Abstract: Method and apparatus employing a casting mould including a liquid feed end for supplying the casting mould with molten second alloy and an exit end with an outlet for casting molten second alloy downwardly. While continuously moving the mould and an elongated solid first alloy substrate relative to one another, casting molten second alloy passes downwardly through at least one outlet of the mould onto an upper surface of the substrate at a temperature wherein the substrate locally at least partly remelts beginning at a reference point of a remelting zone and mixes at least partly with molten second alloy to form an alloy pool. After remelting the molten alloy pool continuously cools and solidifies at a location away from the reference point and joins the substrate to form composite ingot including at least two separately formed layers of one or more alloys before discharging from the mould.
Type:
Grant
Filed:
June 3, 2009
Date of Patent:
November 20, 2012
Assignee:
Aleris Aluminum Koblenz GmbH
Inventors:
Joost Christiaan Storm, Andreas Ten Cate, Ingo Günther Kröpfl, Achim Bürger
Abstract: A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to intermediate steps in the computations performed by the recipient.
Abstract: The present disclosure relates to a composition with improved flame resistance, to articles made from the composition, and to methods that include processing the composition. The composition can include from 15 to 85 percent by weight of a polyetherimide (PEI), from 15 to 85 percent by weight of a polyphenylsulfone (PPSU), a polyetherimide-siloxane copolymer in an amount up to 12 percent by weight, and from 0 to 0.30 percent by weight of a stabilizer.
Type:
Grant
Filed:
August 11, 2011
Date of Patent:
November 13, 2012
Assignee:
Sabic Innovative Plastics IP B.V.
Inventors:
Mark Sanner, Robert Russell Gallucci, Rajendra K. Singh
Abstract: A filter cassette and a method for allowing a leak to be detected are disclosed, in which the filter cassette comprises a main body defining a first chamber. The main body includes an inlet and an outlet, a filter separating the first chamber into first and second sub-chambers, the inlet being in fluid communication with the first sub-chamber and the second sub-chamber being in fluid communication with the outlet. The main body also includes a second chamber is defined by the main body and the filter, wherein in absence of a leak the second chamber is substantially not in fluid communication with the first chamber. The main body further includes a port in fluid communication with the second chamber, whereby measuring a fluid characteristic in the second chamber by means of the port allows a detection of a leak, i.e. an external leak or a bypass leakage.
Abstract: Providing a recommendation of one or more items is disclosed. In some embodiments, a selection of a set of one or more items to be included in a recommendation is received from a first member of an online community, and the recommendation is stored so that the recommendation can be presented to a second member of the online community when an indication is received that the recommendation is of interest to the second member.
Type:
Grant
Filed:
September 29, 2006
Date of Patent:
November 13, 2012
Assignee:
Apple Inc.
Inventors:
Kenneth N. Chang, David A. Koski, Pedraum R. Pardehpoosh, Ralph E. Zazula
Abstract: Systems and methods are disclosed for identifying a new set of media items in response to an input set (or “query set”) of media items and knowledge base metrics. The system uses a knowledge base consisting of a collection of mediasets. Various metrics among media items are considered by analyzing how the media items are grouped to form the mediasets in the knowledge base. Such association or “similarity” metrics are preferably stored in a matrix form that allows the system to efficiently identify a new set of media items that complements the input set of media items.
Type:
Grant
Filed:
January 11, 2010
Date of Patent:
November 13, 2012
Assignee:
Apple Inc.
Inventors:
Francisco J. Martin, Jim Shur, Marc Torrens
Abstract: Method and apparatus for data access for a mobile terminal comprising a module for determining whether first and second modes of wireless network coverage is available, a module for selecting the first mode if available, a module for attempting access via the second mode on failure to establish access via the first mode and a module for monitoring availability of the first mode. Even when a connection is established via the second mode, availability of the first mode is monitored and access attempted, when second mode connection is idle.
Abstract: The invention relates to an assembly for carrying out a video conference between a location A and at least one location W, during which it is possible for at least some participants to make eye-to-eye contact or face-to-face contact. To achieve this, location A is equipped with at least two image generation elements for generating images of the participants in location A, said elements being assigned to different participant positions in location W and is also equipped with at least one optical representation of each participant position in location W.
Type:
Grant
Filed:
March 15, 2006
Date of Patent:
November 13, 2012
Assignee:
Valenzuela Holding GmbH
Inventors:
Miriam Noemi Valenzuela, Carlos Alberto Valenzuela
Abstract: One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
Type:
Grant
Filed:
December 2, 2008
Date of Patent:
November 13, 2012
Assignee:
International Business Machines Corporation
Inventors:
Thomas Creamer, Bill H. Hilf, Peeyush Jaiswal, Neil Katz, Michael Mirt, Victor S. Moore
Abstract: Systems and methods are provided for fine level access control over message content in an electronic messaging system. Access criteria associated with the message content define requirements that a user must satisfy in order to perform specified actions on message content. The user's complete profile is examined at run time and compared to access criteria to make a real time decision about the level of access that a user should have to message content. Depending on the access criteria associated with content, stronger authentication or weaker authentication of the user profile information may be performed on the user profile to determine the level of access that should be granted to the user.
Abstract: A handheld wireless communication device includes features to send and receive text messages. The handheld wireless communication device is further equipped with a microprocessor configured to run software programs on the device such as text message management program. The text message management program displays a listing of a plurality of received text messages on a display screen and differentiates at least a portion of the display-listed plurality of received text messages using an icon associated with at least one text message and wherein said icon corresponds to a domain address of the associated text message.
Abstract: A system and method identifies road features that may not appear on a map database, such as paths not described as roads on the map database, and whether all the roads at a crossing cross at the same grade level. The system and method may thus be used to identify points of departure from, or points of merging onto, a road described by the map database or a path identified as described herein, but not described by the map database.
Abstract: A system and method detects an amount of data attributed to a device including reports sent to the device, and reduces the amount of data being used to provide reports to the device if the amount of data attributed to the device exceeds an amount assigned to the device. Data uploaded from the device is also minimized.
Abstract: Aspects of a target environment, such as the creation, deletion, and management of various resources, are managed using a set of self-service Web services of a separate control environment. A user can submit a Web services call into an externally-facing application programming interface (API) or other such externally-facing interface of the control environment. The API receiving the call, as well as information extracted from the call, can be used to determine appropriate actions to be performed in the target environment. A workflow can be instantiated that includes tasks used to perform the action in the target environment. Such an approach allows aspects of an environment to be managed through Web service calls to the control environment. Native access to resources in the target environment is provided using at least one externally-facing interface of the target environment, without accessing the control plane.
Type:
Grant
Filed:
April 3, 2009
Date of Patent:
November 6, 2012
Assignee:
Amazon Technologies, Inc.
Inventors:
Rajesh Sudhakar Sheth, Leon Robert Warman, Narayan Gangadhar
Abstract: Aspects relate to initiating voice calls to mobile devices from an enterprise network. In one example, a server can initiate a voice channel to a mobile device, and if the mobile device cannot be reached, an access network may redirect the call from the server to a number identified as a voicemail number; however, such number is reconfigured to instead be directed to a number located within the enterprise network. The server can monitor or receive an indication that a call is incoming, and attributable to the mobile device. If such a call is incoming or received, then the server determines that the call has failed. If the mobile device answers the call, the server can determine that the voice channel has been established, without waiting for a confirmation indication, such as a DTMF tone.
Type:
Grant
Filed:
October 4, 2010
Date of Patent:
November 6, 2012
Assignee:
Research In Motion Limited
Inventors:
Richard John George, Yuriy Lobzakov, Colin Mark Werner
Abstract: Disclosed herein are systems, methods and computer-readable media to perform data encryption and decryption using a derivation function to obtain a key per page of data in a white-box environment. The method includes sharing a master key with the sender and receiver, splitting the input data into blocks and sub-blocks, and utilizing a set of keys and a master key to derive a page key. In another aspect of this disclosure, the key validation and shuffling operations are included. This method allows for the derivation of a key instead of storing a predetermined key, thus maintaining system security in a white-box environment.
Type:
Grant
Filed:
January 25, 2012
Date of Patent:
October 30, 2012
Assignee:
Apple Inc.
Inventors:
Mathieu Ciet, Augustin J. Farrugia, Filip Toma Paun
Abstract: A system and method are provided to obtain and use time zone information as presence in instant messaging. The time zone information is obtained by a user's mobile device and is sent to other mobile devices corresponding to the user's contacts. The time zone information of a contact may be displayed on the user's IM application, including the contact list and instant messaging conversation window. The location of the mobile device may also be provided. The user uses the time zone and location information to discern the status of a contact. Rule-based decisions that rely on the time zone information are also used to affect the operation of the instant messaging application.
Abstract: An advertiser submitting a sponsored ad to a provider can determine aspects of the ad, such as creative elements and bid price, based on a dynamic categorization of an item and/or landing page associated with the ad. An algorithm can be used that utilizes a browse tree for each item to be displayed to a user following a sponsored link, for example, and attempts to find a node in the browse tree that appears at the lowest level in the tree and with a sufficient appearance frequency. When consensus is reached for a node in the browse tree that meets these criteria, a corresponding categorization is determined, which can be used to determine appropriate aspects to be used for the sponsored ad, at least until enough information is obtained such that aspects can be determined independent of the categorization.
Abstract: Disclosed herein are methods for obfuscating data via a modulus operation. A client device receives input data, stores an operation value, performs a modulus obfuscation on the operation value, performs a modulus operation on the operation value and the input data, performs a modulus transformation on the operation value and the input data to obtain client output data, and checks if the client output data matches corresponding server output data. A corresponding server device receives input data, performs a modulus transformation on the input data to obtain a result, performs a plain operation on the result and an operation value to obtain server output data, and checks if the server output data matches corresponding client output data from the client device. The client and/or server can optionally authenticate the client input data and the server input data if the server output data matches the client output data.
Type:
Grant
Filed:
August 31, 2011
Date of Patent:
October 30, 2012
Assignee:
Apple Inc.
Inventors:
Mathieu Ciet, Augustin J. Farrugia, Nicholas T. Sullivan
Abstract: Aspects relate to authorizing mobile devices for PBX-based voice services. A mobile device calls a PBX over a voice channel, and phone number identifier information is obtained and matched to identifier information for devices that known (authorizeable) to use the PBX. If there is one incoming call that matches to a given device, and an authentication token provided over a data channel matches an authentication token associated with that device, then the device is authorized for voice services. Where there are multiple matching calls, those devices are instructed to provide authentication tokens over their voice channels. The devices can detect absence of a data channel and provide authentication tokens over the voice channels; the devices also can wait to receive a call connected response and in the absence of such provide their authentication tokens over the voice channel. Tokens can be requested and downloaded for storage at the devices.
Type:
Grant
Filed:
December 14, 2009
Date of Patent:
October 30, 2012
Assignee:
Research In Motion Limited
Inventors:
Liam John Keast, Bradford Lawrence Spencer, Manvinder Singh