contact us

Peer-to-Patent - Posted Applications

View Archived Applications

Updated: September 30, 2008

These descriptions have been prepared by the Peer-to-Patent project team and do not reflect the views of the inventors or their assignees.

Application No: 11/927189
Publication No: 20080221945
Publication Date: September 11, 2008
Takedown Date: December 31, 2008
Inventor Name: Robert Pace, Gregg Weinstein, Paul Vigilante, Richard Cohn, Walter Joseph Clayton, Michael Donahue, Claudia Idann Rericha, Mindy Gordon
Assignee: Pro Se
Title: Ecosystem allowing compliance with prescribed requirements or objectives

This patent application outlines a “financial ecosystem” that allows for the trade of private placement securities in accordance with the requirements under the United States Securities Act of 1933, the United States Securities and Exchange Act of 1934 and the Sarbanes-Oxley Act of 2002. The financial ecosystem requires users to submit verifiable information that shows that they are Qualified Institutional Buyers (QIBs) under federal law. The community may include issuers of securities, investors, brokers, dealers, securities custodians, transfer agents, research analysts, and other market participants. Essentially, this application seeks to create a network of companies offering private securities to qualified buyers in a way that complies with all current federal financial security regulations. The ecosystem makes sure all regulations are complied with while fostering connections between buyers and sellers.

Application No: 11/679787
Publication No: 20080209399
Publication Date: August 28, 2008
Takedown Date: December 18, 2008
Inventor Name: Michael Bonnet, William Baroniunas, Mark Webbink
Assignee: Pro Se
Title: Methods and systems for tracking and auditing intellectual property in packages of open source software

Open source software has become a major trend in the software industry. Under the open source model, users are able to view and modify the software’s source code at nominal or no cost, thus providing an opportunity for the public to collaborate on developing modified versions of the underlying software. This model allows for software that is more accessible and potentially more reliable. Accordingly, many companies are now developing and using open source software. Because of the free nature of open source software, users are typically required to comply with licensing agreements, such as the GNU General Public License. As a result, uncontrolled use of open source software can introduce risks, such as copyright infringement, breach of contract, patent infringement, trademark infringement, etc. This invention relates to managing software, and more particularly, to tracking and auditing intellectual property features of software, such as packages or distributions of open source software.

Application No: 11/045512
Publication No: 20080201415
Publication Date: August 21, 2008
Takedown Date: December 11, 2008
Inventor Name: Cormac E. Herley
Assignee: Microsoft
Title: Peer to Peer Network

The purpose of a central server in the conventional implementation of a peer-to-peer network is to maintain a list of each computer or peer (e.g., node) in the network and the data stored on those nodes. Although the utilization of a central server may function adequately, it creates a data distribution system that lacks scalability, anonymity, and fairness.

The patent application describes a method for replacing the conventional central server with a bulletin board. While a conventional central server gets bogged down with the responsibility of tracking available files and the location of those files among nodes, the bulletin board maintains a list of requests in a predefined machine-readable format from various nodes in the system. Nodes are required to periodically register with the bulletin board according to an assigned frequency, at which point they proceed with serving applicable requests. Nodes can join and un-join the system without the bulletin board or any other tracking component, facilitating a larger number of nodes participating in the system than compared with the conventional implementation. With the help of an access layer, the system tracks performance statistics for each node and mitigates requests from those nodes that seem to be partaking in the benefits of the network without shouldering any of the burdens.

Application No: 11/552815
Publication No: 20080104547
Publication Date: May 1, 2008
Takedown Date: November 27, 2008
Inventor Name: Mark Morita, Murali Kumaran Kariathungal, Steven Phillip Roehm, Prakash Mahesh
Assignee: GE
Title: Gesture-based communications

A healthcare environment, such as a hospital or clinic, can encompass a large array of professionals, patients, and equipment, and healthcare personnel must manage numerous patients, systems, and tasks in order to provide quality service. Healthcare environments involve interacting with numerous devices which presents a number of issues, including physical limitations (such as devices being located in other rooms), sanitary limitations (such as the inability or impracticality of using a keyboard during surgery or re-sanitizing after using such a device), and human limitations (such as repetitive motion syndrome). The application describes inventive arrangements to improve healthcare workflows through the use of gesture-based communications devices and techniques.

Application No: 11/588585
Publication No: 20080104325
Publication Date: May 1, 2008
Takedown Date: November 27, 2008
Inventor Name: Charles Narad, Raj Yavatkar
Assignee: Intel
Title: Temporally relevant data placement

In a data computer system, data is transferred between a "producer" device and "consumer" device. When a producer and consumer do not operate synchronously, a queue may be used as a communications mechanism between them to absorb temporary differences between production and consumption. The application describes techniques coordinating transfer of data into a memory (e.g., a cache memory) to reduce cache miss latency and/or other latency problems.

Application No: 11/672058
Publication No: 20080189562
Publication Date: August 7, 2008
Takedown Date: November 27, 2008
Inventor Name: Gerald Francis McBrearty, Ian Damain Romanick, Johnny Meng-Han Shieh
Assignee: IBM
Title: Reducing power usage in a software application

Mobile computers offer a great convenience to users on the move. While battery life continues to be increased, and the software industry is increasingly focused on creating software that helps mobile computers run in a more economical manner, battery life is directly related to the number of operations a mobile computer is running. Existing solutions to reduce the number of operations performed by a data processing system when executing an application have limitations. This patent application describes a method, apparatus, and computer usable program code for reducing the amount of power used by a data processing system when executing a set of applications is provided.

Application No: 11/672340
Publication No: 20080188974
Publication Date: August 7, 2008
Takedown Date: November 27, 2008
Inventor Name: Ivory Wellman Knipfer, Jeffrey Komatsu, Jason Scott Lee, Matthew H. Zemke
Assignee: IBM
Title: Multi-dimensional serial containment process

In today's global market, a product typically consists of numerous components that are manufactured in different parts of the world and pushed along the supply chain to be integrated into the end product. Each component thus becomes its own product, with a unique identifier (serial number), as it goes down the supply chain. Problems arise when defective components pass down the supply chain. Existing solutions to identify and contain defective parts have serious limitations. This patent application describes a method, apparatus, and computer usable program for identifying a defective product. It utilizes a data processing system which identifies a range of serial numbers, narrowing that range of serial numbers using a flat algorithm, and applying a conditional mask algorithm for further narrowing of the serial numbers, effectively identifying a defective component and avoiding further distribution down the supply chain.

Application No: 11/624781
Publication No: 20080177757
Publication Date: July 24, 2008
Takedown Date: November 13, 2008
Inventor Name: Ivory Wellman Knipfer, Jason Scott Lee, Matthew H. Zemke
Assignee: IBM
Title: Production order grouping using grouping rules

In a world of vacuum, an object that is put in motion will continue its movement infinitely without friction or resistence. Likewise, in an ideal business world, manufacturers would fill every order on time without any delay or shortage. In today's business world of 1-click ordering and automated order/shipment tracking, manufacturers often face real world problems in fulfilling orders due to product shortages, quality issues, or other problems. Existing order management systems are equipped only to handle the initial orders, and run into problems grouping and sorting, shortages and back orders. The patent application describes an improved production order grouping. These inventors propose a method, apparatus, and computer program which, upon determining that a set of grouped orders cannot be completely filled, creates a short order, and forms a set of consolidated orders.

Application No: 12/053560
Publication No: 20080177799
Publication Date: July 24, 2008
Takedown Date: November 13, 2008
Inventor Name: Kelce Wilson
Assignee: Pro Se
Title: Document integrity verification

In the 2002 movie Changing Lanes, an attorney rushing to court to file legal papers collides on NYC's FDR Drive with another man also rushing to court, important papers are lost in the chaos, and what ensues is high drama about forging of documents. Especially in the computer age when documents are printed, scanned, and shared, information assurance has become a big problem, without any legitimate solution up until now, argue the inventors filing for patent protection in this application. Solutions do exist for rendering digital computer files, such as electronic document files, tamper evident. These computer-oriented solutions predominantly use hash functions or other integrity verification functions. A hash function, which is an example of a one-way integrity verification function, provides a way to verify that a computer file, such as a program, data file or electronic document, has not changed between two separate times that the file has been hashed. While documents have been long subject to forgery and tampering, existing methods (i.e. initialing each page on a Will or contract where the last page captures a signature, or notarizing each page) are not viable solutions. This invention describes a method which enables tamper detection of printed documents.

Application No: 11/820636
Publication No: 20080172630
Publication Date: July 17, 2008
Takedown Date: November 6, 2008
Inventor Name: Yingnong Dang, Dongmei Zhang, Min Wang, Xiaohu Hou, Jian Wang
Assignee: Microsoft
Title: Graphical representation of aggregated data

In our modern technological climate software is often under attack by viruses and other types of malicious software for the purposes of exploiting both known and unknown public and private software vulnerabilities. Such vulnerabilities reduce software reliability and quality.

To counter this attack on software, many vendors provide online bulletin boards for posting software fixes and alerts. Additionally, IT administrators set up their own sites to address such concerns which are often coupled with related mailing lists.

There are inherent flaws in such a system of sharing information. Information may not be current and/or accurate. Furthermore, searches through such a system of information can be extensive and tedious in order to find the pertinent information for a specific software issue.

This patent application describes a method and system that assesses aggregated data from a plurality of online sources, allows for selection of portions of collected data by means of a user interface, identifies attributes associated with such a portion of data, and generates a graphical representation of this portion.

Application No: 11/646083
Publication No: 20080162680
Publication Date: July 3, 2008
Takedown Date: October 23, 2008
Inventor Name: Vincent Zimmer, Michael Rothman
Assignee: Intel
Title: Internet memory access

Currently, the market is driving larger physical and virtual address space on commodity hardware as exemplified by the EM64T and AMD64 extensions to the x86 instruction set. Also, the High Performance Computing (HPC) community is increasingly moving towards clusters of commodity systems typically connected via a high-speed interconnect. Such interconnects may include Infiniband or Quadrics technology.

Typically, these clusters or distributed computing systems need to communicate with other systems within and without the cluster. Often various process within a program running on the cluster need to communicate or provide data to another process within the program. Such Inter-Process Communication (IPC) incurs a large overhead. Unfortunately, there is currently no widely used standard messaging mechanism for IPC in large systems, beyond massive SMP's that cost a large amount of money to maintain cache-coherence.

Often scientific HPC applications may be coded utilizing the Message Passing Interface (MPI) library in order to gain some degree of portability. However, there is invariably some layer of software that must bind to the particular interconnection transport. Therefore, it would be beneficial for HPC deployments to have a low-latency IPC mechanism. Preferably the mechanism would be highly portable and available via commodity hardware. It is understood that, while any such mechanism may be advantageous for HPC systems, such a mechanism may also be useful to peer-to-peer gaming and other emergent network use-models. The claimed invention relates to memory access utilizing internet protocol (IP) addressing semantics.

Application No: 11/646083
Publication No: 20080162919
Publication Date: July 3, 2008
Takedown Date: October 23, 2008
Inventor Name: Vincent Zimmer, Michael Rothman
Assignee: Intel
Title: Booting utilizing electronic mail

Computer systems use a boot image that is available locally on the computer (on the hard drive or other media plugged into the computer) or on a network the computer is connected to start (or restart) and load an operating system. This patent application describes ways for starting/restarting a computer system and loading an operating system without having a boot device available locally. Such a scheme would allow a user to start/restart a computer system and load an operating system remotely by making a boot image available through email or instant messaging.