04th week of 2013 patent applcation highlights part 54 |
Patent application number | Title | Published |
20130024678 | ELECTRONIC DEVICE, CONFIGURABLE COMPONENT AND CONFIGURATION INFORMATION STORAGE METHOD THEREOF - Provided are an electronic device, a configurable component and a configuration information storage method thereof, which are employed for meeting the storage requirements of the configuration information for the configurable component of the electronic device. The method comprises that: obtaining the initial configuration information for the component of the electronic device (S | 2013-01-24 |
20130024679 | INFORMATION RECORDING APPARATUS - An information recording apparatus has a drive unit to record digital information including digital contents; and a host unit to control reading and writing of the digital information for the drive unit. The host unit has a network processing unit to communicate with a server, a shadow determination unit to determine whether a shadow boot program to be executed prior to a boot program is executable, a shadow reading unit to read the shadow program from the drive unit when the shadow determination unit determines to be executable, a shadow execution unit to execute the shadow program, a server authentication unit to perform authentication with the server in accordance with a processing of the shadow program, and a password transmitter to transmit to the drive unit a password used for unlock of the drive unit when the authentication with the server is successful. | 2013-01-24 |
20130024680 | ATOMIC SWITCHING OF IMAGES IN DESKTOP STREAMING OVER WIDE AREA NETWORKS - A method for replacing a current desktop image having a current operating system on storage media for a computing device is described. In the method, an agent process is executed on the computing device for downloading from a server to a staging area on local storage media a replacement desktop disk image having a replacement operating system. The replacement desktop image includes a prefetch set of files and metadata for additional files, the prefetch set of files including a minimal set of files necessary to boot the replacement operating system, the replacement desktop image not including contents of the additional files. The computing device is rebooted to replace the current desktop image with the replacement desktop image. The computing device is then rebooted again to load the replacement operating system using the prefetch set of files. | 2013-01-24 |
20130024681 | SYSTEMS AND METHODS FOR ACTIVATION OF APPLICATIONS USING CLIENT-SPECIFIC DATA - Example embodiments relate to activation of an application included on a shared virtual disk using client-specific data. In particular, example embodiments retrieve, from a client-specific location on a virtual disk server, activation credentials generated in response to successful activation of the application during a previous boot Example embodiments then reinstall the application activation credentials to verify activation of the application for the particular client computing device. | 2013-01-24 |
20130024682 | Storage Device and Method for Updating a Shadow Master Boot Record - A storage device and method for updating a shadow master boot record (MBR) are provided. In one embodiment, a storage device is provided having a memory with a first storage area and a second storage area. The storage device receives updated sectors of the shadow MBR from a host device and writes the updated sectors in the second storage area. The storage device determines a highest written sector in the first storage area that is occupied by the shadow MBR. The storage device copies the non-updated sectors of the shadow MBR from the first storage area to the second storage area, wherein only the non-updated sectors up to the highest written sector are copied. Accordingly, any non-updated sectors above the highest written sector are not copied from the first storage area to the second storage area. The storage device then designates the second storage area as storing a current version of the shadow MBR. | 2013-01-24 |
20130024683 | SYSTEM AND METHOD FOR SENDING ENCRYPTED MESSAGES TO A DISTRIBUTION LIST - A system and method for sending encrypted messages to a distribution list. In one embodiment, the method comprises: identifying a distribution list address in a message; determining one or more member addresses associated with the distribution list address; for each member address, determining if a public key for a member identified by the member address is available on the computing device; and if so, encrypting the message to the member; sending the encrypted message to the distribution list address only if each of the one or more member addresses associated with the distribution list identifies a member for which a public key is available on the computing device. | 2013-01-24 |
20130024684 | ENHANCED APPROACH FOR TRANSMISSION CONTROL PROTOCOL AUTHENTICATION OPTION (TCP-AO) WITH KEY MANAGEMENT PROTOCOLS (KMPS) - A network element supports Transmission Control Protocol Authentication Option (TCP-AO) with a Key Management Protocol (KMP) to authenticate TCP segments over a TCP session. The network element negotiates multiple traffic keys to authenticate TCP segments over a TCP session with a peer network element, and protects the TCP session with the negotiated traffic keys. | 2013-01-24 |
20130024685 | PROVISIONING CREDENTIALS FOR EMBEDDED WIRELESS DEVICES - A system and method are used to connect an installed device to a local premise network, such as a home network provided by a router in the home. A user may use a host device, such as a mobile telephone that is already connected to the home network to provide the home network credentials to the installed device without having to enter the home network credentials manually into the installed device such as a thermostat. | 2013-01-24 |
20130024686 | SYSTEMS AND METHODS FOR SECURE COMMUNICATION USING A COMMUNICATION ENCRYPTION BIOS BASED UPON A MESSAGE SPECIFIC IDENTIFIER - An apparatus and methods of securely communicating a message between a first device and a second device using a message specific identifier is disclosed. The method begins by receiving an encryption key request from a sending device, where the encryption key request is based upon the message specific identifier, which is associated with a plurality of attributes associated with the message and the sending device. In more detail, the message specific identifier may be an information-based indicator that is unique with respect to the message and the sending device. The method parses the encryption key request and the message specific identifier to provide an intermediate argument used to enter a current random character set that is periodically generated and stored into memory. The intermediate argument helps identify which type of encryption method is desired for use in encryption key generation. An encryption key is constructed using the intermediate argument as an entry point to the current random character set. A data structure is stored associated with the message specific identifier, a random character set identifier for the current random character set, and an identifier of the encryption method used before the key is transmitted back to the device. | 2013-01-24 |
20130024687 | SELECTIVE SHREDDING IN A DEDUPLICATION SYSTEM - Making a target file impractical to be retrieved comprises decrypting a directory manager file using a first directory manager file key. The directory manager file includes an encryption key for a segment that is used when reconstructing a target file. The directory manager file is modified by deleting a reference to the target file. The reference includes a file encryption key. Retrieving the target file is made impractical by the deletion of the reference to the target file in the directory manager file. The modified directory manager file is encrypted using a second directory manager file key. | 2013-01-24 |
20130024688 | METHODS OF PROVIDING AN INTEGRATED AND MUTUAL AUTHENTICATION IN A COMMUNICATION NETWORK - A service ticket request is transmitted to a key distribution center in response to providing the security credential. In response to the transmitting, a session key encrypted with a TGT session key shared between a SIP client and a Kerberos authentication server, and a service ticket encrypted with a SIP service key shared between a SIP server and the Kerberos authentication server are received. The service ticket includes the session key. The session key, encrypted with the SIP session key shared between the SIP client and the Kerberos authentication server, is decrypted by the SIP client. The service ticket is transmitted to a SIP server. The SIP server decrypts the service ticket using the SIP service key shared between the SIP server and the Kerberos authentication server and stores the session key. The session key is utilized for mutual digest authentication between the SIP client and the SIP server. | 2013-01-24 |
20130024689 | Method and System for Providing Secret-Less Application Framework - In one embodiment, providing, by a client device, device information and key data over a network to a server device, the device information uniquely identifying the client device; generating a device key, by a device key generation logic, at the server device based on the device information; receiving a module from the server device, the module comprising a bound content key and the device key generation logic, wherein the bound content key is encrypted by the device key at the server device; and processing protected content using the module. | 2013-01-24 |
20130024690 | CENTRALIZED SERVICE FOR DISTRIBUTED SERVICE DEPLOYMENTS - A centralized service communicatively links an application provider to a plurality of different message forwarding services. The centralized service receives a request and authenticates the application provider associated with the request. Further, the centralized service delivers a message embodied by the request to a first message forwarding service with a first protocol and/or to a second message forwarding service with a second protocol different than the first protocol. | 2013-01-24 |
20130024691 | Method and Apparatus for Securing Communication Between a Mobile Node and a Network - In accordance with the teachings of the present invention, a method and apparatus is presented for securely negotiating a session key between a mobile node and a network node, such as a first hop IP router. A session key is encoded using asymmetric encryption. The encrypted session key is then communicated to the first hop IP router for later use. In accordance with another teaching of the present invention, the session key is then used by the mobile node and a first hop IP router to authenticate a message. Lastly, in accordance with the third teaching of the present invention, a standardized protocol is used to securely negotiate the session key between the mobile node and the first hop IP router. | 2013-01-24 |
20130024692 | METHOD AND APPARATUS FOR LOCAL AREA NETWORKS - A mechanism for segregating traffic amongst STAs that are associated with a bridge, referred to herein as the personal virtual bridged local area network (personal VLAN), is based upon the use of a VLAN to segregate traffic. The IEEE 802.1Q-1998 (virtual bridged LANs) protocol provides a mechanism that is extended by the invention to partition a LAN segment logically into multiple VLANs. In the preferred embodiment, a VLAN bridge forwards unicast and group frames only to those ports that serve the VLAN to which the frames belong. One embodiment of the invention extends the standard VLAN bridge model to provide a mechanism that is suitable for use within an AP. In a preferred embodiment, the Personal VLAN bridge extends the standard VLAN bridge in at least any of the following ways: VLAN discovery in which a personal VLAN bridge provides a protocol for VLAN discovery; VLAN extension in which a Personal VLAN allows a station to create a new port that serves a new VLAN, or to join an existing VLAN via an authentication protocol; Logical ports in which a Personal VLAN bridge can maintain more than one logical port per physical port, and bridges between ports of any kind; and cryptographic VLAN separation. | 2013-01-24 |
20130024693 | Network Reputation System And Its Controlling Method Thereof - A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds with an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee. | 2013-01-24 |
20130024694 | TRANSACTION AUDITING FOR DATA SECURITY DEVICES - Data security devices are provided which store user data and interact with terminal devices to provide information about the stored user data. Security device has memory for storing user data, an interface for transmission of data communications connectable to a data communications network, and a controller. The controller processes a request from the terminal device for information about said user data by first generating a message. The message is generated to permit verification, using secret data, that the message was generated by the controller. The controller sends the message to the terminal device for communication to a publication entity for publication of the message. The controller then receives from the terminal device a cryptographic construction. The controller checks validity of the cryptographic construction for said message, and subsequent supply of the information requested about the user data to the terminal device is then dependent on said cryptographic construction. | 2013-01-24 |
20130024695 | MECHANISM AND METHOD FOR MANAGING CREDENTIALS ON IOS BASED OPERATING SYSTEM - A mechanism and method for managing credentials on an electronic device configured with an iOS based operating system. The iOS based device includes a “keychain” configured in device memory. According to an embodiment, the electronic device comprises an application configured to generate a public certificate object in the keychain and a password object in the keychain. The public certificate object is configured to store a public certificate, and the password object is configured to store a private key. The password object further includes a label or thumbprint for associating the private key with the corresponding public certificate. According to an embodiment, the application stores the private key in an encrypted container in the password object to provide an additional layer of security. The application is configured to unlock the encrypted container utilizing a password provided the user. According to a further aspect, the user password is not stored in memory on the device. According to an embodiment, the private key is generated and provided by a credential management system operatively coupled to the electronic device for digitally signing an email message. | 2013-01-24 |
20130024696 | METHOD AND APPARATUS FOR FLASH UPDATES WITH SECURE FLASH - Firmware updates are performed in a digital device that includes a secure flash that secures each block of stored data with a digital signature. In at least one embodiment, the update package that is received by the digital device for use in performing the update includes the digital signatures of blocks to be updated in the flash. In other embodiments, the digital signatures are generated within the digital device after an update package has been received. | 2013-01-24 |
20130024697 | SYSTEM AND METHOD FOR OBFUSCATION INITIATION VALUES OF A CRYPTOGRAPHY PROTOCOL - A computer-implemented technique for determining whether a first computing device has the correct version of a software program may be used to provide a secure approach to verifying that a client computing device has a secure and approved version of content player software implemented for consuming downloaded copyright media content. With this technique, copyright media content providers are able to ensure that only secure and approved content players are implemented to access the content. | 2013-01-24 |
20130024698 | DIGITAL CONTENT MANAGEMENT SYSTEM, DEVICE, PROGRAM AND METHOD - A digital content management system ( | 2013-01-24 |
20130024699 | System and Method for Protecting Cryptographic Assets From a White-Box Attack - A digital signature generation (DSG) process which provides resistance against white box attackers is disclosed. This is done by applying specially selected data transformations to the inputs, outputs and internal parameters of the algorithm. In particular, the signatory's private key does not appear in the clear in our protected implementation. Our new white box implementation produces signatures that are compatible with signatures created by conventional implementations; thus our solution facilitates interoperability and can be used as a drop-in replacement for conventional implementations. In particular, we describe transformations to the key (d) and the generator domain parameter (usually denoted G or g) of the digital signature generation processes, such that embodiments of the invention can produce signed messages which appear to a verifier as if the key (d) was used, without actually ever using the key (d). This makes it impossible for an adversary to ever observe the key (d), as it is not actually used. Further embodiments include additional protections to make it even harder for an adversary to deduce the key (d) by observing the process which generates the digital signature. | 2013-01-24 |
20130024700 | SYSTEM AND METHOD FOR MANIPULATING AND MANAGING COMPUTER ARCHIVE FILES - Certain embodiments of the present invention provide an archive management application that operates within a host application to provide access to an archive and/or allow access to and/or modification of files in an archive using the host application's interface, instead of operating as a separate standalone archive management application. In an embodiment of the present invention, a file archiving system may include a user interface component, a file management component and a compression/extraction engine component. The user interface component may include an enhanced user interface of a host application that provides an interface for a user. The file management component may include a central directory that provides a representation of the contents of an archive. The compression/extraction engine component may include a file size module and/or a security module. The security module may be used to encrypt, decrypt, digitally sign and/or authenticate a file in an archive. | 2013-01-24 |
20130024701 | METHOD AND SYSTEM FOR MANAGING AN ENCRYPTION KEY FOR A BROADCASTING SERVICE - A system and method for managing an encryption key are provided, which include receiving, from a DRM agent, an RO request message for receiving content; generating a KSP including a first key and a second key; applying hash chains with different directions to the first key and to the second key to generate an encryption key for the content; and transmitting, to the DRM agent, a response message including a context element having an identifier of the content and a key information element. The key information element includes a first encryption key element; a rights encryption key information element; and an encryption data element. | 2013-01-24 |
20130024702 | CONNECTING MODULE FOR COUPLING OUTPUT ENDS OF A HOST DEVICE TO AN EXTERNAL STORAGE DEVICE AND METHOD THEREOF - A connecting module includes a plurality of input ends and an output end. The output end of the connecting module is coupled to an external storage device. When at least two input ends of the connecting module are coupled to corresponding output ends of the host device, the connecting module outputs power supplied by the host device to the external storage device via the plurality of input ends. This way, the connecting module outputs power to the external device when at least two input ends of the connecting module are coupled to the host device, for ensuring the external storage device to receive sufficient power at the instant the external storage device receives power. | 2013-01-24 |
20130024703 | POWER DOCKING STATION AND UNIVERSAL TRANSMISSION INTERFACE - A power docking station includes at least one first interface, for connecting to a data transmission interface; at least one second interface, for connecting to a power transmission interface; and an interface control module, coupled to the at least one first interface and the at least one second interface, for allotting power which is transmitted to the first and the second interface. | 2013-01-24 |
20130024704 | METHOD AND SYSTEM FOR ENHANCING COMPUTER PERIPHERAL SAFETY - A method and system for enhancing computer peripheral safety are configured to monitor and/or isolate alternating current (A.C.) supplies with and/or from any peripheral subsystems or devices. An exemplary method and system comprises an A.C. supply, a host computer system, and a peripheral subsystem or device connected to the host computer system, such as an ultrasound imaging and/or therapy peripheral, and an isolation subsystem configured for monitoring and/or isolating the A.C. supply from the peripheral subsystem or device. In accordance with an exemplary embodiment, an isolation subsystem comprises application software and associated modules and functions that when executed continuously monitors and/or polls the host computer's hardware and/or operating system for the presence of an isolated source, such as a battery, or an unisolated power source, such as through a battery charger and/or other connection path to the A.C. main supply. | 2013-01-24 |
20130024705 | VIRTUAL COMPUTER SYSTEM, DEVICE SHARING CONTROL METHOD, COMPUTER-READABLE RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A total power saving controller AA | 2013-01-24 |
20130024706 | POWER SAVE PROXY IN COMMUNICATION NETWORKS - Power save proxy functionality can be implemented to enable power save devices to switch to a power save mode and still receive communications from legacy communication devices. A first communication device determines that a second communication device is in a power save mode. The first communication device designates itself as a power save proxy for the second communication device that is in the power save mode. In response to detecting packets that are transmitted from a legacy communication device to the second communication device, the first communication device transmits a control message to the second communication device to request the second communication device to exit the power save mode, transmits a hold control message to the legacy communication device to request the legacy communication device to temporarily stop transmitting packets to the second communication device, or stores the packets intended for the second communication device. | 2013-01-24 |
20130024707 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD - An information processing apparatus | 2013-01-24 |
20130024708 | POWER CAPPING USING C-STATES - An example system includes a power capping controller to assert an output based on exceeding a power threshold for a computer system. A central processing unit (CPU) core is provided to enter a low-power C-state based on the output being asserted via a control path that bypasses an operating system command. | 2013-01-24 |
20130024709 | DISPLAY DEVICE, HOST DEVICE, DISPLAY SYSTEM, METHODS OF CONTROLLING THE DISPLAY DEVICE, THE HOST DEVICE, AND THE DISPLAY SYSTEM - A display device is provided that includes a display unit; a communication interface unit which communicates with the host device; a signal generation unit which generates a power save mode switching signal for switching the host device to a power save mode; and a control unit which controls the power save mode switching signal to be generated by the signal generation unit and transmitted to the host device in response to an input source currently being output from the host device to the display unit being switched from being output from the host device to being output from another device to the display device. | 2013-01-24 |
20130024710 | SYSTEM AND METHOD FOR MANAGING ENERGY CONSUMPTION IN A COMPUTE ENVIRONMENT - A system and method for reducing power consumption in clusters, grids, on-demand centers, etc. These principles can reduce both direct and indirect power consumption while maintaining either full cluster performance or adequate SLA based cluster performance. The method includes receiving at least one state data point regarding power consumption or temperature of at least one resource within the compute environment. Using intelligent policies to control power consumption, the method implements and interfaces with power managements facilities within the cluster, grid or on-demand center to implement policies, make dynamic changes, make predictions or actions, etc., to reduce the direct or indirect power consumption associated with a compute environment. Methods can include analysis of current workload and/or future workload in taking energy saving actions, and also involve reporting state information and updating algorithms based on historical experience or outside sources of information. | 2013-01-24 |
20130024711 | HOST APPARATUS AND INFORMATION PROCESSING SYSTEM USING THE SAME - In an information processing system, a host apparatus and a device are communicatively connected such that the host apparatus serves as a master and the device serves as a slave. The device is configured to establish a power-saving mode, when any command is not received from the host apparatus for a prescribed time period. A device driver is provided in the host apparatus. The device driver is configured to transit from a normal state to a suspended state when an operation command for operating the device is not received from an application running in the host apparatus for a prescribed time period, and to transmit a dummy response to the application, when an inquiry command is received from the application while the device driver is placed in the suspended state, without notifying the inquiry command to the device. | 2013-01-24 |
20130024712 | Device and Method for Operating Memory Cards - Embodiments in accordance with the present invention provide devices and methods for operating two memory cards. In one embodiment, an electronic device includes a host controller, a first socket in communication with the host controller, for receiving a first memory card and a second socket, and a second socket in communication with the host controller, for receiving a second memory card. The physical pin arrangement of the second socket is in an order reversed from the physical pin arrangement of the first socket. The host controller transmits power to the first memory card and cuts off power to the second memory card during a first time period, and cuts off power to the first memory card and transmits power to the second memory card during a second time period. The first socket and the second socket transmit and receive same set of data signals. | 2013-01-24 |
20130024713 | DYNAMIC WEIGHT CALCULATION IN A DIGITAL POWER ESTIMATION AND MANAGEMENT SYSTEM - A system includes a power management unit that may be configured to estimate the power consumed by at least a portion of each of one or more processor cores during operation of each processor core. The power management unit may be configured to generate a sum of activity values and normal weight factor values for a predetermined set of signals within each processor core to estimate the power consumed. The power management unit may also be configured to adaptively generate and selectively use new weight factor values to estimate the power consumed based upon a total measured dynamic power consumed by each processor core during operation. | 2013-01-24 |
20130024714 | POWER MEASUREMENT DEVICE - A device to measure power consumption includes a processor connected to a central processing unit (CPU) and a memory module, a switch for setting the power measurement device to measure either the power supplied to the CPU or the power supplied to the memory, and a display to show the results of such measurements. | 2013-01-24 |
20130024715 | Thermal Protection Method for Computer System and Device Thereof - A thermal protection method for a computer system including at least a processor includes monitoring the temperature and loading of the processor via a system firmware in the computer system, obtaining the current performance state level and at least an operable performance state levels of the processor when the system firmware determines that the temperature and loading of the processor exceeds a predetermined value respectively, wherein the performance state level is associated to the frequency of the processor, and setting the processor to one of the operable performance state levels, wherein the frequency of the performance state level is lower than the frequency of the current performance state level, according to the current performance state level and the operable performance state levels. | 2013-01-24 |
20130024716 | STORING EVENT DATA AND A TIME VALUE IN MEMORY WITH AN EVENT LOGGING MODULE - Example embodiments disclosed herein relate to storing event data and a time value in memory with an event logging module. Example embodiments of the event logging module include event command storage, clock command storage, and memory command storage. | 2013-01-24 |
20130024717 | Double Data Rate Output Circuit and Method - A synchronization circuit for re-synchronizing data from an input clock to an output clock is presented. The first transparent latch receives data synchronized to an input clock. A second transparent latch receives data from the first transparent latch and outputs data dependent on a delayed output clock which is the output clock delayed by an insertion delay. An output latch receives data from the second transparent latch and synchronizes data to the output clock. | 2013-01-24 |
20130024718 | Multiple Node/Virtual Input/Output (I/O) Server (VIOS) Failure Recovery in Clustered Partition Mobility - A method utilizes cluster-awareness to effectively support a live partition mobility (LPM) event and provide recovery from node failure within a Virtual Input/Output (I/O) Server (VIOS) cluster. An LPM utility creates a monitoring thread on a first VIOS on initiation of a corresponding LPM event. The monitoring thread tracks a status of an LPM and records status information in the mobility table of a database. The LPM utility creates other monitoring threads on other VIOSes running on the (same) source server. If the first VIOS VIOS sustains one of multiple failures, the LPM utility provides notification to other functioning nodes/VIOSes. The LPM utility enables a functioning monitoring thread to update the LPM status. In particular, a last monitoring thread may perform cleanup/update operations within the database based on an indication that there are nodes on the first server that are in failed state. | 2013-01-24 |
20130024719 | SYSTEM AND METHOD FOR PROCESSING NETWORK DATA OF A SERVER - In a system and method for processing network data of a server, the server includes a timer, a switch and a storage system. The server determines whether the storage system includes overtime information of the timer when server is powered on. If the storage system includes the overtime information, the overtime information is deleted. If an operating system is started, a predetermined initial value is written into the timer to start timing, and a first network port and a second network port are disconnected through the switch. If the server works normally, a predetermined reset command is sent to the timer to reset the timer at regular intervals. If the server does not work normally, the first network port and the second network port are connected through the switch. If the timer times out, the overtime information is written into the storage system. | 2013-01-24 |
20130024720 | Creation of Highly Available Pseudo-Clone Standby Servers for Rapid Failover Provisioning - Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed. | 2013-01-24 |
20130024721 | CONTROL COMPUTER SYSTEM, METHOD FOR CONTROLLING A CONTROL COMPUTER SYSTEM, AND USE OF A CONTROL COMPUTER SYSTEM - A control computer system comprising at least two modules ( | 2013-01-24 |
20130024722 | VIRTUAL DISK REPLICATION USING LOG FILES - Techniques involving replication of virtual machines at a target site are described. One representative technique includes an apparatus including a virtual machine configured to provide storage access requests targeting a virtual disk. A storage request processing module is coupled to the virtual machine to receive the storage access requests and update the virtual disk as directed by the storage access requests. A replication management module is coupled to the virtual machine to receive the storage access requests in parallel with the storage request processing module, and to store information associated with the storage access requests in a log file(s). The log file may be transferred to a destination as a recovery replica of at least a portion of the virtual disk. | 2013-01-24 |
20130024723 | DISK STORAGE SYSTEM WITH TWO DISKS PER SLOT AND METHOD OF OPERATION THEREOF - A method of operation of a disk storage system includes: providing a disk storage controller; coupling a storage carrier, having a first physical disk and a second physical disk, to the disk storage controller; detecting a failure of the first physical disk; writing a non-volatile memory to show the second physical disk is unavailable when the storage carrier is de-coupled from the disk storage controller; and logging a first written stripe in the non-volatile memory for update when the second physical disk is not available including updating only the written stripe in the second physical disk when the storage carrier is again coupled to the disk storage controller. | 2013-01-24 |
20130024724 | PROCESSOR AND METHOD OF CONTROLLING EXECUTION OF PROCESSES - A processor includes a plurality of processing sections, each of which executes a predetermined process. A plurality of fault detecting circuits are respectively provided for the plurality of processing sections, to detect a fault in one of the plurality of processing sections as a fault processing section to generate a fault detection signal. A fault monitoring and control section controls a normal processing section as at least one of the plurality of processing sections other than the fault processing section to execute a relieving process in response to the fault detection signal. The relieving process is determined based on a process load of the fault processing section, a process load of the normal processing section, and priority levels of processes to be executed by the fault processing section and the normal processing section. | 2013-01-24 |
20130024725 | OUT OF ORDER MILLICODE CONTROL OPERATION - Instructions within a processor are managed by receiving, at a recovery unit of the processor, an instruction that modifies a control register residing within the recovery unit. The recovery unit receives a first set of data associated with the instruction from a general register. A second set of data associated with the instruction is retrieved from the control register by the recovery unit. The recovery unit performs at least one binary logic operation on the first set of data and the second data. | 2013-01-24 |
20130024726 | SYSTEM AND METHOD FOR REMOVABLE NETWORK ATTACHED STORAGE ENABLING SYSTEM RECOVERY FROM BACKUP - A system and method for enabling recovery from backup is disclosed. The removable system may include a processor, a memory, a network interface, a backup management module configured to backup data associated with an information handling system communicatively coupled together. The system may be further configured to boot and restore data associated with the information handling system to which the memory is locally attached. The method may include copying data from an information handling system via the network to memory. The method may further include booting and restoring copied data to the information handling system from the locally attached memory. The system and method may further include an article of manufacture including a computer-readable medium and computer-executable instructions operable to copy data, determine the identity of, boot and restore copied data to an information handling system. | 2013-01-24 |
20130024727 | METHOD FOR AUTOMATICALLY RELOADING SOFTWARE AND A DEVICE FOR AUTOMATICALLY RELOADING SOFTWARE - Method for automatically reloading software characterized in that it comprises: a step of detecting corruption (E | 2013-01-24 |
20130024728 | Reinstatement of database systems in an automatic failover configuration - Techniques used in an automatic failover configuration having a primary database system, a standby database system, and an observer. In the automatic failover configuration, the primary database system remains available even in the absence of both the standby and the observer as long as the standby and the observer become absent sequentially. The failover configuration may use asynchronous transfer modes to transfer redo to the standby and permits automatic failover only when the observer is present and the failover will not result in data loss due to the asynchronous transfer mode beyond a specified maximum. The database systems and the observer have copies of failover configuration state and the techniques include techniques for propagating the most recent version of the state among the databases and the observer and techniques for using carefully-ordered writes to ensure that state changes are propagated in a fashion which prevents divergence. | 2013-01-24 |
20130024729 | OPTIMIZING SYSTEM USAGE WHEN RUNNING QUALITY TESTS IN A VIRTUAL MACHINE ENVIRONMENT - In one embodiment, a digital asset testing system | 2013-01-24 |
20130024730 | DISK CONTROL APPARATUS, METHOD OF DETECTING FAILURE OF DISK APPARATUS, AND RECORDING MEDIUM FOR DISK DIAGNOSIS PROGRAM - A disk control apparatus includes a processor, and a memory coupled to the processor in which executes a process as follows. The process includes diagnosing whether or not a failure has occurred on each of a plurality of disk apparatuses, determining, when the failure has occurred, whether or not the failure is a pre-defined failure, and excluding from diagnosis targets, when the failure is the pre-defined failure, a disk apparatus group included in a RAID together with a failed disk apparatus that is determined to have the pre-defined failure in the plurality of disk apparatuses. | 2013-01-24 |
20130024731 | REAL TIME MONITORING OF COMPUTER FOR DETERMINING SPEED AND ENERGY CONSUMPTION OF VARIOUS PROCESSES - The presently disclosed subject matter includes a system and method which enable to identify one or more causes for excessive energy consumption in a computer executing one or more processes. Information indicating that consumption of a computer-resource of at least one of said processes is greater than a predefined threshold is obtained and one or more threads of said at least one process which are in running state are identified. Thread performance information of at least one thread in running state is collected and used for identifying one or more functions that are the cause for said state of the respective thread. The identified functions are associated with their respective modules in order to identify one or more modules of said process, which are the cause for said excessive energy consumption. | 2013-01-24 |
20130024732 | Protecting Storage Fabrics from Errant Device Causing Single Point of Failure - A mechanism is provided for protecting storage fabrics from an errant device causing a single point of failure. The mechanism identities a source of the out-of-context traffic, isolates the TAG to prevent further catastrophe, and ensures that device isolation control operations are processed timely allowing device isolation and removing the source of the issue. Should device isolation not solve the issue, the mechanism allows the host to use a binary search method to isolate the device that may be hiding its true identity and sourcing possibly malicious traffic. | 2013-01-24 |
20130024733 | Semiconductor Device and Method for Tracing a Memory of a Semiconductor Device - An embodiment of the invention provides a memory on a semiconductor device that has a plurality of memory areas where each memory area has a plurality of consecutive bits. Further, the semiconductor device includes a tag memory having a plurality of trace tags, each trace tag including at least one bit. Each memory area of the memory is mapped to a trace tag that indicates whether the respective memory area is selected for tracing or not. Each memory area and the assigned trace tag are read out and address of the memory area is forwarded to a trace module when an assigned trace tag indicates that the memory area is selected for tracing. When the assigned trace tag indicates that the memory area is not selected for tracing, data and address is discarded. | 2013-01-24 |
20130024734 | STORAGE CONTROL APPARATUS AND CONTROL METHOD OF STORAGE CONTROL APPARATUS - [This invention] inhibits the response time of the storage control apparatus from being longer even if the response time of the storage apparatus is long. | 2013-01-24 |
20130024735 | SOLID-STATE MEMORY-BASED STORAGE METHOD AND DEVICE WITH LOW ERROR RATE - Non-volatile solid-state memory-based storage devices and methods of operating the storage devices to have low initial error rates. The storage devices and methods use bit error rate comparison of duplicate writes to one or more non-volatile memory devices. The data set with a lower bit error rate as determined during verification is maintained, whereas data sets with higher bit error rates are discarded. A threshold of bit error rates can be used to trigger the duplication of data for bit error comparison. | 2013-01-24 |
20130024736 | PROGRAMMING ERROR CORRECTION CODE INTO A SOLID STATE MEMORY DEVICE WITH VARYING BITS PER CELL - Memory devices that, in a particular embodiment, receive and transmit analog data signals representative of bit patterns of two or more bits such as to facilitate increases in data transfer rates relative to devices communicating data signals indicative of individual bits. Programming error correction code (ECC) and metadata into such memory devices includes storing the ECC and metadata at different bit levels per cell based on an actual error rate of the cells. The ECC and metadata can be stored with the data block at a different bit level than the data block. If the area of memory in which the block of data is stored does not support the desired reliability for the ECC and metadata at a particular bit level, the ECC and metadata can be stored in other areas of the memory array at different bit levels. | 2013-01-24 |
20130024737 | TEST ACCESS ARCHITECTURE FOR TSV-BASED 3D STACKED ICS - A test access architecture is disclosed for 3D-SICs that allows for both pre-bond die testing and post-bond stack testing. The test access architecture is based on a modular test approach, in which the various dies, their embedded IP cores, the inter-die TSV-based interconnects, and the external I/Os can be tested as separate units to allow optimization of the 3D-SIC test flow. The architecture builds on and reuses existing design for test (DfT) hardware at the core, die, and product level. Test access is provided to an individual die stack via a test structure called a wrapper unit. | 2013-01-24 |
20130024738 | METHOD AND APPARATUS FOR DEVICE ACCESS PORT SELECTION - The disclosure describes a novel method and apparatuses for allowing a controller to select and access different types of access ports in a device. The selecting and accessing of the access ports is achieved using only the dedicated TDI, TMS, TCK, and TDO signal terminals of the device. The selecting and accessing of device access ports can be achieved when a single device is connected to the controller, when multiple devices are placed in a daisy-chain arrangement and connected to the controller, or when multiple devices are placed in a addressable parallel arrangement and connected to the controller. Additional embodiments are also provided and described in the disclosure. | 2013-01-24 |
20130024739 | SELECTIVELY ACCESSING TEST ACCESS PORTS IN A MULTIPLE TEST ACCESS PORT ENVIRONMENT - A TAP linking module ( | 2013-01-24 |
20130024740 | Systems and Methods for Mitigating Stubborn Errors in a Data Processing System - Various embodiments of the present invention provide data processing circuits that include: a data detector circuit, a data decoder circuit, and a modification circuit. The data detector circuit is operable to apply a data detection algorithm to a data input to yield a detected output. The data decoder circuit is operable to apply a data decode algorithm to a decode input to yield a decoded output. The decode input is selected between at least the detected output, and a modified version of the detected output. The modification circuit is operable to receive the detected output and to provide the modified version of the detected output. | 2013-01-24 |
20130024741 | DATA PROCESSING METHOD, DATA PROCESSING SYSTEM, AND RECEIVER - The present invention provides a data processing method, a data processing system and a receiver. The method includes: performing optical-to-electrical conversion processing on a received current optical data signal, to generate a current electric data signal; performing analog-digital conversion processing on the current electric data signal, to generate a current data block; performing equalization processing on the current data block according to a previous second output data block, to generate a current first output data block, where the previous second output data block is generated by performing forward error correction decoding processing on a previous first output data block, and the previous first output data block is generated by performing equalization processing on a previous data block of the current data block; and performing forward error correction decoding processing on the current first output data block, to generate a current second output data block. | 2013-01-24 |
20130024742 | ERROR CORRECTION FOR FLASH MEMORY - Providing for single and multi-bit error correction of electronic memory is described herein. As an example, error correction can be accomplished by establishing a suspect region between bit level distributions of a set of analyzed memory cells. The suspect region can define potential error bits for the distributions. If a bit error is detected for the distributions, error correction can first be applied to the potential error bits in the suspect region. By identifying suspected error bits and limiting initial error correction to such identified bits, complexities involved in applying error correction to all bits of the distributions can be mitigated or avoided, improving efficiency of bit error corrections for electronic memory. | 2013-01-24 |
20130024743 | SYSTEMS AND METHODS OF STORING DATA - A method of reading data in a data storage device with a controller and a memory includes generating, in the memory, a set of bits corresponding to a particular storage element of the memory. The set of bits indicates a group of threshold voltage intervals. A threshold voltage of the particular storage element corresponds to one of the threshold voltage intervals within the group. At least one threshold voltage interval within the group is separated from another threshold voltage interval within the group by an intervening threshold voltage interval that is not within the group. The method also includes sending the set of bits to the controller. The set of bits includes a first hard bit that corresponds to a value read from the particular storage element and a first soft bit that corresponds to a reliability measure. | 2013-01-24 |
20130024744 | NONVOLATILE SEMICONDUCTOR MEMORY AND MEMORY SYSTEM - A nonvolatile semiconductor memory outputs the first parity flag corresponding to the error-corrected read data from the second input/output pin in synchronization with the error-corrected read data in the data buffer outputted from the first input/output pin. | 2013-01-24 |
20130024745 | MEMORY-EFFICIENT LDPC DECODING - To decode a representation of a codeword that encodes K information bits as N>K codeword bits, messages are exchanged between N bit nodes and N−K check nodes of a graph in which E edges connect the bit nodes and the check nodes. While messages are exchanged, fewer than E of the messages are stored, and/or fewer than N soft estimates of the codeword bits are stored. In some embodiments, the messages are exchanged only within sub-graphs and between the sub-graphs and one or more external check nodes. While messages are exchanged, the largest number of stored messages is the number of edges in the sub-graph with the most edges plus the number of edges that connect the sub-graphs to the external check node(s), and/or the largest number of stored soft estimates is the number of bit nodes in the sub-graph with the most bit nodes. | 2013-01-24 |
20130024746 | SYSTEMS AND METHODS OF STORING DATA - A method of storing data includes receiving data including a first group of bits and a second group of bits and initiating a shaping encoding operation on the second group of bits to generate a third group of bits. The third group of bits has more bits than the second group of bits. The shaping encoding operation is configured to produce a non-uniform probability distribution of bit values in the third group of bits. The first group of bits and first error correction coding (ECC) parity bits corresponding to the first group of bits are stored to a first logical page that is within a physical page of a MLC memory and the third group of bits and second ECC parity bits corresponding to the third group of bits are stored to a second logical page that is within the physical page of the MLC memory. | 2013-01-24 |
20130024747 | SYSTEMS AND METHODS OF STORING DATA - A method of writing data includes receiving a data page to be stored in a data storage device and initiating an encode operation to encode the data page. The encode operation generates first encoded data and a first portion of the first encoded data is stored to the first physical page of the data storage device. The method includes initiating storage of a second portion of the first encoded data to a second physical page of the data storage device. The method also includes initiating a decode operation to recover the data page. The decode operation uses a representation of the first portion of the first encoded data that is read from the first physical page without using any data from the second physical page. | 2013-01-24 |
20130024748 | SYSTEMS AND METHODS OF STORING DATA - A method of writing data includes receiving data pages to be stored in a data storage device and generating codewords corresponding to the received data pages. The codewords are stored to physical pages of a first memory portion of the data storage device. A first portion of a particular codeword that corresponds to a particular data page is stored at a first physical page of the first memory portion. A second portion of the particular codeword is stored at a second physical page of the first memory portion. The codewords are copied from the physical pages of the first memory portion to a physical page of a second memory portion of the data storage device. | 2013-01-24 |
20130024749 | MULTILEVEL ENCODING WITH ERROR CORRECTION - Embodiments of the present disclosure provide methods, systems, and apparatuses related to multilevel encoding with error correction. In some embodiments, a plurality of bits may be encoded into a plurality of memory cells by responding to bits of the plurality of bits by changing the logic levels of corresponding groups of memory cells of the plurality of memory cells. Other embodiments may be described and claimed. | 2013-01-24 |
20130024750 | TRANSMISSION SYSTEM - When a first communication device receives a predetermined message from a second communication device via a third line (L | 2013-01-24 |
20130024751 | FLASH MEMORY CONTROLLER AND DATA READING METHOD - A data reading method is provided. The data reading method includes: utilizing a first sense voltage to read a data unit from a flash memory block; performing an error detection operation on the data unit and calculating an error polynomial according to a detection result; and determining whether the error polynomial conforms to a predetermined condition and deciding whether to perform read retry on the data unit according to a determining result. | 2013-01-24 |
20130024752 | MEMORY CELL SUPPLY VOLTAGE CONTROL BASED ON ERROR DETECTION - Described herein is an apparatus for adjusting a power supply level for a memory cell to improve stability of a memory unit. The apparatus comprises memory circuitry including memory cells, error detection circuitry to detect error in data stored by memory cells of the memory circuitry, and supply voltage control circuitry to increase supply voltage for one or more memory cells of the memory circuitry based at least in part on detected error. | 2013-01-24 |
20130024753 | DECODING DEVICE AND DECODING ORDER CONTROL METHOD - A decoding device that performs decoding of data transmitted from each of a plurality of users comprises an iterative decoding section that repeats decoding of the data until no error is detected in a result of decoding, an error detection section that performs error detection on the decoding result each time decoding is performed, and a decoding order control section that estimates with respect to each of the plurality of users a decoding completion time, which is a time period the time period required until no error is detected in the result of decoding of the data transmitted from the user, and that assigns priorities to the users in increasing order of the estimated decoding completion time. The iterative decoding section performs decoding of the data transmitted from the users for the users in descending order of the priorities. | 2013-01-24 |
20130024754 | Rich Web Page Generation - A system and method for generating a rich web page based at least in part on target data for third party content file is disclosed. The system comprises a targeting module and a graphic user interface module (“GUI module”). The targeting module determines the third party content file for the user generated content file based at least in part on social data describing a user activity. The targeting module retrieves the target data for the third party content file. The GUI module is communicatively coupled to the targeting module for receiving the retrieved target data from the targeting module. The GUI module generates a rich web page for the third party content file based at least in part on the retrieved target data. | 2013-01-24 |
20130024755 | NON-INTRUSIVE MEDIA LINKED AND EMBEDDED INFORMATION DELIVERY - A method for information delivery is disclosed. The method includes directing the display of a multimedia presentation in a first screen segment. The multimedia presentation is associated with a reference tag descriptive of an aspect thereof. An information link corresponding to the reference tag in a second screen segment is generated. The information link is contextually related to the multimedia presentation in accordance with the reference tag. Thereafter, a selection input of the information link is received from one of the viewers while mitigating obstruction of the displaying of the multimedia presentation. The selected information link and the identity of the viewer are associated as a marker. | 2013-01-24 |
20130024756 | METHOD AND APPARATUS FOR MULTI-EXPERIENCE METADATA TRANSLATION OF MEDIA CONTENT WITH METADATA - A method or apparatus that incorporates teachings of the present disclosure may include, for example, a method for retrieving a plurality of sensory information from an environment of a device. A digital representation of the environment of the device is identified corresponding to the plurality of sensory information from the environment of the device. A media presentation element of the device associated with media content of the device is identified. A user interface of the media presentation element is adapted to modify a presentation of the media content by the media presentation element of the device according to the digital representation of the environment of the device. Other embodiments are disclosed. | 2013-01-24 |
20130024757 | Template-Based Page Layout for Hosted Social Magazines - Page layout of content items from a variety of sources is performed. A content processing system queues content items, such as user-generated blogs, tweets, social networking status updates and other postings, received from a variety of sources. Each content item comprises one or more assets from one or more asset types. The asset types include text, images, and video. A page builder retrieves items from the queue and determines the item's size constraints. A template is selected from a template database to use as a layout for the items on a page; each template has a number of slots into which content can be placed. A layout module lays out the items into the slots of the selected template based on the respective size and aspect ratio constraints of the items, in order to build a page to serve a client device. | 2013-01-24 |
20130024758 | Linking Content Files - A system and method for linking content files is disclosed. The system comprises a targeting module, a link generation module and a graphic user interface module (GUI module). The targeting module determines a target content file based at least in part on an uploaded content file. The target content file comprises a long form content file. The link generation module is communicatively coupled to the targeting module for generating a link to the target content file. The GUI module is communicatively coupled to the targeting module and to the link generation module for generating a web page. The web page includes a playable version of the uploaded content file and the link to the target content file. | 2013-01-24 |
20130024759 | Shared Script Files in Multi-Tab Browser - A cloud-based server executes instances of a browser application responsive to requests from a plurality of user devices. The server interprets embedded code in a web document retrieved by a given browsing instance, and stores an intermediate representation of the embedded code in the web document in a dedicated memory resource associated with the given browsing instance. The server also stores the intermediate representation of an external file referenced by the web document in a shared memory resource such that the intermediate representation is accessible to the other browsing instances of the other user devices. | 2013-01-24 |
20130024760 | Personalized Dashboard Architecture - In an embodiment, a method of providing a personalized display of data is presented. In this method, an identity of each of multiple applications for displaying data is transmitted to a user device, such as, for example, a computer or mobile communication device. Selections of more than one of the multiple applications are received from the user device. Configuration data indicating the selected applications are generated and stored. A request for a presentation application is received from the user device. The presentation application is to display the data via execution of the selected applications. In response to the request, the presentation application is generated based on the configuration data, and includes the selected applications. The presentation application is then transmitted to the user device for execution. | 2013-01-24 |
20130024761 | SEMANTIC TAGGING OF USER-GENERATED CONTENT - A system includes presentation, within an application process, of data associated with a data space, reception of an annotation from a user during presentation of the data within the application process, and storage of the annotation in association with one or more semantic tags indicating the data space and the application process. The annotation may be indexed based on the one or more semantic tags for later retrieval. | 2013-01-24 |
20130024762 | METHODS AND SYSTEMS FOR ANNOTATION OF DIGITAL INFORMATION - Methods and system for performing annotation of digital information are provided. One method includes searching for items of interest using a search engine. Once the URIs associated with the item of interest are identified, a plurality of attributes are provided that may be associated with each URI. A user may provide the values for the attributes or the system may suggest values for the attributes based on information associated with each URI. Once the attributes and values are assigned, the annotated URI along with the attributes and values is stored. Another method provides for sharing of the annotated information. A user may communicate annotated information to an external storage system for sharing with other users having access to the external storage system. Another method provides for automatic updates of the annotation entries by periodically fetching the digital information associated with each URI and updating the values associated with each attribute. | 2013-01-24 |
20130024763 | UTILIZING A GRAPHICAL TRANSITION TO SORT AN INTERFACE ELEMENT INDEPENDENTLY OF A DOCUMENT OBJECT MODEL - One or more elements can be rendered within a canvas of an interface. The elements can be associated with an element attribute and an element data. The elements can be user interface elements. The elements can be associated with a document object model of a markup language document. The interface can be a Web browser. The elements can be visually sorted differently via a graphical transition effect. The transition effect can execute to sort the elements without modifying objects of the document object model, without changing the elements as specified in a mark document being rendered, and without changing the element data of the elements being sorted. | 2013-01-24 |
20130024764 | METHOD FOR TRANSFORMING WEB FROM 2D INTO 3D - A method for transforming a 2D webpage comprising html elements, into a 3D scene wherein the most interesting html elements for the user appear in the most visible places. To this end, an importance value is associated to each html element and the html element is located into the 3D scene based on location identification derived from the importance value associated to the html element. The importance value of an html element may be defined based on the amount of clicks made on the html element in the 3D scene. One or more avatars may be included into the 3D scene. The location identification may then be based on positions, movements and other actions, or on statistics thereof, of the avatars with respect to the html element in the 3D scene. | 2013-01-24 |
20130024765 | PROCESSING RICH TEXT DATA FOR STORING AS LEGACY DATA RECORDS IN A DATA STORAGE SYSTEM - A method, system and computer program product for storing rich text data that comprises identifying plain text and rich text attributes from the rich text data, wherein the rich text attributes specify richness features of the plain text, storing the plain text in a first legacy data record, and storing the rich text attributes in a second legacy data record prefixed by a token, wherein the token is recognizable by an application capable of applying the rich text attributes to the plain text to present the rich text data. | 2013-01-24 |
20130024766 | SYSTEM AND METHOD OF CONTEXT AWARE ADAPTION OF CONTENT FOR A MOBILE DEVICE - The invention relates to a system and method of context aware adaption of content for a mobile device. This involves identifying context parameters and associated values, selection of content layout based on context parameters. Content layout is selected from pre-configured content layouts based on context parameters. The content is retrieved from a content store. Content style is selected from pre-configured content styles based on context parameters. Rendering content on the device display based on the selected content layout, content style and at least one context parameter. | 2013-01-24 |
20130024767 | E-BOOK TERMINAL AND METHOD FOR SWITCHING A SCREEN - According to one embodiment, an electronic book (E-book) terminal comprising a touch screen and configured to switch a screen corresponding to content includes a display for displaying a user input area set to support an application for screen switching, and display a screen where page switching is performed depending on a user's manipulation made in the user input area, an input recognizer for recognizing an action command corresponding to the manipulation made on the touch screen in the user input area displayed on the display, and a controller for detecting a start page, a moving direction, and a moving distance based on the action command recognized by the input recognizer. The controller configured to display a page-switching screen from the start page to a target page determined based on the moving direction and the moving distance, and displaying the target page upon completion of moving of the page. | 2013-01-24 |
20130024768 | APPARATUS AND METHOD FOR PROVIDING SUMMARY INFORMATION IN ELECTRONIC BOOK SERVICE SYSTEM - An apparatus and a method for generating and providing summary information for an Electronic (E)-book depending on a user characteristic are provided. The method includes determining a number of levels of the summary information and a user characteristic for each level of the summary information; generating at least one summary information dataset corresponding to each level of the summary information; and combining the at least one summary information dataset with corresponding E-book data. | 2013-01-24 |
20130024769 | APPARATUS AND METHOD FOR PROCESSING A DOCUMENT - An authentication certificate server receives an acquisition request of a confidential document which specifies a URI of a disclosable document obtained by removing a confidential element from the confidential document, the authentication certificate server transmits an acquisition request of the disclosable document to a public server and specifies a dictionary file based on the URI, and if the user has an access authority to the confidential element, the authentication certificate server transmits an acquisition request of a dictionary file to a confidential server. When the authentication certificate server receives the dictionary file from the confidential server and receives the disclosable document from the public server, the authentication certificate server restores the confidential document by returning the confidential element at a position in the disclosable document which position is specified by the dictionary file, and then transmits the confidential document thus restored to the terminal device. | 2013-01-24 |
20130024770 | APPARATUS AND METHOD CAPABLE OF OUTPUTTING SPATIAL INFORMATION OF DEVICE COMPONENT - An apparatus that is capable of outputting spatial information of a device component is disclosed. The apparatus includes a storage unit, a processing unit, and an output unit. The storage unit stores a component model file. The processing unit receives an accessing command which includes a reference data of the device component. The processing unit reads the component model file corresponding to the reference data according to the accessing command, and the component model file is then outputted by the output unit. Specifically, the outputted component model file includes a two-dimensional (2D) paper-based image file, which could be folded into a corresponding three-dimensional (3D) model. It is worth noting that the size of 3D model is substantially equal to the actual size of the device component represented by the 3D model. | 2013-01-24 |
20130024771 | Systems and Methods for Providing and Managing Virtual Music Cards with Music Streaming Capability - Access to a virtual music card associated with a song and having a plurality of virtual sides, wherein at least one virtual side comprises an option for streaming the song, is provided to a user device. A selection of the option to stream the song is received from the user device, and an audio file of the song is streamed to the user device, in response to the selection of the option. The virtual music card may comprise a first virtual side showing an image of an artist associated with the song, and a second virtual side comprising an option to stream the song. The virtual music card may also comprise a third side showing an attribute associated with the artist, and a fourth side showing a graphic design. | 2013-01-24 |
20130024772 | COMPUTER-BASED DISPLAY PRESENTATION TIME MANAGEMENT SYSTEM - An interactive computer supported display system for managing the time allocation of presentation segments, such as individual slides. The presentation segments are each preassigned a presentation time duration and a warning time threshold for signaling the approach to the end of the preassigned time duration of each presentation segment. The actual presentation time used during presentation of each segment is compared to the preassigned time duration and warning threshold to issue warnings to the presenter and to carry forward any surplus or deficit time due to underrun or overrun of the preassigned time. The time surplus or deficit carried forward may be allocated by adding to or subtracting from the preassigned presentation times of subsequent presentation segments based upon a preassigned priority level assigned to each presentation segment. | 2013-01-24 |
20130024773 | SYSTEM AND METHOD FOR SUMMARIZING INTERACTIONS - The disclosed embodiment relates to methods for presenting information to a user in a concise manner. The method preferably comprises receiving information specifying at least one data characteristic and at least one presentation characteristic, wherein the at least one data characteristic relates to information desired by a user regarding data and the at least one presentation characteristic relates to the manner in which information is presented to the user, receiving a collection of data, identifying relevant data from the collection of data based on at least one of the data characteristics, condensing the relevant data into presentation data based on at least one of the presentation characteristics, and presenting the presentation data. The disclosed embodiment also relates to a system and computer-readable code that can be used to implement the exemplary methods. | 2013-01-24 |
20130024774 | METHOD AND APPARATUS FOR MULTI-EXPERIENCE ADAPTATION OF MEDIA CONTENT - A method or apparatus that incorporates teachings of the present disclosure may include, for example, a method for adapting media content of a source device for a recipient device. Characteristics of a first environment of a source device and of a second environment of a recipient can be identified. At least one difference between the characteristics of the first environment of the source device and the characteristics of the second environment of the recipient device can be determined. A presentation of media content can be modified according to the at least one difference between the characteristics of the first environment of the source device and the characteristics of the second environment of the recipient device. Other embodiments are disclosed. | 2013-01-24 |
20130024775 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus that controls a user interface to display content, acquires position information corresponding to an input received at the user interface, determines a condition corresponding to the position information, and controls the user interface to display data corresponding to the input based on a result of the determining. | 2013-01-24 |
20130024776 | OUTBOUND HUNT GROUPS - A system may include a communications device configured to select a contact from an address book, the contact including information descriptive of a user and including at least one address of the user. The communications device may be further configured to associate an outbound hunt group with the contact, the outbound hunt group configured to provide a list of addresses to be called in sequence to locate the user. | 2013-01-24 |
20130024777 | METHOD AND APPARATUS FOR TRIGGERING A REMOTE DATA ENTRY INTERFACE - Various methods triggering a remote data entry interface are provided. One example method includes receiving, at a device, a data entry field selection message notifying that data entry is desired, inhibiting a presentation of a data entry input interface on a display of the device, and causing a remote interface trigger message to be sent to a remote device to direct the remote device to present a remote data entry input interface on a display of the remote device. Similar and related example methods and example apparatuses are also provided. | 2013-01-24 |