Abstract: Techniques are described for causing digital image data to be interpreted according to a particular technique of a plurality of techniques. According to an embodiment, digital sensor data is received, and user input is received that specifies which technique of a plurality of techniques to use to generate a display that depicts an unmodified image from the sensor data, wherein each technique of the plurality of techniques generates a display from the sensor data in a different manner than each other technique of the plurality of techniques.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: August 21, 2012
    Assignee: Apple Inc.
    Inventors: Nikhil M. Bhatt, Curtis A. Bianchi
  • Patent number: 8250630
    Abstract: A machine executed method comprising at a first computer, receiving from a second computer a request to gain root-administrator access to an operating system (OS) of the first computer; the first computer, in response to receiving the request to gain root-administrator access, granting the root-administrator access and modifying stored access state data from a first state associated with the OS to a second state associated with the OS, wherein the second state is different than the first state and the second state indicates that root-administrator access to the OS was granted.
    Type: Grant
    Filed: March 5, 2009
    Date of Patent: August 21, 2012
    Assignee: Cisco Technology, Inc.
    Inventor: Eduardo Mendonca
  • Patent number: 8250062
    Abstract: A database system may perform a streaming evaluation of an XPath expression by utilizing an XPath evaluation component in tandem with an XML event-streaming component. For a more optimal filtered streaming evaluation, the XML event-streaming component may provide an interface whereby the evaluation component sends certain criteria to the event-streaming component when requesting an XML event. The criteria may be based on a next unmatched step in the XPath expression. In response to the request for an XML event, the event-streaming component may only return events that match the criteria. The evaluation component may be, for example, a compiled state machine for the XPath expression. The criteria may be pre-compiled for each possible state in the state machine. The event-streaming component may also utilize the criteria along with schema information to skip parsing of certain segments of XML data.
    Type: Grant
    Filed: November 9, 2007
    Date of Patent: August 21, 2012
    Assignee: Oracle International Corporation
    Inventors: Ning Zhang, Sivasankaran Chandrasekar, Nipun Agarwal, Sam Idicula
  • Patent number: 8250647
    Abstract: Automatic filter generation and maintenance comprises detecting, from network packets, an IP address and a first MAC address; the IP address and the first MAC address are used to determine that the IP address and another MAC address that are detected in second network packets is an illegal binding and the other MAC address is different from the first MAC address; causing a network element to create, in an ARP filter, based on the IP address and the first MAC address, rules that cause the network element to prevent an address resolution protocol table from including a binding that includes only one of the IP address and the first MAC address; in response to detecting the IP address and said another MAC address in the second network packets, preventing the address resolution protocol table from including the illegal binding that includes the IP address and the other MAC address.
    Type: Grant
    Filed: January 10, 2011
    Date of Patent: August 21, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Marco Foschiano, Christophe Paggen, Andrei Kouzmitch, Oleg Tabarovsky
  • Patent number: 8250359
    Abstract: A packet forwarding process, on a data communications device, forwards a packet to a plurality of destinations within a network from that data communications device using an “encrypt, then replicate” method. The packet forwarding process receives a packet that is to be transmitted to the plurality of destinations, and applies a security association to the packet using security information shared between the data communications device, and the plurality of destinations, to create a secured packet. The secured packet contains a header that has a source address and a destination address. The source address is inserted into the header, and then the packet forwarding process replicates the secured packet, once for each of the plurality of destinations. After replication, the destination address is inserted into the header, and the packet forwarding process transmits each replicated secured packet to each of the plurality of destinations authorized to maintain the security association.
    Type: Grant
    Filed: April 14, 2010
    Date of Patent: August 21, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Brian E. Weis, Jan Vilhuber, Michael Lee Sullenberger, Frederic R. P. Detienne
  • Patent number: 8243013
    Abstract: The disclosure relates to waveforms, circuits and methods for driving bistable displays.
    Type: Grant
    Filed: May 5, 2008
    Date of Patent: August 14, 2012
    Assignee: Sipix Imaging, Inc.
    Inventors: Robert Sprague, Wanheng Wang, Yajuan Chen, Andrew Ho, Bryan Hans Chan, Jialock Wong, Hong-Mei Zang
  • Patent number: 8244517
    Abstract: Content items are selected to be displayed on a portal page in such a way as to maximize a performance metric such as click-through rate. Problems relating to content selection are addressed, such as changing content pool, variable performance metric, and delay in receiving feedback on an item once the item has been displayed to a user. An adaptation of priority-based schemes for the multi-armed bandit problem are used to project future trends of data. The adaptation introduces experiments concerning a future time period into the calculation, which increases the set of data on which to solve the multi-armed bandit problem. Also, a Bayesian explore/exploit method is formulated as an optimization problem that addresses all of the issues of content item selection for a portal page. This optimization problem is modified by Lagrange relaxation and normal approximation, which allow computation of the optimization problem in real time.
    Type: Grant
    Filed: November 7, 2008
    Date of Patent: August 14, 2012
    Assignee: Yahoo! Inc.
    Inventors: H. Scott Roy, Raghunath Ramakrishnan, Pradheep Elango, Nitin Motgi, Deepak K. Agarwal, Wei Chu, Bee-Chung Chen
  • Patent number: 8238548
    Abstract: An echo canceller apparatus comprises a receive side attenuator coupled in a receive side signal path that is configured to couple from a conference call bridge to a caller; a convolution processor coupled to the receive side signal path at a convolution processor pick-off point; a double-talk detector coupled to the receive side signal path and to a sending side signal path that is configured to couple from the caller to the conference call bridge; and logic coupled to the receive side attenuator which when executed is responsive to a double-talk condition detected by the double-talk detector and operable to determine a level of echo canceled by the convolution processor, to determine an additional amount of attenuation to introduce, and to activate the receive side attenuator to introduce the additional attenuation.
    Type: Grant
    Filed: February 8, 2008
    Date of Patent: August 7, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: James C. Frauenthal, Michael A. Ramalho, Gary Skrabutenas, Herbert Wildfeuer
  • Patent number: 8239966
    Abstract: A method and apparatus for processing an electronic document in a secure manner is provided. A scanner may verify that the configuration state of a file server has not changed since a prior configuration state by issuing a request to a security server. The security server may process the request to determine whether the configuration state of the file server has changed since the file server was registered with the security server. The security server may also verify that the scanner issued a request to store an electronic document using a file server or that the file server received the request. A storage medium of a file server may be protected against unauthorized removal of the storage medium by storing, separate from the storage medium, a password required to access the storage medium, and when the file server is powered on, the password is provided to the storage medium.
    Type: Grant
    Filed: September 13, 2006
    Date of Patent: August 7, 2012
    Assignee: Ricoh Company, Ltd.
    Inventor: Brian Smithson
  • Patent number: 8239373
    Abstract: The approaches described herein provide an efficient way to process certain kinds of queries that retrieve XML data stored in an object-relational database. A technique determines whether a query comprises a plurality of iteration expressions that exhibit a particular relationship to one another, and if so, re-writes the query and produces an optimized query execution plan. The query execution plan specifies an XPath-based row source with caching enabled. A very small cache structure is used, and reference locators are stored in the cache that point into binary-encoded data rather than copying XMLType data into the cache. Row data may be cached on the first use of the path-based row source and re-used in subsequent requests for rows. Once there is a subsequent request for rows from the optimized path-based row source, the cache may be reorganized to efficiently produce the rows of the row source.
    Type: Grant
    Filed: May 18, 2009
    Date of Patent: August 7, 2012
    Assignee: Oracle International Corporation
    Inventors: Balasubramanyam Sthanikam, Sam Idicula, Nipun Agarwal
  • Patent number: 8239421
    Abstract: Described herein are compression and processing optimizations by using data transformation techniques. In example embodiments, a byte-wise differential transformation is applied to columnar data represented as a list of length-value pairs to determine a list of delta pairs that is subsequently compressed and stored on persistent storage. A length separation transformation is applied to separate a list of length-value pairs into a length array and a corresponding data value array, where these two arrays are subsequently compressed and stored separately on persistent storage. A native number transformation is applied to a set of number values to remove the lengths stored in the number values, where the transformed set is stored on persistent storage instead of the original set of number values.
    Type: Grant
    Filed: August 30, 2010
    Date of Patent: August 7, 2012
    Assignee: Oracle International Corporation
    Inventors: Vineet Marwah, Vikram Kapoor, Jesse Kamp, Kam Shergill, Roger MacNicol, Manosiz Bhattacharyya, Amit Ganesh
  • Patent number: 8239923
    Abstract: A network infrastructure element such as a packet data router or switch hosts an application program and one or more user program extensions to the application program. Logic in the network element is configured to perform creating and storing one or more default program security permissions; receiving a user-defined security policy that defines one or more user extension security permissions for the one or more user program extensions; creating and storing only each of the one or more user extension security permissions that do not conflict with the default program security permissions; receiving a request from one of the user program extensions to access a resource of the apparatus or the network; permitting the request to access the resource or the network only when the access does not violate the user extension security permissions and the default program security permissions.
    Type: Grant
    Filed: June 12, 2006
    Date of Patent: August 7, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Mayilraj Kirshnan, Kollivakkam Raghavan
  • Patent number: 8239396
    Abstract: A machine-implemented method and machine-readable media for transforming sensitive data in a database is provided. Sensitive data in the database are transformed based on a query context of a query. The query may also be transformed. The transformed query may be applied against the transformed sensitive data to construct a query result. The query result with the transformed sensitive data represents a lenticular view. The lenticular view represents a modified form of the sensitive data that an end-user is allowed access to.
    Type: Grant
    Filed: March 20, 2009
    Date of Patent: August 7, 2012
    Assignee: Oracle International Corporation
    Inventors: Ji-Won Byun, Chi Ching Chui, Daniel M. Wong
  • Patent number: 8239337
    Abstract: Systems, methods, and other embodiments associated with importing proximity data are provided. Device identification information and device location information associated with a device are received from a data source. An estimated proximity of the device to one or more network zones is determined based at least in part on the device location information. A device identifier and the estimated proximity of the device are stored in a proximity database that stores proximity data for devices relative to one or more network zones.
    Type: Grant
    Filed: May 30, 2009
    Date of Patent: August 7, 2012
    Assignee: Cisco Technology, Inc.
    Inventor: Habib Madani
  • Patent number: 8239876
    Abstract: Techniques and systems for controlling resources used by a device's web services applications are disclosed. In one technique, web services applications release their allocated resources and enter a “sleep mode” after being inactive for a specified period of time. In one technique, a device maintains a shared pool of memory resources. The pool contains data structures that web services applications are likely to re-use. Before allocating a new instance of a needed data structure from free memory, a web services application first determines whether the shared pool already contains a currently unused but allocated instance of a data structure of the needed type, and, if the shared pool does, then the web service application uses that instance, overwriting existing data in the instance as needed. Web services applications return such data structures to the shared pool when those web services applications are finished using those data structures.
    Type: Grant
    Filed: June 12, 2007
    Date of Patent: August 7, 2012
    Assignee: Ricoh Company, Ltd.
    Inventor: Lifen Tian