f

Personalized tourniquet system having dual-purpose cuff

Disclosed is a method and apparatus for regulating tourniquet cuff pressure based on a personalized tourniquet pressure (PTP) to facilitate safe performance of a surgical procedure. The apparatus includes a dual-purpose tourniquet cuff adapted to encircle a region of a patient limb to provide both a sensor during a pre-surgical time period and an effector during a surgical time period. An effector module communicates pneumatically with an inflatable bladder of the cuff for maintaining pressure in the bladder near a PTP during the surgical time period to safely stop penetration of arterial blood past the cuff. A pulsation sensor that communicates pneumatically with the inflatable bladder during the pre-surgical time period senses and characterizes pressure pulsations that are indicative of penetration of arterial blood into the region of the limb encircled by the cuff. A PTP estimator is responsive to the pulsation sensor for producing an estimate of the PTP, such that the estimate of the PTP is a function of the sensed pulsations.




f

Surgical forceps including blade safety mechanism

A forceps includes first and second jaw members and at least one handle movable between an open position and a closed position for moving the jaw members between a spaced-apart position and an approximated position. A ratchet mechanism includes first and second ratchet components configured to engage one another upon movement of the at least one handle to the closed position to retain the jaw members in the approximated position. A knife is selectively movable between a retracted position and an extended position, wherein the knife extends between the jaw members to cut tissue therebetween. A safety mechanism is configured to inhibit extension of the knife when the jaw members are disposed in the spaced-apart position. Movement of the ratchet components into engagement with one another to retain the jaw members in the approximated position disengages the safety mechanism, thereby permitting extension of the knife.




f

Surgical forceps

A forceps includes first and second shaft members each having a jaw member disposed at a distal end thereof. One (or both) of the first and second jaw members is moveable relative to the other between a spaced-apart position and an approximated position for grasping tissue therebetween. The first jaw member includes a jaw frame fixedly engaged to the first shaft member and a disposable jaw housing releasably engageable with the jaw frame. The disposable jaw housing includes a knife assembly disposed therein. The knife assembly includes a knife blade biased toward an initial position, wherein the knife blade is disposed within the jaw housing. The knife blade is moveable between the initial position and an extended position, wherein the knife blade extends at least partially from the jaw housing to cut tissue grasped between the first and second jaw members.




f

Shape memory polymer foams for endovascular therapies

A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.




f

Apparatus and methods for sealing a vascular puncture

Apparatus for sealing a puncture communicating with a blood vessel includes a porous carrier formed from lyophilized hydrogel or other material. The plug may include at least first and second hydrogel precursors and a pH adjusting agent carried by the porous carrier in an unreactive state prior to exposure to an aqueous physiological environment. Once exposed to bodily fluids, the carrier expands as the lyophilized material hydrates to enhance and facilitate rapid hemostasis of the puncture. When the plug is placed into the puncture, the natural wetting of the plug by bodily fluids (e.g., blood) causes the first and second precursors to react and cross-link into an adhesive or “sticky” hydrogel that aids in retaining the plug in place within the puncture.




f

Fasteners, deployment systems, and methods for ophthalmic tissue closure and fixation of ophthalmic prostheses and other uses

Methods and devices for ophthalmic tissue closure and fixation of ophthalmic prostheses are provided. In accordance with some embodiments, devices for both grasping and clipping a plurality of ocular tissue and ocular prostheses are provided. Various device embodiments are provided for both malleable clips and delivery of normally closed clips (i.e. shape memory). The device may accommodate a plurality of clips which include, but are not limited to: malleable metals, absorbable, shape memory, drug-eluting, and adhesive dispensing. The clips may be pigmented to match the colors of associated tissue (cornea, iris, conjunctiva, sclera, retina) to serve to camouflage fixation clips for healing duration or permanently. According to one aspect, shallow angle access to anatomy may be provided by specialized angulation of device shaft and closure jaws that are intended to access the eye through a small self-healing cornea incision and/or any ocular tissue.




f

Vascular sealing device with high surface area sealing plug

An internal tissue puncture closure method and apparatus. The method and apparatus provide a folded sealing plug that provides more surface area than conventional plugs to more fully cover and seal an external situs of an internal tissue puncture. The folded sealing plug may have a weave pattern that tends to cause the sealing plug to corkscrew into the internal tissue puncture as it is compressed toward an anchor placed inside of the tissue puncture.




f

Tissue fixation delivery apparatus

A device for deploying a tissue fixation apparatus of the type including first and second tissue anchors coupled together by an adjustable suture assembly. The device comprises a handle mechanism and a needle cartridge assembly releasably coupled to the handle mechanism. The needle cartridge assembly includes a needle cannula with a side opening through which a tissue anchor can be loaded into an internal chamber of the needle cannula. A push rod is disposed in the needle cannula and is operable between an extended position in which the push rod prevents the tissue anchor from entering the chamber through the side opening, and a retracted configuration in which the tissue anchor can be pushed into the chamber under the action of a resilient band positioned over the side opening.




f

Systems and methods for posterior dynamic stabilization of the spine

Devices, systems and methods for dynamically stabilizing the spine are provided. The devices include an expandable spacer having an undeployed configuration and a deployed configuration, wherein the spacer has axial and radial dimensions for positioning between the spinous processes of adjacent vertebrae. The systems include one or more spacers and a mechanical actuation means for delivering and deploying the spacer. The methods involve the implantation of one or more spacers within the interspinous space.




f

Systems and methods for the fusion of the sacral-iliac joint

The sacral-iliac joint between an iliac and a sacrum is fused either by the creation of a lateral insertion path laterally through the ilium, through the sacral-iliac joint, and into the sacrum, or by the creation of a postero-lateral insertion path entering from a posterior iliac spine of an ilium, angling through the sacral-iliac joint, and terminating in the sacral alae. A bone fixation implant is inserted through the insertion path and anchored in the interior region of the sacrum or sacral alea to fixate the sacral-iliac joint.




f

Methods and apparatuses for flow restoration and implanting members in the human body

A medical device for blood flow restoration and/or for use as an implantable member in a human vessel includes a self-expanding member, a guidewire, and a connection mechanism. The self-expanding member includes a plurality of cells and filaments having specific ranges of thicknesses, widths, and heights. The self-expanding member can take on a volume-reduced coiled form with overlapped edges, and can generate optimal radial forces against a vessel wall and/or thrombus when deployed and expanded.




f

Method and inserter for interbody fusion

An elongate inserter has a distal end releasably connected to an expandable interbody fusion device and a proximal end including a trigger actuator. The interbody fusion device comprises a superior endplate and an inferior endplate that are movable in an expansion direction relative to each other in the intradiscal space. The inserter includes a lifting platform and an elevator that define cooperatively engaging ramps and ramps surfaces that upon operation of the trigger actuator cause the superior and inferior endplates to move relatively away from each other. A driver is supported by the inserter for pushing an insert into the expanded device between the superior and inferior endplates.




f

Anchoring device and system for an intervertebral implant, intervertebral implant and implantation instrument

Various embodiments of intervertebral implants, anchoring devices for intervertebral implants, and implantation instrumentation are provided, along with various embodiments of methods for using one or more of the devices. Some embodiments of an anchoring device have a body comprising at least one curve and a rigid plate elongated along a longitudinal axis so that its front end enters at least one vertebra while its rear end remains in the passage of an implant. In some embodiments, the plate comprises at least one longitudinal slot separating at least one posterior portion of the plate into two branches, with at least one branch comprising at least one withdrawal stop configured to retain the device in the implant.




f

Medical device with orientable tip for robotically directed laser cutting and biomaterial application

A medical device used in a medical robotic system has a conduit and an orientable tip. An optical fiber coupled to a laser source and/or a catheter coupled to one or more biomaterial sources extends through the conduit and tip so that the tip of the medical device may be robotically directed towards a target tissue for laser and/or biomaterial application as part of a medical procedure performed at a surgical site within a patient. A protective sheath covers the fiber as it extends through the conduit and tip. A first coupler adjustably secures at least the sheath to the medical device and a second coupler adjustably secures the fiber to at least the sheath. A similar dual coupler mechanism may be used to secure the sheathed catheter to the medical device.




f

Optimally configuring an information landscape

According to an embodiment of the present invention, a system optimizes an information processing environment, and comprises at least one processor. The system collects information pertaining to operational behavior of the information processing environment and including a plurality of parameters. A neural network structure is established to associate the parameters to a desired operational performance characteristic for the information processing environment. The neural network structure is trained with the collected information from the information processing environment to produce a model for the information processing environment. The model is optimized to determine values for the parameters and the information processing environment is adjusted based on the determined parameter values to attain the desired operational performance of the information processing environment. Embodiments of the present invention further include a method and computer program product for optimizing an information processing environment in substantially the same manner described above.




f

Apparatus and method of user interface with alternate tool mode for robotic surgical tools

In one implementation, a method is disclosed in which a lock sensing mode is entered for a robotic surgical instrument. In the lock sensing mode, the degrees of freedom of movement in the robotic surgical instrument are switchably reduced. Further in the lock sensing mode, one or more end effectors of the robotic surgical instrument are switchably clamped together in the robotic surgical instrument. An increased level of torque may also be applied to the end effectors to increase a gripping force applied by the one or more end effectors in response to the reduced degrees of freedom of movement in the robotic surgical instrument.




f

Cutting or scoring balloon and apparatus therefor

A cutting or scoring balloon (26) is provided with a plurality of cutting or scoring elements (34) and is wrapped onto a balloon catheter (12) such that the cutting or scoring elements (34) overlie the balloon wall (36) with the balloon wall (36) pleated underneath the cutting or scoring elements (34). The cutting or scoring elements (34) remain exposed when the balloon (26) is pleated and wrapped onto the balloon catheter (12) and in a tightly wrapped configuration.




f

Method and apparatus for a radiolucent and MRI compatible cranial stabilization pin

A substantially radiolucent cranial stabilization pin is adapted for use with a fixture for immobilizing a patient's head during a medical procedure. The pin includes a tip and a body, which are secured together to form the pin. The tip and body are constructed from non-ferrous, non-magnetic materials that are biocompatible. The tip and body are safe for use with, and compatible with, imaging techniques including MR imaging and CT imaging. In some examples the tip is a titanium insert and the body is molded within and around at least a portion of the tip. In some versions, the tip includes a hollow portion and one or more openings providing access to the hollow portion. The molded body flows into and around portions of the tip creating a secure pin suitable to withstand torque and axial forces observed in use.




f

Flexible harmonic waveguides/blades for surgical instruments

In one embodiment, a surgical instrument comprises an articulable harmonic waveguide. The articulable harmonic waveguide comprises a first drive section comprising a proximal end and a distal end. The proximal end of the first drive section may be configured to connect to an ultrasonic transducer. The articulable harmonic waveguide further comprises a first flexible waveguide coupled to the distal end of the first drive section. An end effector extends distally from the first flexible waveguide. The surgical instrument further comprises an articulation actuator to flex the first flexible waveguide.




f

Medical device inserters and processes of inserting and using medical devices

An apparatus for insertion of a medical device in the skin of a subject is provided, as well as methods of inserting medical devices.




f

Method and system for processing digital content according to a workflow

A method of processing content according to a workflow, where a digital content is processed on one of a plurality of processing devices according to process definition associated to the content, includes the steps, iterated at the processing device, of: a) receiving from a server a signed workflow information, a workflow information comprising a status of the content processing, a signature of the process definition and a hash of the content;b) verifying the workflow information;c) when the workflow information is verified, processing the content according to the process definition and according to status of the content processing;d) updating and signing the workflow information;e) sending to the server the signed workflow information;and the steps iterated at the server of:f) receiving from a processing device a signed workflow information;g) publishing the signed workflow information received from the processing device. A system for performing the method is also provided.




f

Mobile electronic device configured to establish secure wireless communication

The invention relates to a method for configuring a mobile device capable of reproducing, for a user, multimedia content previously provided by a remote content server. The invention relates to using a client installed on said electronic device to relay authentication requests between a card, preferably complying with the provisions of the Mobile Commerce Extension standard, and an authentication server that is accessible via an access point.




f

System and method for remote reset of password and encryption key

Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created.




f

Apparatus for logging a configuration of a microprocessor system and method for logging a configuration of a microprocessor system

An apparatus includes a logging apparatus and a configuration apparatus. The logging apparatus has a security module operable to create a manipulation-proof log. The configuration apparatus is operable to configure a configurable microprocessor system. The configuration apparatus is further operable to be coupled to the logging apparatus in order to log a configuration of the microprocessor system using the logging apparatus.




f

Network-based revocation, compliance and keying of copy protection systems

A method of authenticating a device involves establishing a local connection between a local target device and a local source device; at the source device, obtaining credentials of the target device via the local connection; at the source device, sending the credentials to a cloud authentication server via a secure communication channel; at the cloud authentication server, checking the credentials of the target device against a database of known good devices; at the source device, receiving a message from the cloud authentication server via the secure communication channel, said message indicating that the target device is authenticated; and delivering content from the source device to the target device on the condition that the target device is authenticated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.




f

Setting in wireless communication device for encrypted communication

A system administrator of a wireless LAN 100 manipulates a personal computer PC1 to change a WEP key. The personal computer PC1 authenticates a memory card MC as genuine under management of the system administrator. In the case of the authenticated memory card MC, changed setting information, as well as a previous WEP key before the change of the setting information, is written into the memory card MC. The system administrator then inserts this memory card MC into a memory card slot of a printer PRT1. The printer PRT1 authenticates the memory card MC as genuine under management of the system administrator. In the case of the authenticated memory card MC, the setting information is updated. This arrangement effectively relieves the user's workload in setting wireless communication devices, while ensuring the sufficiently high security.




f

Relay apparatus, program of relay apparatus and transmitting apparatus

A relay apparatus of a video and audio transmitting/receiving system delays a time before transmitting an authentication start instruction after an authentication start video signal being transmitted to a receiving apparatus. Accordingly, a problem that the receiving apparatus receives the authentication start instruction from the relay apparatus before locking the authentication start video signal and cannot perform authentication processing normally, leading to a failure in authentication. A correction time is decided based on a resolution of the authentication start video signal transmitted from the receiving apparatus and a combination of receiving apparatuses and transmitting apparatuses connected to the relay apparatus.




f

Device and method for obfuscating visual information

A device is described for the hiding and subsequent recovery of visual information. The device comprises two or more tokens (1), each containing a mask (2,3) of coloured pixels (4), are overlaid (5), so that when the pixels are aligned, hidden information, invisible in the individual tokens. The hidden information consists of one or more recognisable alphabetic, numerical or pictorial characters (6). During token overlay and alignment, the information becomes recognisable because it is made up of pixels whose colour is differentiated from the other pixels in the overlay. The information is hidden by adding pixels of certain colours. When the tokens are overlaid and the pixels aligned, the added pixels are effectively subtracted, revealing the hidden information. The tokens may be printed on various media, or may be displayed on an electronic device.




f

Private key generation apparatus and method, and storage media storing programs for executing the methods

Disclosed herein are a private key generation apparatus and method, and storage media storing programs for executing the methods on a computer. The private key generation apparatus includes a root private key generation unit and a sub-private key generation unit. The root private key generation unit sets a root master key and predetermined parameters capable of generating private keys, and generates a first sub-master key set capable of generating a number of private keys equal to or smaller than a preset limited number. The sub-private key generation unit generates private keys with the root private key generation unit by receiving the first sub-master key set from the root private key generation unit, to generate a private key corresponding to a user ID using the first sub-master key set, and issues the private key to a user.




f

Broadcast receiving apparatus and control method thereof

The present invention provides a broadcast receiving apparatus that receives a broadcast wave containing multiple channels. The apparatus comprises, among other things, a selecting unit that selects a channel from the broadcast wave; a determination unit that determines, for all channels that can be selected by the selecting unit, whether or not the obtaining unit can obtain an encrypted second-type encryption key that can be decrypted by the decrypting unit using the updated first-type encryption key; and an updating unit that updates the computer program stored in the memory to the updated program in the case where the determination unit has determined that the obtainment is possible for all the channels.




f

System and methods for UICC-based secure communication

A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.




f

Method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise

A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.




f

Methods for managing user information and devices thereof

A method, non-transitory computer readable medium and application manager computing device comprises obtaining at least one cryptographic key from a request by a client computing device for a user session. User information corresponding to a user is encrypted or decrypted using the cryptographic key. The request is authenticated based on encryption or decryption of the user information. The cryptographic key is deleted after the completion or termination of the user session.




f

Method and system for secured remote provisioning of a universal integrated circuit card of a user equipment

The present invention provides a method and system for secured remote provisioning of a universal integrated circuit card of a user equipment. A system includes a user equipment for initiating a request for remote provisioning of an universal integrated circuit card (UICC) in the user equipment, where the request for remote provisioning includes a machine identifier (MID) associated with the user equipment and a public land mobile network (PLMN) identifier (ID) associated with an network operator. The system also includes at least one shared key management server for dynamically generating security keys and an operator shared key using the security keys, the MID. Moreover, the system includes an operator network for generating a subscription key using the operator shared key and an international mobile subscriber identity (IMSI), and provisioning the IMSI in a secured manner to the UICC of the user equipment using the security keys.




f

Apparatus and methods for managing messages sent between services

Disclosed are methods and apparatus for managing services within a computer network. In one embodiment, a message interchange network for exchanging application-level messages between services, which are located outside the message interchange network, is provided. At the message interchange network, a plurality of application-level messages, which each specify which one or more receiving services are to receive the each application-level message, are received. Each received application-level message is forward towards the one or more receiving services. Correlation information regarding each application-level message that is received into message interchange network is retained. The application-level messages are sent between pairs of the services, and the retained correlation information for each application-level message pertains to each application-level message and any other application-level messages related to the each application-level message. A query can then be received, at the message interchange network from a first service, to search the retained correlation information for specific one or more portions of the retained correlation information. A response to the query, which includes the specific one or more portions of the retained correlation information, is sent to the first service.




f

System and method for securely communicating with electronic meters

An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link or connection such as via a network. This enables messages to be sent from the utility to the meter and vice versa in a secure manner. The network provides a communication medium for communicating via the C12.22 protocol for secure metering. A cryptographic backend is used to cryptographically process messages to be sent to the meter and to similarly cryptographically process messages sent from the meter. By providing appropriate cryptographic measures such as key management, confidentiality and authentication, the meter can only interpret and process messages from a legitimate utility and the utility can ensure that the messages it receives are from a legitimate meter and contain legitimate information.




f

System and method for obtaining certificate status of subkeys

Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced.




f

Method for reproducing content data and method for generating thumbnail image

A content data reproducing method includes: decrypting encrypted data to generate plain-text data; dividing the plain-text data into decrypted content data and reproduction management information; sending the reproduction management information to a user space; storing the decrypted content data in a secret buffer; obtaining the decrypted content data as reproduction target data from the secret buffer and transmitting the reproduction target data to a decoder; and decoding the reproduction target data by the decoder.




f

System and method for protecting information and related encryption keys

A system apparatus and method for protecting information are provided. Embodiments of the invention may detect inactivity related to a computing device. Information and encryption key may be removed from a memory. Subsequent activity may be detected. An authentication procedure may be performed, and, contingent on authenticating a relevant entity, a master key may be generated and installed in a memory.




f

Method and system for providing a rotating key encrypted file system

A file system data is divided into two or more data blocks. A unique encryption key is assigned to each data block with the encryption key assigned to each data block being distinct from other encryption keys used to encrypt the other data blocks and each of the data blocks is encrypted using its assigned encryption key. One of the data blocks within the file system is then selected and decrypted using the distinct encryption key assigned to the selected data block and a new encryption key, distinct for the previously assigned encryption key, is assigned to the selected data block and the selected data block is re-encrypted using the new encryption key. This process is then repeated for each data block on a sequential/cyclic and continually rotating basis.




f

Method for arbitrary-precision division or modular reduction

A method in a portable data carrier for executing a cryptographic operation on security-relevant data comprises a step of determining a remainder (r) of a dividend (a) modulo a divisor (b). In so doing, the remainder (r) is determined iteratively by means of a division device of the data carrier. In each iteration there is carried out a Montgomery multiplication with the divisor (b) as the modulus and an additive linkage of an output value of the Montgomery multiplication with a coefficient (ai) derived from the dividend (a) and associated with the respective iteration. The Montgomery multiplication is carried out here by means of a multiplication device of the data carrier, preferably a corresponding coprocessor. The Montgomery multiplication of a subsequent iteration receives a result of a preceding iteration as an input value.




f

Apparatus and method for generating secret key using change in wireless channel on wireless communication network

A secret key generation apparatus and method are provided. The secret key generation apparatus includes at least one antenna, amplification/phase controllers, a transceiver, and a random signal controller. The antenna receives a wireless signal from a counterpart terminal that performs wireless communication. The amplification/phase controllers control the amplification gain and phase of the wireless signal that is received via at least one antenna. The transceiver measures the status of a wireless channel using the wireless signal having the controlled amplification gain and phase, determines parameters based on results of the measurement, and generates a secret key based on results of the determination. The random signal controller controls the amplification/phase controllers so that the amplification gain and phase are adjusted whenever the transceiver generates a secret key.




f

Apparatus and method for converting random binary sequence into random integer

An apparatus and method for converting a random binary sequence into a random integer is provided. The present invention converts a random binary sequence into a random integer, and determines whether the corresponding random integer falls within a preset integer interval. Further, if it is determined that the random integer generated from the random binary sequence does not fall within the preset integer interval, the present invention repeatedly updates a random binary sequence until a random integer falling within the corresponding integer interval is obtained, thus outputting uniformly distributed random integers which fall within the preset integer interval.




f

Level-two encryption associated with individual privacy and public safety protection via double encrypted lock box

Computationally implemented methods and systems are described herein that are designed to, among other things, receiving a level-one encrypted output of a surveillance device; encrypting at least a part of the level-one encrypted output of the surveillance device with a level-two encryption key whose decryption key is inaccessible by a level-two encryption entity; and transmitting a level-two encrypted output of the surveillance device.




f

Image forming apparatus

An image forming apparatus includes a memory unit configured to store image data, a mode detecting unit configured to detect a transition from a first operating mode to a second operating mode, and an encryption unit configured to encrypt the image data in the memory unit based on the transition.




f

Apparatus and method for address privacy protection in receiver oriented channels

Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input arguments. The privacy key is only known to the first and second wireless devices. A privacy address is generated for the first wireless device based on the seed value and the first resolution tag. A packet is transmitted from the first wireless device to the second wireless device. The packet includes the privacy address and the first resolution tag.




f

Methods and apparatus for base station assisted peer discovery through aggregation of expressions

A method, an apparatus, and a computer program product for wireless communication are provided in which a UE is equipped to generate an expression associated with a wireless device for use in a peer discovery signal, generate an expression set from the expression, a first temporal frequency, and a first time duration, and transmit the generated expression set to a base station to allow the base station to broadcast each of the expressions included in the expression set at the first temporal frequency over the first time duration. Another method, apparatus, and computer program product for wireless communication are provided in which a base station is equipped to receive an expression set from a wireless device, process the received expression set to determine each of one or more instances of an expression, and transmit each of the one or more instances of the expression.




f

Methods, apparatus, and articles of manufacture to encode auxilary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data

Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data are disclosed. An example method to embed auxiliary data into text data includes assigning source data to one of a plurality of groups, the source data comprising text data, identifying a symbol to be added to the source data based on an assigned group of the source data, and generating encoded data by including in the source data a text character representative of the symbol.




f

On-demand download of partial encrypted content for partial super distributed content

A request to render content associated with a first super distributed content file is detected by a content rendering device. At least one portion of the content associated with the first super distributed content file is determined to be missing from the first super distributed content file. A second file including the at least one portion of the content missing from the first super distributed content file is obtained from a server. The at least one portion of the content of the second file includes partial encrypted portions of the content associated with an encryption system of the content rendering device. A content output stream including decrypted partial encrypted portions of the content of the second file and the content associated with the first super distributed content file is generated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.




f

Instantaneous recommendation of social interactions in a social networking system

As a user of a social networking system views a page that includes information provided by the system, certain types of social interactions are monitored. If an interaction monitored for is detected, at least one recommendation unit is identified to present to user on the page. The recommendation unit is identified based on a description of the interaction. The recommendation unit suggests that the user perform a social interaction in the social networking system. The recommendation unit is transmitted to a device of the user and is presented to the user on the page without having to reload the entire page.