PALMSOURCE, INC. Patent applications |
Patent application number | Title | Published |
20100323680 | METHOD AND SYSTEM FOR SINGLE-STEP ENABLEMENT OF TELEPHONY FUNCTIONALITY FOR A PORTABLE COMPUTER SYSTEM - A method and apparatus for automatic delivery of a phone call on an electronic device regardless of whether other tasks are running on the operating system. A separate background task (“thread”), independent of the operating system, enables telephony functionality without regard to the mode of a graphical user interface. The background task is always active and functions to respond to an incoming call even if the user is in a graphical user interface window that requires some input from the user (e.g. the graphical user interface is blocked). | 12-23-2010 |
20100299726 | SECURITY TECHNIQUE FOR CONTROLLING ACCESS TO A NETWORK BY A WIRELESS DEVICE - The present invention relates to a method for protecting the security of a computer network which is accessed through the use of wireless devices, among other means. Specifically, the present invention pertains to a method of using user-specific biometric data to identify users of wireless devices such as PDAs and yet prevent use by unauthorized persons and prevent changing of the biometric data by unauthorized persons. The method also prevents unauthorized access, and facilitates authorized access, to computer networks. Control of access to the biometric data and control of access to the network can be maintained in the network administrator or other responsible body and thereby also offers security against theft. | 11-25-2010 |
20100287139 | METHOD AND APPARATUS FOR PARALLEL EXECUTION OF CONDUITS DURING SIMULTANEOUS SYNCHRONIZATION OF DATABASES - Sharing information between a host computer system and a peripheral computer system. Conduit programs running simultaneously on the host computer system synchronize information between the two computer systems. The conduits initiate multiple time multiplexed transfers across a single communication link between the two computer systems. In general, one or more conduits can perform a non-transfer task while another conduit can simultaneously perform a transfer over the host-peripheral communication link. The conduits may be used to load software onto the peripheral computer or to exchange e-mail between the two computer systems. While one active conduit is performing a task that does not involve use of the communication link, the other simultaneously executing conduits can use the communication link to transfer records between the host and the peripheral computer system. | 11-11-2010 |
20100268848 | CONTENT ACCESS FROM A COMMUNICATIONS NETWORK USING A HANDHELD COMPUTER SYSTEM AND METHOD - A handheld computer including a wireless communications link with a wireless server is disclosed. The wireless communications link allows browsing of information provided through the wireless server which is coupled to a communications network. A user of the handheld computer may generate a request for content, for example, by selecting a link to content. The request is communicated to the wireless server which requests the content from the content source. When the content is received by the wireless server, a plug-in mechanism or other type of software program is used to convert the particular content type into a format easily communicated and used by the handheld computer. The handheld computer receives the formatted content, and using a compatible plug-in mechanism or software program, is able to display content using the handheld computer. | 10-21-2010 |
20100235601 | METHOD AND SYSTEM FOR ENABLING PERSONAL DIGITAL ASSISTANTS AND PROTECTING STORED PRIVATE DATA - A method and system for enabling personal digital assistants (PDAs) and protecting stored private data. Specifically, one embodiment in accordance with the present invention includes a removable expansion card about the size of a postage stamp which plugs into a slot of a personal digital assistant. The removable expansion card, referred to as a personality card, is capable of storing all of a user's private information and data which is used within their personal digital assistant. By removing the personality card from the personal digital assistant, all of the user's private information and data may be removed from the personal digital assistant. Furthermore, the personal digital assistant may also be rendered totally or partially useless once the personality card is removed from it. There are several advantages associated with a personality card system in accordance with the present invention. For example, one of the advantages is that a user is able to restrict access to their stored private information and data by simply removing their personality card from their personal digital assistant. Furthermore, as personal digital assistants equipped with personality card slots become increasingly more common, a user will be able to continually carry around their personality card and enable a spare and locally available personal digital assistant with their private information when desired. | 09-16-2010 |
20100235358 | TIME BASED PROFILE MANAGEMENT ON PALMTOP COMPUTER - A personal information manager or other software program, preferably residing within a palmtop computer, uses a time of day profile to establish a default data category. When the user wishes to enter or edit data or retrieve data, the personal information manager or other software program inspects a real-time clock to determine the time of day. The personal information manager or other software program then establishes a default category based upon the time of day profile established by the user. The user is given the opportunity to modify the default category at any time. In this manner, for example, the user can establish a default business category during business times in days and a personal category during personal times in days. This provides the advantage of correctly categorizing data in an automated manner under most circumstances. | 09-16-2010 |
20100198879 | AUTOMATIC TRACKING OF USAGE OF A SOFTWARE APPLICATION HAVING DIFFERENT VERSIONS - A method for automatically tracking application and content usage is disclosed. According to an embodiment of the present invention, a method first recites the step of accessing an application interface (API) call with a parameter specifying a first portion of content to be measured. For example, the amount of time for which the portion of content is used is measured. Next the method recites, in response to the accessed call, measuring usage for the first portion of content. Then, the method recites continuing to access API calls specifying additional portions of content to be measured until the program making the calls finishes execution. In this fashion, content usage is tracked. Application developers may determine, from the content usage, where users are getting stuck in a game or what segments of an electronic document are being viewed. | 08-05-2010 |
20100153838 | ADAPTIVE CONTENT DELIVERY - A method and apparatus that provides adaptation in the content delivered to a palmtop computer. Connections between a palmtop computer and the Internet can vary from low speed dial-up to very high speed. Also, a palmtop computer's display, memory and processing power can vary considerably. Communication with the Internet is generally through a proxy server that can deduce these considerations from the palmtop computer's serial number and/or other information specified by user. The proxy server can then adapt the content based upon these considerations (e.g. only send two bit gray scale images to non-color palmtop computer, only send first frame of animated gif to low processing power palmtop computer, etc.). | 06-17-2010 |
20100153604 | DATA EXCHANGE BETWEEN A HANDHELD DEVICE AND ANOTHER COMPUTER SYSTEM USING AN EXCHANGE MANAGER VIA SYNCHRONIZATION - A method and electronic system for exchanging data between a handheld device and another computer system are described. A data file is transferred to the handheld device using the install application of a synchronization manager. The transferred file is stored as a digital stream file with its native data encoding. After synchronization, a message is sent to notify the exchange manager about the data file. The exchange manager then uses an application registry to identify the application program that corresponds to the file stream based on the extension of the stream file. The pertinent application program is then invoked and the stream file is dispatched to the application for processing. During processing, the pertinent application then formats the stream file such that the data file becomes a record within the database file that is associated with the pertinent application. | 06-17-2010 |
20100115525 | METHOD FOR DYNAMICALLY ENABLING THE EXPANSION OF A COMPUTER OPERATING SYSTEM - A method for scheduling tasks in a computer operating system comprises a background task creating at least one registered service. The background task provides an execution presence and a data present to a registered service and ranks the registered services according to the requirements of each registered service. The background task also allocates an execution presence and a data presence according to each of the registered services such that each of the registered services is given an opportunity to be scheduled in the dedicated pre-assigned time slice. | 05-06-2010 |
20100049759 | ONE-TO-MANY DEVICE SYNCHRONIZATION USING DOWNLOADED/SHARED CLIENT SOFTWARE - A method and system for performing one-to-many synchronization using a central server and also using downloadable client software. The system includes a central server, e.g., a web server or an enterprise server, that synchronizes with multiple electronic devices including, for example, a personal digital assistant, a laptop computer, a desktop computer, a cell phone, a pager, etc. Before the data synchronization takes place, and after the electronic device initiates communication with the server, the server downloads client software to the electronic device. The client software allows the electronic device to perform data synchronization with the server. After the synchronization is complete, the client software may be removed from the electronic device. The server data is located in one place and can be accessed from any location using almost any electronic device and the data can be readily protected. The invention provides geographically independent synchronization for the same device. The invention reduces the amount of metadata required to perform synchronization, eliminates slow synchronizations and also operates on standard or pre-existing data structures. The shared client software technique also reduces software maintenance and administrative issues and is helpful for application service providers (ASPS). | 02-25-2010 |
20090327318 | INFORMATION EXCHANGE BETWEEN A HANDHELD DEVICE AND ANOTHER COMPUTER SYSTEM USING AN EXCHANGE MANAGER AND UNIFORM RESOURCE LOCATOR (URL) STRINGS - A method and electronic system for exchanging data between a handheld device and another computer system using universal resource locator (URL) strings. With respect to sending information from the handheld, an application may define a URL string that may indicate 1) a transport mechanism and 2) a destination for the information. Exemplary transport mechanism strings include: IRODEX:// (infrared); BTOBEX:// (radio frequency Bluetooth); SMS://; SMTP:// (email); SYNC:// (synchronization); HTTP:// (Internet); FTP:// (file transport protocol); etc. Information and the associated URL string is forwarded from the application to an exchange manager API. The exchange manager API is connected to a plurality of exchange library APIs, one for each supported transport mechanism. If no transport mechanism is defined, the user is asked to define one. If no destination is specified, the user is asked to define one. The exchange manager then provides the required communication using the specified URL string. On receiving information, the URL can define its source. If none is given, the exchange manager requests from the user a specific application and verifies the addition of the information to the database associated with the application. When URL strings are fully defined, the communication of information can be somewhat transparent to the user. The handheld device can be a palmtop computer system. | 12-31-2009 |
20090287796 | METHOD AND APPARATUS FOR DEVICE AND CARRIER INDEPENDENT LOCATION SYSTEMS FOR MOBILE DEVICES - A method and system for a device and carrier independent geographic location protocol. Specifically, the present invention provides location information of a mobile device to third parties in a communication network through a protocol that is device and network carrier independent. Position information of any first format is sent to a proxy server. An identifier that identifies the type and format of the position information is also sent. The proxy server then locates and accesses an executable plug-in module associated with the identifier to convert the position information of the first format into one of a plurality of standard location formats. The executable plug-in module converts the position information into a second standard format as required by the third party. After the position information is converted to the second format, the proxy server sends the position information to the third party. | 11-19-2009 |
20090220068 | SYSTEM AND METHOD FOR INITIATING A CALL USING A PHONE HARD-BUTTON AND A SCREEN DIALER OF A PERSONAL DIGITAL ASSISTANT - A system and method is described for managing phone calls initiated from a phone device of a personal digital assistant. In one example, a system for managing a phone call is described. The system comprises, among other things, a personal digital assistant. The personal digital assistant includes the following: a display device; a phone device; a call device configured to control the phone device and to display a selectable interface on the display device; a hard button configured to initiate the call device; and a selection mechanism configured to receive user selections from the selectable interface. | 09-03-2009 |
20090209244 | METHOD AND SYSTEM FOR SINGLE-STEP ENABLEMENT OF TELEPHONY FUNCTIONALITY FOR A PORTABLE COMPUTER SYSTEM - A method and apparatus for automatic delivery of a phone call on an electronic device regardless of whether other tasks are running on the operating system. A separate background task (“thread”), independent of the operating system, enables telephony functionality without regard to the mode of a graphical user interface. The background task is always active and functions to respond to an incoming call even if the user is in a graphical user interface window that requires some input from the user (e.g. the graphical user interface is blocked). | 08-20-2009 |
20090202153 | METHOD AND APPARATUS FOR USING PRESSURE INFORMATION FOR IMPROVED COMPUTER CONTROLLED HANDWRITING RECOGNITION DATA ENTRY AND USER AUTHENTICATION - A method and system utilizing both (x, y) coordinate (“spatial”) stroke data and associated pressure information for improved handwriting recognition. The method and system can also be applied to all types of handwriting-based data entry applications and also to user authentication. The digitizer pad used in the computer system gives both spatial information and associated pressure data when a stroke is being drawn thereon, e.g., by a stylus. Pressure information can be used to differentiate between different character sets, e.g., upper case and lower case characters for certain alphabetic characters. The spatial stroke data then identifies the particular character. The pressure information can also be used to adjust any display attribute, such as character font size, font selection, color, italic, bold, underline, shadow, language, etc. The associated pressure information can also be used for recognizing a signature. In this case, a user is allowed to sign a name on the digitizer pad. This provides non-character based user authentication that relies not only on the spatial stroke data but also on the pressure applied at different points in the signed name or image. Pressure information can also be used to provide improved handwriting-based data entry. For instance, in a drafting program, the pressure of a drawn line can be used to determine its width. Generally, pressure data can also be used to improve handwriting recognition tasks and heuristics. | 08-13-2009 |
20090187916 | TASK SWITCHING WITH STATE PRESERVATION FOR PROGRAMS RUNNING ON AN ELECTRONIC DEVICE - A method and system providing switching between a plurality of installed programs in a computer system. Embodiments include a jump function comprising the steps: (1) determining a jump program that is to be the next program to be run, possibly from a plurality of possible choices; (2) creating input data far the jump program based on data in the current program; (3) storing the program state of the currently running program into a context packet and saving the context packet to memory; (4) releasing temporary memory that is used by the program, so as to allow other programs to use the memory; (5) calling the jump program with the created input data as input and terminating the currently running program. | 07-23-2009 |
20090187814 | METHOD AND APPARATUS FOR MANAGING CALENDAR INFORMATION FROM A SHARED DATABASE AND MANAGING CALENDAR INFORMATION FROM MULTIPLE USERS - A method and system for synchronizing and using calendar information from a shared database is disclosed. Calendar information can be stored in a shared database, e.g., on a server system and accessed and synchronized with one or more portable computer systems. The calendar information is stored using particular category types which facilitate separate manipulation, access and removal of the calendar information when placed onto a portable computer system (e.g., palmtop). In one embodiment, calendar information is stored on a shared database and is assigned a unique category type. Multiple portable computer systems can then access the shared calendar information which can be displayed on each computer system along with the system's own calendar information. The unique category type is different from the default type of each system's own calendar information and the user is not able to change category types on the portable computer system. Shared calendar information can be viewed and edited and then easily removed using the unique category type. | 07-23-2009 |
20090187671 | METHOD AND SYSTEM FOR IMPLEMENTING URL SCHEME PROXIES ON A COMPUTER SYSTEM - A method and system for implementing URL scheme proxies. Embodiments of the invention allow URL schemes that are not natively supported by a computer to be supported via proxy, e.g., using a URL scheme that is native to the computer to forward the non-native transport. More specifically, embodiments of the invention allow a first computer system to support a first URL scheme by encapsulating its transport information into another URL scheme that is natively supported by the first computer. The encapsulated information is then forwarded to a second computer system or server which can provide support for the first URL scheme transport. For instance, if the first computer supports http but does not support ftp, then an ftp transport can be encapsulated inside an http transport and then forwarded to an ftp server which can then extract and process the ftp transport. The ftp response can be handled in an analogous fashion. The invention increases the native URL scheme capabilities of a computer system by proxy. In one embodiment, a system registry is used in order to determine which helper code to use for a particular URL scheme. The selection of helper code and whether native or proxy support is selected are tasks that are transparent to the application. The invention can allow a device with no Internet access to act, transparently, as if it has Internet access. | 07-23-2009 |
20090182895 | HANDHELD COMPUTER SYSTEM THAT ATTEMPTS TO ESTABLISH AN ALTERNATIVE NETWORK LINK UPON FAILING TO ESTABLISH A REQUESTED NETWORK LINK - A computer system that attempts to establish an alternative network link upon failing to establish a requested network link is described. The computer system may encounter conditions where access to numerous networks, in particular wireless networks, is not available. Rather than only providing an error message to the user upon a failed attempt to establish the requested network link, the computer system determines whether the user has designated an alternative network link in case the requested network link cannot be established, whereas the alternative network link is selected from the plurality of network links that the computer system is configured to support. If an alternative network link has been designated, the computer system attempts to establish the alternative network link. Hence, the user experience is made smooth and uneventful when the requested network link cannot be established. | 07-16-2009 |
20090161922 | SECURITY TECHNIQUE FOR CONTROLLING ACCESS TO A NETWORK BY A WIRELESS DEVICE - The present invention relates to a method for protecting the security of a computer network which is accessed through the use of wireless devices, among other means. Specifically, the present invention pertains to a method of using user-specific biometric data to identify users of wireless devices such as PDAs and yet prevent use by unauthorized persons and prevent changing of the biometric data by unauthorized persons. The method also prevents unauthorized access, and facilitates authorized access, to computer networks. Control of access to the biometric data and control of access to the network can be maintained in the network administrator or other responsible body and thereby also offers security against theft. | 06-25-2009 |
20090150545 | AUTOMATIC COLLECTION AND UPDATING OF APPLICATION USAGE - A method and system providing automatic collection and updating of application usage on a large number of electronic devices without user intervention. The electronic devices may be a palm-sized computer systems, personal digital assistants (PDAs), or wireless telephones. On an electronic device, application usage statistics, for example, the number of times a user uses an application, are gathered and stored. Once gathered and stored, the usage statistics are transferred to a host computer, and subsequently to a server (alternatively, the electronic device can send the gathered statistics directly to a server). The server tabulates usage statistics gathered from a plurality of electronic devices and publishes the results. The users of the electronic devices that gather usage statistics can be compensated in a variety of ways (e.g., monetary, chances in a raffle, discounts on purchases etc.). | 06-11-2009 |
20090146969 | METHOD AND SYSTEM FOR NAVIGATING A DISPLAY SCREEN FOR LOCATING A DESIRED ITEM OF INFORMATION - A method and a system for navigating a display screen to search for a desired item of information stored in an electronic device. The electronic device includes a novel fly over user interface (FOUI) capable of receiving commands from a user to provide a zoom out view of the display screen. A user may commence a navigation session by touching the display screen in a non active area or by clicking on a specifically designated icon to activate the user interface. During the navigation session, the display screen is zoomed-out and a magnifying area may appear on the display screen. The user interface enables the user to scroll the zoomed-out display screen by dragging the magnifying area towards an edge of the display screen to find a desired item of information. The display screen may be a display screen of a digital device (e.g., portable computer, personal computer, a cellular telephone, a digital watch, etc). The user may terminate a navigation session by removing the pointer from the display screen. | 06-11-2009 |
20090138722 | SECURE AUTHENTICATION FOR AUTHORIZATION FOR TRANSACTION PROCESSING - A method and apparatus for authenticating and authorizing online transactions. An authentication cookie is transmitted to a client system. The authentication cookie includes a user encryption key and an encrypted buffer that contains user identification data and a profile code. Subsequent requests for the particular service use the authentication cookie to generate a query that includes the encrypted buffer and user identification data entered by the user. Portions of the query are encrypted using the user encryption key. Queries received at each authentication and authorization server are authenticated by reconstructing the user encryption key using information transmitted in the clear and decrypting the query using both the reconstructed user encryption key and the secret key. The user identification data entered by the user is then compared with the user identification data in the encrypted buffer for further authentication. The profile code is analyzed for determining authorization. If the query is authenticated and authorized, the authentication and authorization server forwards the request to a server that provides the desired service. | 05-28-2009 |
20090087095 | METHOD AND SYSTEM FOR HANDWRITING RECOGNITION WITH SCROLLING INPUT HISTORY AND IN-PLACE EDITING - A computer implemented method for a touch screen user interface for a computer system. A first touchscreen area is provided for accepting text input strokes. A second touchscreen area is provided for displaying recognized text from the text input strokes. The text input strokes are displayed in the first touchscreen area. The text input strokes are recognized and the resulting recognized text is displayed in the second touchscreen area. A portion of the recognized text is displayed in the first touchscreen area, wherein the portion of the recognized text is shown as the text input strokes are recognized. The portion of the recognized text displayed scrolls as the new text input strokes are recognized. The portion of the recognized text in the first touchscreen area can be displayed in a different format with respect to the recognized text in the second touchscreen area. The text input strokes in a first part of the first touchscreen area are graphically shown as they are being recognized by the computer system. The touchscreen user interface method can be implemented on a PID (personal information device) and can be implemented on a palmtop computer system. | 04-02-2009 |
20090005026 | METHOD AND SYSTEM FOR ENABLING TIMED EVENTS OF A PORTABLE COMPUTING DEVICE TO TRIGGER REMOTE CONTROL OF EXTERNAL DEVICES - One embodiment in accordance with the present invention includes using a portable computing device to remotely control devices and/or systems wirelessly. Specifically, a software timer application operating on the portable computing device enables its user to predefine the time, date, and the operation(s) that one or more properly enabled devices and/or systems perform in the future. That is, the timer software operating on the portable computing device is able at some predefined time to wirelessly trigger an action or a sequence of actions from devices and/or systems. For example, a user of the portable computing device is able to utilize the timer software to program a predefined date and time that the portable computing device will turn on a favorite radio program and turn up the thermostat. The wireless communication of the portable computing device may occur using a radio frequency (RF) technology like Bluetooth, IEEE 802.11, or HomeRF. | 01-01-2009 |
20080301197 | GENERATING COHERENT GLOBAL IDENTIFIERS FOR EFFICIENT DATA IDENTIFICATION - A method and system thereof for identifying records are described. Records on a node are distinguished from other records on the node by assigning each record a unique local identifier. When a record is moved from one node to another node, a unique global identifier is assigned to the record. A translation technique is employed to map the local identifier to the global identifier (and vice versa). | 12-04-2008 |
20080281901 | WEB-BASED TASK ASSISTANTS FOR WIRELESS PERSONAL DEVICES - The present invention relates to a method for enhancing the use of a computer network which is accessed by use of wireless device. Specifically, one embodiment of the present invention pertains to a method of using server-resident software assistants, programs to assist the wireless device user, to perform a significant amount of the tedious input tasks required when wireless devices such as PDAs attempt to exploit the services available on the Internet. The method provides a mechanism by which software assistants can be programmed to a users' own specific information and ways of performing tasks that exploit Internet services such as purchasing, information searches, event planning and complex scheduling. The task can be organized in structural task lists that interface with a user's stored preferences and PIM information on the portable electronic device. | 11-13-2008 |
20080225773 | COMMUNICATION PROTOCOL FOR WIRELESS DATA EXCHANGE VIA A PACKET TRANSPORT BASED SYSTEM - A protocol for wireless data exchange may be used in conjunction with two or more portable computer systems. One of the portable computer systems may be a personal digital assistant (PDA) having an internal or an external wireless communication unit. The protocol can be used by a sending application residing on the portable computer system to transparently send a wireless message to a receiving computer system. The packet is then automatically routed to the proper destination application residing on the receiver utilizing a data type identifier. The data type identifier is used by the receiver, in conjunction with an application registry, to determine the proper destination application. | 09-18-2008 |
20080209452 | METHOD AND APPARATUS FOR NOTIFICATION ON AN ELECTRONIC HANDHELD DEVICE USING AN ATTENTION MANAGER - A method and system for notification in a palm-sized computer system. Specifically, the present invention discloses an Attention Manager that manages application demand for a user's attention. The Attention Manager receives multiple attention requests from varying applications. With each new attention request received that indicates a record needs a user's attention, the Attention Manager stores the request in memory and determines if there are other outstanding attention requests that have not been cleared. Depending on the number of outstanding requests, the Attention Manager sends a request for record information in list or detail format. If there are multiple outstanding attention requests, the Attention Manager displays a notification dialog in a list format. If there is only one outstanding attention request, the Attention Manager displays the notification dialog in detail format. Additionally, a simple user interface to navigate to the application and record entry requiring attention is provided. | 08-28-2008 |