Real time position sensing of objects

US Patent 9,753,126
September 5, 2017
Embodiments are directed toward measuring a three dimensional range to a target. A transmitter emits light toward the target. An aperture may receive light reflections from the target. The aperture may direct the reflections toward a sensor that comprises rows of pixels that have columns. The sensor is offset a predetermined distance from the transmitter. Anticipated arrival times of the reflections on the sensor are based on the departure times and the predetermined offset distance. A portion of the pixels are sequentially activated based on the anticipated arrival times. The target’s three dimensional range measurement is based on the reflections detected by the portion of the pixels.

Dual-mode communication devices and methods

US Patent 9,755,683
September 5, 2017
Methods, systems, and techniques for dual-mode communication are provided. Example embodiments provide an enhanced mobile device that includes a low latency transceiver and a high latency transceiver. In some cases, the enhanced mobile device is operated by a customer and configured to interact with a point of service computing system via both the low and high latency transceivers to facilitate a customer interaction at a point of service location. For example, the enhanced mobile device may transmit via its high latency transceiver an indication that it is en route to the point of service location. Upon arrival at the point of service location, the enhanced mobile device may transmit via its low latency transceiver an indication that the customer has arrived at the point of service location. The point of service computing system may then provide a service based on the information received from the enhanced mobile device.

Wireless data storage chassis

US Patent 9,753,671
September 5, 2017
Various embodiments are directed to a data storage chassis for storing a plurality of non-specific storage drives, corresponding wireless controllers, and one or more radio adapters. The storage drives are operative to communicate with another network device over a network. A storage drive wirelessly communicates with other storage drives of the chassis, as well as one or more radio adapters of the chassis. The wireless controller corresponding to a storage drive is operative to wirelessly communicate with other wireless controllers corresponding to other storage drives and also with one or more radio adapters via wireless waveguides of the chassis. The one or more radio adapters are operative to communicate with other network devices external to the chassis and serve as access points to the chassis. Because the storage drives, the corresponding controllers, and the radio adapters communicate via wireless signals transmitted along waveguides, the chassis is a wireless chassis.

Space accounting for storage system snapshots

US Patent 9,753,932
September 5, 2017
A facility for snapshot space accounting for a storage system, such as a filesystem is disclosed. The facility enables users to quickly and easily determine the amount of storage space that would be released or recovered if a snapshot were to be purged. The facility may work in conjunction with, or as part of, a snapshot service. The facility maintains an expiration data structure and a count data structure and uses these data structures in implementing the disclosed snapshot space accounting techniques. The expiration data structure represents the life cycle of each snapshot element maintained by the facility while the count data structure represents, for pairs of snapshots, the size of the information stored in the snapshot data that expired and that spans the corresponding pair of snapshots.

Detecting attacks using passive network monitoring

US Patent 9,756,061
September 5, 2017
Embodiments are directed to detecting one or more attacks in a network. One or more network flows may be monitored using one or more network monitoring computers (NMCs). If one or more file write operations are detected based on information included in one or more packets of the one or more network flows, one or more detection rules may be executed to analyze one or more portions of the one or more packets to identify file information that is associated with the one or more file write operations. One or more metrics may be provided based on the one or more detection rules and one or more of the file information, the one or more file write operations, or the like. If one or more metrics exceed one or more threshold values, one or more reports of one or more attacks may be provided.

Apparatus, systems and methods for accessing information based on an image presented on a display

US Patent 9,749,685
April 29, 2017
Systems and methods are operable to control operation of a portable media device based on machine readable information of a graphical artifact shown on a display concurrently with presentation of a video portion of a media content event. A portable media device, using a portable media device provisioned with an image capture device, captures at least one image that includes the display that is presenting the graphical artifact and the video portion of the media content event, identifies the graphical artifact in the captured at least one image, determines the machine readable data based on the identified graphical artifact, and operates the portable media device to perform at least one operation based on the determined machine readable data.

Method and system for controlling and accessing content servers

US Patent 9,628,549
April 18, 2017
A method and system for controlling provisioning and access to cache servers with an application programming interface (API). The API includes components for performing various actions including: (i) prepopulating content on at least one cache server from a content server; (ii) expiring content on at least one cache server; (iii) pinning content in a memory of at least one cache server; (iv) assigning resources on at least one cache server in accordance with a quota; (v) retrieving content from at least one cache server; and (vi) flushing deleted content from at least one selected cache. The API may include a security layer. The security layer determines whether a requestor has permission to cause the requested action to be performed.

Location based augmented reality system for exchange of items based on location sensing methods and

US Patent 9,626,070
April 18, 2017
Location-based augmented reality systems configured exchange of items based on location sensing and associated triggering icons, and methods and devices related thereto. In one exemplary embodiment, a first, provider user identifies a specific physical location; associates a triggering icon representing a value item with the specific physical location; and, transmits the existence of the triggering icon and specific physical location to a second, mobile recipient user computing device. The second, mobile recipient user receives the triggering icon and specific physical location from the first, provider user computing device, then finds the specific physical location, activates the triggering icon and receives the value item.

Vacuum infusion adhesive and methods related thereto

US Patent 9,624,411
April 18, 2017
An epoxy adhesive that is adapted to enable spray delivery and seamless polymerization during epoxy resin vacuum infusion techniques is disclosed. The epoxy adhesive can include one or more epoxy resins and one or more solvents that are used to dissolve the one or more epoxy resins. An adduct, a tackifier, and fumed silica can also be added to the adhesive.

Systems and methods for network destination based flood attack mitigation

US Patent 9,628,503
April 18, 2017
Embodiments are directed towards network address based flood attack mitigation methods. A PTMD disposed between one or more computers may monitor several network flows and generate metrics associated with malicious network activity, such as, flood attacks. If flood attacks are determined to be occurring, the PTMD may determine the network addresses targeted by the flood attack. Further, the PTMD may activate flood attack mitigation procedures for the targeted network addresses such that other network addresses associated with the monitored network flows are excluded from the flood attack mitigation procedure. The PTMD may monitor the network traffic subsequently communicated to the targeted network addresses. Accordingly, the PTMD may determine if the flood attack has ceased based on characteristics of the monitored network traffic. If the flood attack has ceased, the flood attack mitigation procedures for the targeted network addresses may be deactivated.