em Systems and methods for posterior dynamic stabilization of the spine By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Devices, systems and methods for dynamically stabilizing the spine are provided. The devices include an expandable spacer having an undeployed configuration and a deployed configuration, wherein the spacer has axial and radial dimensions for positioning between the spinous processes of adjacent vertebrae. The systems include one or more spacers and a mechanical actuation means for delivering and deploying the spacer. The methods involve the implantation of one or more spacers within the interspinous space. Full Article
em Systems and methods for the fusion of the sacral-iliac joint By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The sacral-iliac joint between an iliac and a sacrum is fused either by the creation of a lateral insertion path laterally through the ilium, through the sacral-iliac joint, and into the sacrum, or by the creation of a postero-lateral insertion path entering from a posterior iliac spine of an ilium, angling through the sacral-iliac joint, and terminating in the sacral alae. A bone fixation implant is inserted through the insertion path and anchored in the interior region of the sacrum or sacral alea to fixate the sacral-iliac joint. Full Article
em Spinal plate assembly By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention is directed to implantable devices for stabilizing or fusing bone structures within the spine. More specifically, the present invention is a spinal plate assembly that includes an automatic mechanism for blocking the pathway of a bone fastener once inserted to prevent unwanted backwards migration of the bone screw. Full Article
em Methods and apparatuses for flow restoration and implanting members in the human body By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A medical device for blood flow restoration and/or for use as an implantable member in a human vessel includes a self-expanding member, a guidewire, and a connection mechanism. The self-expanding member includes a plurality of cells and filaments having specific ranges of thicknesses, widths, and heights. The self-expanding member can take on a volume-reduced coiled form with overlapped edges, and can generate optimal radial forces against a vessel wall and/or thrombus when deployed and expanded. Full Article
em Anchoring device and system for an intervertebral implant, intervertebral implant and implantation instrument By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Various embodiments of intervertebral implants, anchoring devices for intervertebral implants, and implantation instrumentation are provided, along with various embodiments of methods for using one or more of the devices. Some embodiments of an anchoring device have a body comprising at least one curve and a rigid plate elongated along a longitudinal axis so that its front end enters at least one vertebra while its rear end remains in the passage of an implant. In some embodiments, the plate comprises at least one longitudinal slot separating at least one posterior portion of the plate into two branches, with at least one branch comprising at least one withdrawal stop configured to retain the device in the implant. Full Article
em High-strength microwave antenna assemblies By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Various high-strength microwave antenna assemblies are described herein. The microwave antenna has a radiating portion connected by a feedline to a power generating source, e.g., a generator. The antenna is a dipole antenna with the distal end of the radiating portion being tapered and terminating at a tip to allow for direct insertion into tissue. Antenna rigidity comes from placing distal and proximal radiating portions in a pre-stressed state, assembling them via threaded or overlapping joints, or fixedly attaching an inner conductor to the distal portion. The inner conductor is affixed to the distal portion by, e.g., welding, brazing, soldering, or by adhesives. A junction member made from a hard dielectric material, e.g., ceramic, can be placed between the two portions and can have uniform or non-uniform shapes to accommodate varying antenna designs. Electrical chokes may also be used to contain returning currents to the distal end of the antenna. Full Article
em Multiplanar bone anchor system By www.freepatentsonline.com Published On :: Tue, 02 Jun 2015 08:00:00 EDT The present teachings provide one or more surgical implements for repairing damaged tissue, such as in the case of a spinal fixation procedure. A bone anchor is provided. The anchor can include a bone fastener. The bone fastener can include a head and a second end adapted to engage an anatomy. The bone fastener can extend along a longitudinal axis. The anchor can also include a coupling arrangement coupled to the head of the bone fastener so that the bone fastener is rotatable about the longitudinal axis to define a first plane of motion. The anchor can further include a saddle, which can be coupled to the coupling arrangement. The saddle can be movable relative to at least one of the bone fastener and the coupling arrangement to define a second plane of motion. Full Article
em Tissue ablation system with energy distribution By www.freepatentsonline.com Published On :: Tue, 04 Aug 2015 08:00:00 EDT A microwave ablation system includes an energy source adapted to generate microwave energy and a power splitting device having an input adapted to connect to the energy source and a plurality of outputs. The plurality of outputs are configured to be coupled to a corresponding plurality of energy delivery devices. The power splitting device is configured to selectively divide energy provided from the energy source between the plurality of energy devices. Full Article
em Data distributing and accessing method and system By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A data distributing and accessing method for sharing a file via a network system includes steps of: dividing the file into a plurality of blocks; distributing the blocks in a plurality of data hosts interconnected via the network system; one of the data hosts receiving a file-reading request from a user host and issuing collecting requests to other data hosts to collect the blocks from the data hosts; and transferring the collected blocks from the data hosts to the user host to be combined into the file. Full Article
em Method and system for processing digital content according to a workflow By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A method of processing content according to a workflow, where a digital content is processed on one of a plurality of processing devices according to process definition associated to the content, includes the steps, iterated at the processing device, of: a) receiving from a server a signed workflow information, a workflow information comprising a status of the content processing, a signature of the process definition and a hash of the content;b) verifying the workflow information;c) when the workflow information is verified, processing the content according to the process definition and according to status of the content processing;d) updating and signing the workflow information;e) sending to the server the signed workflow information;and the steps iterated at the server of:f) receiving from a processing device a signed workflow information;g) publishing the signed workflow information received from the processing device. A system for performing the method is also provided. Full Article
em Communication terminal, communication system, communication method and communication program By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A communication terminal that can adjust which section of a one-time pad cipher key is used and achieve cipher communication when there is a possibility that the one-time pad cipher keys are not completely matched between communication terminals. A cipher key transfer device acquires a one-time pad cipher key from a key sharing system, divides the acquired one-time pad cipher key with a predetermined number of bits, and transfers the same to a mobile communication terminal after converting the same into one-time pad cipher key cartridges. Along with the partner's terminal, the mobile communication terminal negotiates which one-time pad cipher key cartridge will be used to perform cipher communication, decides the one-time pad cipher key cartridge to be used, and begins cipher communication. Full Article
em System and method for remote reset of password and encryption key By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created. Full Article
em Apparatus for logging a configuration of a microprocessor system and method for logging a configuration of a microprocessor system By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT An apparatus includes a logging apparatus and a configuration apparatus. The logging apparatus has a security module operable to create a manipulation-proof log. The configuration apparatus is operable to configure a configurable microprocessor system. The configuration apparatus is further operable to be coupled to the logging apparatus in order to log a configuration of the microprocessor system using the logging apparatus. Full Article
em Network-based revocation, compliance and keying of copy protection systems By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A method of authenticating a device involves establishing a local connection between a local target device and a local source device; at the source device, obtaining credentials of the target device via the local connection; at the source device, sending the credentials to a cloud authentication server via a secure communication channel; at the cloud authentication server, checking the credentials of the target device against a database of known good devices; at the source device, receiving a message from the cloud authentication server via the secure communication channel, said message indicating that the target device is authenticated; and delivering content from the source device to the target device on the condition that the target device is authenticated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. Full Article
em System and methods for UICC-based secure communication By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed. Full Article
em Method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit. Full Article
em Method and system for secured remote provisioning of a universal integrated circuit card of a user equipment By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention provides a method and system for secured remote provisioning of a universal integrated circuit card of a user equipment. A system includes a user equipment for initiating a request for remote provisioning of an universal integrated circuit card (UICC) in the user equipment, where the request for remote provisioning includes a machine identifier (MID) associated with the user equipment and a public land mobile network (PLMN) identifier (ID) associated with an network operator. The system also includes at least one shared key management server for dynamically generating security keys and an operator shared key using the security keys, the MID. Moreover, the system includes an operator network for generating a subscription key using the operator shared key and an international mobile subscriber identity (IMSI), and provisioning the IMSI in a secured manner to the UICC of the user equipment using the security keys. Full Article
em System and method for securely communicating with electronic meters By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link or connection such as via a network. This enables messages to be sent from the utility to the meter and vice versa in a secure manner. The network provides a communication medium for communicating via the C12.22 protocol for secure metering. A cryptographic backend is used to cryptographically process messages to be sent to the meter and to similarly cryptographically process messages sent from the meter. By providing appropriate cryptographic measures such as key management, confidentiality and authentication, the meter can only interpret and process messages from a legitimate utility and the utility can ensure that the messages it receives are from a legitimate meter and contain legitimate information. Full Article
em System and method for obtaining certificate status of subkeys By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced. Full Article
em System and method for protecting information and related encryption keys By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system apparatus and method for protecting information are provided. Embodiments of the invention may detect inactivity related to a computing device. Information and encryption key may be removed from a memory. Subsequent activity may be detected. An authentication procedure may be performed, and, contingent on authenticating a relevant entity, a master key may be generated and installed in a memory. Full Article
em Method and system for providing a rotating key encrypted file system By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A file system data is divided into two or more data blocks. A unique encryption key is assigned to each data block with the encryption key assigned to each data block being distinct from other encryption keys used to encrypt the other data blocks and each of the data blocks is encrypted using its assigned encryption key. One of the data blocks within the file system is then selected and decrypted using the distinct encryption key assigned to the selected data block and a new encryption key, distinct for the previously assigned encryption key, is assigned to the selected data block and the selected data block is re-encrypted using the new encryption key. This process is then repeated for each data block on a sequential/cyclic and continually rotating basis. Full Article
em Cryptanalysis method and system By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and(B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output;The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key. Full Article
em Managing encryption keys in a computer system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and apparatus is disclosed for managing encryption keys in a computer system in which in response to the change of a system key the old key and new key are both maintained for subsequent use. Full Article
em On-demand download of partial encrypted content for partial super distributed content By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A request to render content associated with a first super distributed content file is detected by a content rendering device. At least one portion of the content associated with the first super distributed content file is determined to be missing from the first super distributed content file. A second file including the at least one portion of the content missing from the first super distributed content file is obtained from a server. The at least one portion of the content of the second file includes partial encrypted portions of the content associated with an encryption system of the content rendering device. A content output stream including decrypted partial encrypted portions of the content of the second file and the content associated with the first super distributed content file is generated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. Full Article
em Instantaneous recommendation of social interactions in a social networking system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT As a user of a social networking system views a page that includes information provided by the system, certain types of social interactions are monitored. If an interaction monitored for is detected, at least one recommendation unit is identified to present to user on the page. The recommendation unit is identified based on a description of the interaction. The recommendation unit suggests that the user perform a social interaction in the social networking system. The recommendation unit is transmitted to a device of the user and is presented to the user on the page without having to reload the entire page. Full Article
em Disk array device and data management method for disk array device By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A disk array device comprises a first storage unit that stores encrypted user data, a second storage unit that is different from the first storage unit and locks and stores configuration information including a first encrypted authentication key that unlocks the encrypted user data, a management unit that includes a decoder that decodes the first encrypted authentication key and a control unit that unlocks the locked configuration information using a second authentication key, the management unit managing data using the first and second authentication keys. the management unit includes a configuration information recovery portion that unlocks the locked configuration information by using the second authentication key and recovers the configuration information during booting and a user data unlocking portion that decodes the first encrypted authentication key included in the configuration information and unlocks the encrypted user data stored in the first storage unit by using the first decoded authentication key. Full Article
em Method and system for providing conditional access to encrypted content By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network. Partially decrypted video content is obtained by decrypting a first layer of encryption of the encrypted video content using the first decryption data. The partially decrypted video content is stored. A request for viewing the encrypted video content is transmitted and second decryption data is received. A second layer of encryption of the encrypted video content is decrypted using the second decryption data. Full Article
em Selective management controller authenticated access control to host mapped resources By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes a plurality of registers. The board management controller is in communication with the host mapped GPIO and with the shared memory, and is configured to control accessibility to the plurality of registers in the GPIO, and to control write accessibility of the shared memory based on a private key received from a basic input output system requesting accessibility to the plurality of registers and write accessibility of the shared memory. The cryptography engine is in communication with the board memory controller, and is configured to authenticate the private key received from the board management controller. Full Article
em Access management system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is maintained. The mobile device is provided with a rights adjustment module which modifies the access rights for locally stored corporate data in dependence on the connectivity of the mobile device with a corporate server. Full Article
em Mobile host using a virtual single account client and server system for network access and management By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network. Full Article
em System and method of lawful access to secure communications By www.freepatentsonline.com Published On :: Tue, 14 Jul 2015 08:00:00 EDT The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to encrypt a packet are stored in a header of the packet. The packet is transmitted with the encrypted data portion in a communication. In some aspects, one or more values used to generate an encryption key are received. The encryption key is regenerated using the one or more values. Full Article
em Method of making flexible foaming member from recycled materials By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention provides a method of making a flexible foaming member from recycled material. The present invention relates to a production method to recycling wastes containing rubber, plastic and metal materials and pulverize them into scraps under normal temperatures, then roughly separate the various materials contained in the waste scraps into different layers based on the difference of specific gravity, and further take out the scraps of rubber and plastic materials with lower specific gravity from the waste scraps, then conduct multiple heating and pulverizations under different temperatures to produce composite-material scraps, and then using some composite-material scraps to mix flexible materials and foaming agents, then pressing the mixture into a plate-like foaming material, and conduct vulcanization and foam forming for the plates of foam material to become a elastic foam. Full Article
em Zone control of tool temperature By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A tool system for moulding an article is provided which comprising a tool (100) having a tool surface (104) for forming an article, the tool surface comprising a plurality of tool zones (106). Heating and cooling means (102a) are independently associated with at least some of said tool zones (106). A control means is adapted to control the heating and cooling means (102a) to individually heat or cool the tool zones (106) having heating and cooling means (102a) associated therewith so as to regulate the heat transfer into and out of the article at each tool zone (106) at any particular time throughout the moulding process. Full Article
em Solid imaging systems, components thereof, and methods of solid imaging By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT There is provided solid imaging methods and apparatus for making three-dimensional objects from solid imaging material. A tray with a film bottom is provided to hold solid imaging material that is selectively cured into cross-sections of the three-dimensional object being built. A coater bar is moved back and forth over the film to remove any uncured solid imaging material from a previous layer and to apply a new layer of solid imaging material. A sensor is provided to measure the amount of resin in the tray to determine the appropriate amount of solid imaging material to be added, from a cartridge, for the next layer. A shuttle, which covers the tray when the exterior door to the solid imaging apparatus is opened for setting up a build or removing a three-dimensional object, can also be used to move the coater bar and to selectively open one or more valves on the cartridge to dispense the desired amount of solid imaging material. Full Article
em System, method, and apparatus for solar heated manufacturing By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system for a thermal manufacturing system including a heliostat and a mold. The heliostat includes at least one reflecting surface, a steering mechanism and a controller. The steering mechanism is coupled to the at least one reflecting surface and capable of directing at least a first portion of the at least one reflecting surface toward a first one of multiple, selectable focal points. The mold is located in a second one of the selectable focal points. A manufacturing method is also disclosed. Full Article
em Holding assembly for a lens By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A holding device (1) holds a lens (6) at its lens edge (5) with the aid of an adhesive connection (16, 17). The adhesive connection (16, 17) is applied only at one adhesive point or only at two spaced apart adhesive points (16, 17). Each holding device (1) provided with a lens (6) is positioned on the dip frame in such a manner that the lens (6) is positioned above its holding device (1). A method is provided for finishing lenses (6) wherein the lenses (6) are subjected to various sequential finishing steps of a finishing process and the lenses (6) are cemented to the same holding device during finishing. The application of adhesive is only at one adhesive point or at two spaced apart adhesive points (16, 17). Full Article
em Recording apparatus, recording method, and recording system By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT A moving image recording apparatus generates first moving image data and second moving image data having less number of pixels than that of the first moving image data, records a moving image file including generated moving image data into a recording medium, and in the case that the first moving image data is outputted to the external apparatus for recording the first moving image data, controls so as to generate the second moving image data concurrently with the outputting of the first moving image data and controls to record a moving image file including the generated second moving image data into the recording medium, wherein outputting an instruction for closing a moving image file including the first moving image data to the external apparatus is controlled in accordance with the moving image file including the second moving image data being recorded into the recording medium having been closed. Full Article
em Collaborative production asset management By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT In an approach, a method of spotting music for a motion picture comprises: receiving music editor (MXE) cue related data defining a plurality of cues each having a start timecode value and an end timecode value; based on the MXE data, creating and storing an MXE timecode path, a composer (CMP) timecode path, and a cue sheet timecode path; copying one or more of the MXE cue related data to CMP cues in the CMP timecode path in a CMP spotting dataset; receiving one or more changes to the CMP cues without also modifying the MXE cue related data; applying an editing lock to the CMP cues; auto-populating the CMP cues to cue sheet cues in the cue sheet timecode path; receiving one or more changes to the cue sheet cues without also modifying the CMP cues; finalizing and distributing a cue sheet based on the cue sheet cues; wherein the method is performed by one or more special-purpose computing devices. Full Article
em System and method for adaptive playback based on destination By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT Disclosed herein are systems, methods, and computer readable-media for adaptive media playback based on destination. The method for adaptive media playback comprises determining one or more destinations, collecting media content that is relevant to or describes the one or more destinations, assembling the media content into a program, and outputting the program. In various embodiments, media content may be advertising, consumer-generated, based on real-time events, based on a schedule, or assembled to fit within an estimated available time. Media content may be assembled using an adaptation engine that selects a plurality of media segments that fit in the estimated available time, orders the plurality of media segments, alters at least one of the plurality of media segments to fit the estimated available time, if necessary, and creates a playlist of selected media content containing the plurality of media segments. Full Article
em Systems and methods for generation of composite video from multiple asynchronously recorded input streams By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Systems and methods are provided for generating a composite video based on a plurality of asynchronously recorded input video streams. A plurality of segments of the input video streams are identified. A number of the input video streams that were recording during the particular segment are determined. A video display configuration for the particular segment is determined based on the number of video streams that were recording, where the video display configuration includes a display sub-region for each of the number of video streams that was recording. A composite video is generated, where the composite video includes a portion of video associated with each of the segments, where the composite video portion associated with the particular segment is formatted according to the video display configuration and displays the video streams that were recording during the particular segment in the display sub-regions of the video display configuration. Full Article
em Motion picture project management system By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Motion picture project management system for reviewers, coordinators and artists. Artists utilize image analysis and image enhancement and computer graphics processing for example to convert two-dimensional images into three-dimensional images or otherwise create or alter motion pictures. Enables the efficient management of projects related to motion pictures to enable enterprises to manage assets, control costs, predict budgets and profit margins, reduce archival storage and otherwise provide displays tailored to specific roles to increase worker efficiency. Full Article
em Television receiver storage management By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Various arrangements for managing television programming storage at a television receiver are presented. User input specifying a number of days for retention of each managed array of a plurality of managed arrays of television channels to be recorded by the television receiver may be received. A television service provider may select a plurality of television channels for recording as the plurality of managed arrays of television channels. Also, the television service provider may define times for recording of the plurality of television channels of the plurality of managed arrays of television channels. A first amount of storage space for storage of the plurality of managed arrays of television channels may be calculated based on the number of days for retention. The first amount of storage space of a storage medium to the plurality of managed arrays of television channels may be allocated. Full Article
em Recording system, receiving apparatus, recording apparatus, recording control method, and program By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A recording system includes a receiving apparatus and a recording apparatus. The receiving apparatus includes a creation section and a reservation control section. The recording apparatus includes a recording section and a recording control section. Full Article
em Automatic detection, removal, replacement and tagging of flash frames in a video By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A method for automatically detecting, eliminating and replacing flash frames in digital video utilizes the detected flash frames to categorize and tag the surrounding frames as a relevant area of the digital video. The flash frame is detected when acquiring digital video during capture, the flash frame is replaced with a newly-constructed frame that is interpolated based upon surrounding frames and then, using the detected flash as the timestamp, the frame is tagged. Full Article
em Content data recording/reproducing device, information communication system, contents list generation method and program By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The present invention provides a content data recording/reproducing device, comprising a communication unit that engages in communication with an external device, a storage unit that stores content data and additional data related to the content data, a content data extraction unit that selectively extracts the content data from the storage unit based upon condition data received at the communication unit from the external device and the additional data stored in the storage unit and a contents list generation unit that generates a contents list based upon the condition data and additional data corresponding to the content data extracted by the content data extraction unit. Full Article
em Method and apparatus for advertisement placement in a user dialog on a set-top box By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Methods and apparatuses for presenting targeted advertisements to DVR users are described. After a DVR has finished playing a recorded television program, or in response to other specified events, the DVR presents a screen which comprises a “save or delete” menu. In addition to the “save” and “delete” options, the menu additionally comprises one or more other options. Each of these other options may correspond to a separate promotional item. For example, a user's selection of such an option may cause the DVR to display or play an advertisement on the user's television set. Additionally or alternatively, these other options, when selected by a user, may cause the DVR to display a user interface through which the user can actually purchase a product or service. The product or service advertised or offered may be one that was featured or referenced in the television program that the user was just watching. Full Article
em System and method for selecting, capturing, and distributing customized event recordings By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system that enables an event or moments within an event to be captured and provided in a record that preserves at least some aspects of the participant's perspective of the event. In particular, the present invention involves centralized recording of the event in one or more modes including video, audio, and still image recordings and a system that enables a participant (i.e., one who perceives the event) to select portions of the event recording substantially contemporaneously with the event occurrence. A personalized record is made by duplicating the selected portions from the event record. In a particular example, the personalized record is recorded on a digital media such as a compact disc (CD) or digital video disk (DVD) or the like. Full Article
em System and method for content-based navigation of live and recorded TV and video programs By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, method and computer-readable medium are presented for providing real-time content-based navigation of live video programming. The video programming is received and a searchable database is generated. The method aspect of the invention comprises receiving a live video program, generating an index to the received live video program by extracting images and/or text from the video program, recording the live video program, presenting at least a portion of data associated with the generated index to a user, receiving user input regarding a search to a portion of the recorded video program to which the user desires to navigate and playing back the recorded video program starting at the searched portion identified by the user input. The search may be of an image and/or text portion of the presentation. Full Article
em System for program specific information error management in a video decoder By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A processing system decodes packetized program information including ancillary program specific information comprising a plurality of hierarchically ordered information tables. The ancillary information is used in acquiring and decoding packetized program information to provide a video program for display. The processing system employs a method involving detection of a mismatch between a version number of a first table of the program specific information (e.g. a virtual channel table (VCT), or channel information table (CIT)) and a corresponding version number of the first table conveyed in a second table (e.g. a master guide table (MGT)). If a mismatch is detected, the first and second tables are forced to contain a compatible first table version number. The packetized program information is decoded to provide a video program for display using the program specific information including the first and second tables including the forced compatible version number. A detected mismatch may also be disregarded to enable the decoding of the packetized program information and a User's channel line-up may be edited to remove channels associated with a detected mismatch or other program specific information error condition. Full Article
em Digital video recording and playback of user displays in a process control system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A process control system user display provides a display image containing control system information. The system may include a digital recording module including an image capture module for making a real-time digital recording of at least a portion of the display image, the image capture module buffering a terminal portion of the real-time digital recording. A storage module may store at least a portion of the real-time digital recording. A real-time digital recording may contain at least a portion of the display image, wherein, at any particular time, the real-time digital recording includes information from the control system for a predetermined duration proximate the particular time, and at least a portion of the real-time digital recording may be stored. A desired portion of the digital recording may be played back, optionally with process control system event and/or continuous history. Full Article