05th week of 2009 patent applcation highlights part 61 |
Patent application number | Title | Published |
20090031124 | METHOD OF AND APPARATUS FOR INFORMING USER ABOUT SETTING STATE OF WAKE-ON-LAN FUNCTION - An apparatus for informing a user about a setting state of a Wake-on-LAN (WOL) function includes a WOL-setting determining module to determine a setting state of a WOL function of an information-processing device, and a WOL-setting display module to inform a user of the information-processing device about the setting state of the WOL function during a shutdown of a system of the information-processing device. | 2009-01-29 |
20090031125 | Method and Apparatus for Using a Third Party Authentication Server - A method and apparatus for a third party authentication server is described. The method includes receiving a record ID for a user, and a one-time key generated by the server and encrypted with a user's public key by the server. The method further includes receiving the user's authentication data from the client, and determining if the user's authentication data matches the record ID. If the authentication data matches the record ID, decrypting the one-time key with the user's private key, and returning the decrypted one-time key to the client. | 2009-01-29 |
20090031126 | Trust Management Systems and Methods - The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied. The certificates may be evaluated until the state of the root authority indicates that the request should be granted, or until further evaluation of the certificates is ineffective in changing the state of the principals. | 2009-01-29 |
20090031127 | Methods and systems for proofing identities using a certificate authority - A digital certificate is provided to a customer having an electronic account linked to the customer's physical address. Using the digital certificate, the customer performs electronic transactions with a third party. A proofing workstation receives a request from a third party to validate the digital certificate. The proofing workstation communicates with a proofing server that maintains a list of valid certificates and a list of revoked certificates. The proofing server sends a response to the proofing workstation, where it is received by the third party. | 2009-01-29 |
20090031128 | TRANSPARENT AWARE DATA TRANSFORMATION AT FILE SYSTEM LEVEL FOR EFFICIENT ENCRYPTION AND INTEGRITY VALIDATION OF NETWORK FILES - A mechanism for enabling efficient encryption and integrity validation of network files. When a request to read a file stored in a local network file system is received, the local network file system examines cryptographic attributes associated with the file to determine if the file is encrypted or integrity-verified. If the cryptographic attributes indicate the file is encrypted, the local network file system omits the encryption of the file by the local network file system prior to passing the file to the remote network file system. If the cryptographic attributes indicate the file is integrity-verified, the local network file system omits the integrity-verification of the file by the local network file system prior to passing the file to the remote network file system. The local network file system then transmits the file to the remote network file system. | 2009-01-29 |
20090031129 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF UNWANTED E-MAIL | 2009-01-29 |
20090031130 | SYSTEM, ASSOCIATED METHODS AND APPARATUS FOR SECURING PREFIX-SCOPED BINDING UPDATES - Route optimization between a mobile network and correspondent node may be achieved by having the mobile router of the mobile network sending prefix-scoped binding update messages to the correspondent node. In order to allow the recipient of a prefix-scoped binding update message to verify the mobile network prefix information contained in the said prefix-scoped binding update message, the present invention provides a system, and associated methods and apparatus thereof, of using special cryptographic certificates to prove the ownership of the network prefixes. The certificates, or parameters derived from the certificates, are transmitted alongside the network prefix in the binding update message sent to the correspondent node. By verifying the network prefix against the certificates, or parameters derived from the certificates, a correspondent node can determine the validity of a prefix-scoped binding update message. | 2009-01-29 |
20090031131 | Token-Based Management System for PKI Personalization Process - A system for token-based management of a PKI personalization process includes a token request and management system (TRMS) configured to gather request information from a requestor; and a token personalization system (TPS) configured to personalize a hardware token such that usage of the hardware token is constrained by the request information. A method for token-based management of a PKI personalization process includes: requesting a hardware token; personalizing a hardware token such that the hardware token is confined to operation within limiting parameters; binding the hardware token to a workstation which is configured receive the hardware token and use credentials within the hardware token to request and download PKI data from a PKI server, the workstation being further configured to personalize an end user product by loading the PKI data into internal memory contained within the end user product; and monitoring usage of the hardware token and the PKI data. | 2009-01-29 |
20090031132 | Apparatus And Method For Incorporating Signature Into Electronic Documents - There is presented a method and apparatus for incorporating digital signature to within a document for paper-less office. The method comprises generating the document to be signed on a computer and transferring it and displaying it on a device for incorporating digital signature wherein the device comprises a screen, signature means such as electronic pen or fingerprint capturing device, and et least one smart card reader. Then, the document is being digitally signed. The digitally signed document is being encrypted and transferred to the computer so as to prevent restoration of the digital signature. From the customer side, the procedure is based on “what you see is what you sign”. | 2009-01-29 |
20090031133 | METHOD AND SYSTEM FOR SCREENING AND AUTHORIZING CONTENT - Apparatus and method are disclosed for preventing the use of disapproved received electronic content on a Mobile Station. The apparatus and method may include modules for extracting and comparing fingerprints of the received content on the Mobile Station to fingerprints of disapproved content, and for the activation of an authorization process based on the results of the comparison, as well as on the decisions of the user whether to purchase authorization when it is required. A cryptography-based check-in procedure is introduced to assure that all content has passed the verification phase. | 2009-01-29 |
20090031134 | Digital watermarking with variable orientation and protocols - A method of digital watermarking selects a mapping of a digital watermark to audio or video content and an embedding gain to produce uniquely watermarked copies for distribution. The embedding method is implemented at points of distribution, including content servers or receivers. By applying varying mapping protocols and random gain, the digital watermark uniquely serializes copies. It also has a structure and embedding configuration that minimizes the effectiveness of collusion, averaging and over-embedding attacks. | 2009-01-29 |
20090031135 | Tamper Proof Seal For An Electronic Document - A method of generating a tamper proof seal | 2009-01-29 |
20090031136 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF UNWANTED E-MAIL | 2009-01-29 |
20090031137 | BLIND SIGNATURE METHOD AND ITS SYSTEM - Signature requestor terminal device ( | 2009-01-29 |
20090031138 | METHOD AND SYSTEM FOR AUTHENTICATION CONFIRMATION USING EXTENSIBLE AUTHENTICATION PROTOCOL - A method for secure and reliable authentication in a communication system. In an embodiment, the authentication method includes performing authentication of a user utilizing Extensible Authentication Protocol (EAP), and transmitting a result indication message to the user. The result indication message can include additional information for security and reliability. The method also includes receiving an acknowledgement message from the user. The acknowledgement message is sent by the user for confirming the reception of the result indication. In an embodiment, the method also includes retransmitting the result indication message if the acknowledgement message is not received within a predetermined time. The additional information for security and reliability can include Message Authentication Code (MAC) and time interval information. The additional information for security and reliability can also include a security/reliability flag. | 2009-01-29 |
20090031139 | System and Method for Electronic Certification and Authentification - The invention relates to electronic document security systems and in particular to user authentication and to the certification and secure transfer of sensitive document information of various type, like whole documents, certificates, signatures, stamps, etc., especially by verifying its correctness and safety/immunity from fraud. | 2009-01-29 |
20090031140 | METHODS FOR SECURE ENROLLMENT OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device. | 2009-01-29 |
20090031141 | COMPUTER PLATFORMS AND THEIR METHODS OF OPERATION - A computer platform ( | 2009-01-29 |
20090031142 | System, Method and Computer Program Product for Processing a Memory Page - A method for processing a memory page, the method includes: retrieving, in response to a request to provide a first memory page to a processor, first memory page metadata associated with first memory page address information; wherein the first memory page address information is stored in a memory page table; and performing a page operation in response to the memory page metadata; wherein the page operation is selected from a group consisting of compression, cryptography, searching a page for a virus signature, searching a page for digital right management signature, error correction code verification, error correction code addition. | 2009-01-29 |
20090031143 | Method and system for securing a disk key - In accordance with an embodiment of the present invention, a trusted client includes a non-volatile memory programmed with an encrypted disk key. The encrypted disk key in the non-volatile memory is encrypted with a master key of a security processor. Accordingly, encrypted data received by the central processor from a disk's security logic is forwarded to a security processor along with the encrypted disk key. The security processor decrypts the encrypted disk key and then decrypts the encrypted data, utilizing the disk key. The disk key is never available to the central processing unit in the clear. | 2009-01-29 |
20090031144 | REVOCATION MESSAGE CYCLING IN A DIGITAL TRANSMISSION CONTENT PROTECTION SYSTEM - In a digital Content Protection System (CPS), System Renewability Messages (SRM's) are managed at an administrative level to prioritize and select SRM's depending on transmission region and/or time. The highest-priority SRM's may be selected to fit in a receiver memory size specified by a CPS. SRM's may be cycled so that different subsets of the total set of SRM's are selected for highest priority use of limited storage capacity at different times, thereby extending the effectiveness of revocation beyond the otherwise limiting factor of SRM storage capacity. | 2009-01-29 |
20090031145 | DATA PROCESSING APPARATUS, DATA PROCESSING SYSTEM, AND CONTROL METHOD THEREFOR - A data processing apparatus capable of using, without change, a password used at the time of backup as a password at the time of restoration to thereby realize backup and restoration which are high in security and user-friendliness. Upon being backed up into an external storage medium, data stored in a box in the data processing apparatus and protected by password information is encrypted with an encryption key generated based on the password information and is stored into the external storage medium. Upon restoration of the encrypted data from the external storage medium to a multifunction peripheral, password information input by a user is set as a new password, and the data decrypted with a decryption key generated based on the password information is protected with the new password. | 2009-01-29 |
20090031146 | OBFUSCATED STATE STORE FOR RIGHTS MANAGEMENT SYSTEM AND THE LIKE - A state store having state information therein is stored on a computing device. Information at least nearly unique to the computing device is obtained, and a number of locations at which at least a portion of the state store is to be stored at is determined. Pseudo-random file names and corresponding paths are generated based at least in part on the obtained information, whereby the generated file names and corresponding paths are likewise at least nearly unique to the computing device, and the generated file names and path are paired to form the locations. Thereafter, the state store is stored according to the generated locations. | 2009-01-29 |
20090031147 | APPARATUS FOR WAKING UP A DEVICE - Apparatus for waking up a device having a power supply. The apparatus includes a receiver configured to receive a receive signal and an extractor configured to extract power from the receive signal. The apparatus further includes a deriver configured to derive wake up information from the receive signal, which is powered by the extracted power. Furthermore, the apparatus includes an effecter configured to effect a connection of the device to the power supply if the deriver derives the wake up information. | 2009-01-29 |
20090031148 | Distributed Electrical Power System for Computer Rooms - A scalable electrical power distribution system for air conditioned computer rooms has an uninterruptible power supply and at least one rack mounted power distribution unit to supply conditioned power to the critical loads. If the power demand of the rack mounted critical loads connected to any rack mounted power distribution unit exceeds the power rating of that unit, a further rack mounted power distribution unit may be placed in another cabinet so as to distribute conditioned electrical power to additional rack mounted critical loads. The power distribution system is scalable as to the number of rack mounted power distribution units that may be installed in the computer room; it reduces initial capital costs, and eliminates cable congestion below the raised floor of the computer room. | 2009-01-29 |
20090031149 | Storage subsystem and power supply system - The present invention includes a plurality of disk units for storing data from a host computer, a plurality of power supply apparatuses for supplying DC power to each of the disk units via main power supply wirings, and a redundant power supply apparatus for generating, with any one of the disk units among the plurality of disk units as a load, DC power to the load. As auxiliary power supply wirings for guiding the output of the redundant power supply apparatus to each of the disk units, a common power supply wiring that is common to each of the power supply apparatuses, a plurality of branch power supply wirings branching from the common power supply wiring and connected to each of the disk units, and a redundant power supply wiring for connecting the redundant power supply apparatus and the common power supply wiring are wired to a backboard. | 2009-01-29 |
20090031150 | Storage controller and method for controlling the same - A storage controller that can maintain its performance and reduce power consumption and thereby realize large capacity and low power consumption, and a method for controlling such a storage controller are provided. | 2009-01-29 |
20090031151 | INFORMATION TERMINAL DEVICE AND OPTION UNIT THEREFOR - According to one embodiment, there is provided an information terminal device which receives power via a communication cable from a power sourcing device recognizes a class identifying power-sourcing characteristics on the basis of response characteristics to a defined value voltage given in authentication and which is configured to connect an option unit. The information terminal device comprises a resistor unit which is disposed on a power sourcing line from the communication cable and configured to vary a resistor value, a control unit which recognizes a class of the information terminal device itself and sets a resistor value in order to achieve response characteristics corresponding to the recognized class, and a storing unit which stores the set resistor value. | 2009-01-29 |
20090031152 | METHOD FOR STARTING UP AT LEAST ONE FIELD DEVICE - Disclosed is a method for starting up of at least one first field instrument, wherein the method comprises the step of signaling a firs demand for electrical power output of the first field instrument over a first port to a supply unit. According to this method, the first field instrument is previously connected to the supply unit over the first port by means of a first communication connection. In addition, the reception of the power output is effected according to the first demand for power output by the first field instrument over the first communication connection and the first port, by which the first filed instrument is activated. In an additional step, a power usage unit of the first field instrument is assigned to the first port, wherein the power usage unit is provided as consumer load for the power output. | 2009-01-29 |
20090031153 | Power Management Server for Managing Power Consumption - A power management server and method for managing power consumption is disclosed. According to one embodiment, a power management server data processing system is provided, where the power management server data processing system comprises a power management communication port to communicatively couple the power management server data processing system to a power-managed server data processing system and a system management processor coupled to the power management communication port. In the described embodiment, the system management processor comprises power management logic configured to receive power management data from the power-managed server data processing system, to generate a power management command utilizing the power management data, and to transmit the power management command to the power-managed server data processing system utilizing the power management communication port. Moreover, the power management data of the described embodiment comprises power management capability data. | 2009-01-29 |
20090031154 | POWER SAVING METHOD IN NAS AND COMPUTER SYSTEM USING THE METHOD - Provided is a computer system which includes plurality of computers including a first, second, and third computers, and a storage device coupled to the plurality of computers via a network, in which: the first computer is configured to: access data in a storage area of the storage device; cut, based on settings information and loads on the plurality of computers, at least a part of electric power supplied to the first computer; and send, before cutting the at least a part of electric power supplied to the first computer, a takeover request to the second computer; and the second computer accesses the data within the storage area after receiving the takeover request. With the configuration as described above, power consumption in NAS is reduced. | 2009-01-29 |
20090031155 | Method and Apparatus for Adaptive Voltage Scaling Based on Instruction Usage - Different software applications may use a set of instructions having critical timing paths less than a worst case critical timing path of a processor complex. For such applications, a supply voltage may be reduced while still maintaining the clock frequency necessary to meet the application's performance requirements. In order to reduce the supply voltage, an adaptive voltage scaling method is used. A critical path is selected from a plurality of critical paths for analysis on emulation logic to determine an attribute of the selected critical path during on chip functional operations. The selected critical path is representative of the worst case critical path to be in operation during a program execution. During on-chip functional operations, a voltage is controlled in response to the attribute, wherein the voltage supplies power to a power domain associated with the plurality of critical paths. The reduction in voltage reduces power drain based on instruction set usage allowing battery life to be extended. | 2009-01-29 |
20090031156 | Electronic Apparatus and Method of Conserving Energy - An electronic apparatus and a method of conserving energy comprises providing an energy-conservation module to control use of one or more energy-saving mechanism by a hardware element. The energy-conservation module comprises a performance estimation module that estimates a performance level requirement of the hardware element and a slack time. A cost-benefit qualifier module is provided that uses one or more generic algorithm and at least one separate record that characterises power use and performance by the hardware element in relation to a Performance Power state of the selected energy-saving mechanism in order to determine an existence of an energy saving. The cost-benefit qualifier module sets the hardware element to use the Performance Power state of the selected energy-saving mechanism if the energy-saving exists. | 2009-01-29 |
20090031157 | Measuring AC Power Consumption Using Choke With Inductive Power Sensor - An electrical device includes a choke with a sensor inductor in addition to inductors used for supplying AC power. | 2009-01-29 |
20090031158 | Method and apparatus for providing symmetrical output data for a double data rate dram - An apparatus and method is disclosed to compensate for skew and asymmetry of a locally processed system clock used to synchronize an output signal, e.g., a data signal or a timing signal, from a logic circuit, for example a memory device. A first phase detector, array of delay lock loop (DLL) delay elements and accompanying circuitry are disclosed to phase-lock the rising edge of the output signal with the rising edge of the system clock XCLK signal. Additionally, a comparator circuit, a register delay, an array of DLL delay elements and accompanying circuitry are disclosed to add or subtract delay from the falling edge of the DQ signal in order to produce a symmetrical output of the DQ signal. | 2009-01-29 |
20090031159 | On-chip logic analyzer using compression - One embodiment disclosed relates to an integrated circuit including on-chip logic analyzer circuitry. The on-chip logic analyzer circuitry includes a triggering circuit configured to receive a source data signal and start/stop timing signals. The on-chip logic analyzer circuitry further includes a compression circuit configured to receive an uncompressed data signal from the triggering circuit and to perform compression so as to form a compressed data signal. Other embodiments, aspects and features are also disclosed. | 2009-01-29 |
20090031160 | DIGITAL WATERMARK INFORMATION ADDING DEVICE, DATA REPRODUCTION DEVICE AND DATA RECORDING DEVICE - In order to prevent content data from being illegally recorded or reproduced, information for detecting that the content data is illegally distributed or recorded is added to watermark information or other information. Two sets of WM (watermark) data, a WM1 data set and a WM2 data set are prepared. For the WM1 data, data representing that the content data is package media data or distribution data, SCMS information, data representing that the content data is recorded in a disk or a semiconductor memory, and data representing the type of disk or semiconductor memory are set. For the WM2 data, the distribution time or the year and date is set as time information representing time when the content data is recorded. According to the WM1 or WM2 data, a data reproducing device ( | 2009-01-29 |
20090031161 | Method, operating system and computing hardware for running a computer program - A method for executing a computer program on computing hardware, e.g., on a microprocessor, is provided, the computer program including multiple program objects and errors being detected in the method while running the computer program on the computing hardware. The program objects are subdivided into at least two classes, and multiple program objects are executed during one run, program objects of the first class being repeated when an error is detected and, when an error is detected in one program object of the first class, which has already been sent for execution, this program object of the first class is restarted instead of a program object of the second class after the other program objects of the first class of a run. | 2009-01-29 |
20090031162 | APPARATUS AND METHOD FOR REPAIRING COMPUTER SYSTEM INFECTED BY MALWARE - An apparatus and method of diagnosing whether a program executed in a computer system is malware and repairing the computer system infected by malware. The apparatus includes a receiving unit which receives a first behavior vector for the malware from a malware control server; a determination unit which determines whether a diagnostic target program corresponds to malware based on the received first behavior vector and a second behavior vector for the diagnostic target program; and a repair unit which repairs the computer system based on a result of the determination. | 2009-01-29 |
20090031163 | SPEEDPATH REPAIR IN AN INTEGRATED CIRCUIT - A circuit comprises a first plurality of transistors of a first channel length disposed along a speedpath, the first plurality of transistors providing a first timing performance. The circuit also comprises a second plurality of transistors of a second channel length having an expected equivalent functionality as the first plurality of transistors and disposed in parallel with the first plurality of transistors along the speedpath, wherein the second channel length is different from the first channel length. In addition, the circuit comprises an element configured to selectively replace the first plurality of transistors with the second plurality of transistors in response to a determination that the first timing performance of the first plurality of transistors fails a timing requirement of the speedpath. In one embodiment, the second channel length is a sub-minimal geometry with respect to the first channel length. | 2009-01-29 |
20090031164 | Method for Self-Diagnosing Remote I/O Enclosures with Enhanced FRU Callouts - A method, apparatus, and computer instructions for self-diagnosing remote I/O enclosures with enhanced FRU callouts. When a failure is detected on a RIO drawer, a data processing system uses the bulk power controller to provide an alternate path, rather than using the existing RIO links, to access registers on the I/O drawers. The system logs onto the bulk power controller, which provides a communications path between the data processing system and the RIO drawer. The communications path allows the data processing system to read all of the registers on the I/O drawer. The register information in the I/O drawer is then analyzed to diagnose the I/O failure. Based on the register information, the data processing system identifies a field replacement unit to repair the I/O failure. | 2009-01-29 |
20090031165 | Method for Self-Diagnosing Remote I/O Enclosures with Enhanced FRU Callouts - A method, apparatus, and computer instructions for self-diagnosing remote I/O enclosures with enhanced FRU callouts. when a failure is detected on a RIO drawer, a data processing system uses the bulk power controller to provide an alternate path, rather than using the existing RIO links, to access registers on the I/O drawers. The system logs onto the bulk power controller, which provides a communications path between the data processing system and the RIO drawer. The communications path allows the data processing system to read all of the registers on the I/O drawer. The register information in the I/O drawer is then analyzed to diagnose the I/O failure. Based on the register information, the data processing system identifies a field replacement unit to repair the I/O failure. | 2009-01-29 |
20090031166 | WARM REBOOT ENABLED KERNEL DUMPER - In one embodiment, a method of a kernel dumper module includes generating a dump file associated with a kernel when the kernel crashes, storing the dump file to a functional memory upon applying an overwrite protection to a core dump of the dump file, restarting the kernel through a warm reboot of the kernel such that the core dump is not erased from the functional memory, and transferring the core dump to a system file using the kernel. | 2009-01-29 |
20090031167 | Storage control system and storage control method - Unique information including a logical type name is stored in a user data area of a management area as a media of the alternative disk drive to become an alternative of the storage device. Upon using the alternative disk drive, a disk controller reads the unique information of the alternative disk drive, and determines that copy back is unnecessary when the rotating speed and capacity belonging to the unique information of the alternative disk drive are the same as the rotating speed and capacity of the failed disk drive belonging to RAID, and otherwise determines that copy back is necessary. | 2009-01-29 |
20090031168 | Monitoring VRM-Induced Memory Errors - A method and system for improving Field Replacement Unit (FRU) isolation in memory sub-systems by monitoring Voltage Regulator Module (VRM) induced memory errors. A comparator compares the output voltage coming from the VRM to memory. If the comparator detects a VRM output voltage transient that is outside a rated threshold, then a counter is increased by one. If the counter exceeds a count threshold, a VRM error is posted. If a memory failure occurs within a predetermined period of time, then the VRM error pinpoints the VRM output voltage transient as being the likely cause of the memory failure. | 2009-01-29 |
20090031169 | Self-Repairing Of Microprocessor Array Structures - A level of indirection is utilized when writing to a microprocessor array structure, thereby masking hard faults in the array structure. Among other benefits, this minimizes the use of a backward error recovery mechanism with its inherent delay for recovery. The indirection is used to effectively remove from use faulty portions of the array structure and substitute spare, functioning portions to perform the duties of the faulty portions. Thus, for example, faulty rows in microprocessor array structures are mapped out in favor of substitute, functioning rows. | 2009-01-29 |
20090031170 | System and method to facilitate automatic globalization verification test - A method, system and program are disclosed for validating the generation of globalized versions of software programs. The directory structure of an installed software program is traversed to discover resource files containing globalized strings. The values of the globalized string and its corresponding key in the resource file are then used to generate a unique key, formatted to identify the location of the globalized string. The locale supported by the globalized string is determined and the unique key and the globalized string value are appended to a corresponding locale table. A globalized string value that causes the failure of a globalization test for a predetermined locale is identified. The corresponding locale table is then searched for the failed globalized string value. Once found, the unique key for the failed globalized string value is retrieved to identify the location of the defective globalized string and perform predetermined remedial actions. | 2009-01-29 |
20090031171 | APPARATUS, SYSTEM, AND METHOD FOR RESPONSIVE ACQUISITION OF REMOTE DEBUG DATA - An apparatus, system, and method are disclosed for responsive acquisition of remote debug data. The apparatus for responsive acquisition of remote debug data is provided with a plurality of modules configured to detect an error on a local device, trigger a remote device to generate a remote debug data set in response to the error, and generate a local debug data set in response to the error. These modules in the described embodiments include a detection module, a trigger module, and a collection module. | 2009-01-29 |
20090031172 | DEVICE, METHOD, PROGRAM, AND RECORDING MEDIUM FOR ERROR FACTOR MEASUREMENT, AND OUTPUT CORRECTION DEVICE AND REFLECTION COEFFICIENT MEASUREMENT DEVICE PROVIDED WITH THE DEVICE FOR ERROR FACTOR MEASUREMENT - There is provided an error factor measurement device for measuring an error factor in a switch branch signal source including a signal source and a switch, and the error factor measurement device includes a reference error factor component recording unit which records respective components E | 2009-01-29 |
20090031173 | Method, Apparatus, and Computer Program Product in a Processor for Dynamically During Runtime Allocating Memory for In-Memory Hardware Tracing - A method, apparatus, and computer program product are disclosed in a processor for dynamically, during runtime, allocating memory for in-memory hardware tracing. The processor is included within a data processing system. The processor includes multiple processing units that are coupled together utilizing a system bus. The processing units include a memory controller that controls a system memory. A particular size of the system memory is determined that is needed for storing trace data. A hardware trace facility requests, dynamically after the data processing system has completed booting, the particular size of the system memory to be allocated to the hardware trace facility for storing trace data that is captured by the hardware trace facility. The firmware selects particular locations within the system memory. All of the particular locations together are the particular size. The firmware allocates the particular locations for use exclusively by the hardware trace facility. | 2009-01-29 |
20090031174 | SERVER OUTAGE DATA MANAGEMENT - Server outage data is automatically created and managed. Outage data is automatically retrieved from one or more servers at which an outage is detected by an agent installed on the server. The agent may search for outage event data and transmit the data to a monitoring application. The monitoring application receives the event data and creates an outage record from the data. Server contents, such as the number of users having account data on the server, can be determined either before or after the outage has occurred. Once the outage data and server contents are known, the cost and impact of the outage for each particular server can be determined. The cost of a server outage may be determined based on the outage record and the server data identifying resources of the server, such as user account data. | 2009-01-29 |
20090031175 | SYSTEM AND METHOD FOR ANALYZING STREAMS AND COUNTING STREAM ITEMS ON MULTI-CORE PROCESSORS - Systems and methods for parallel stream item counting are disclosed. A data stream is partitioned into portions and the portions are assigned to a plurality of processing cores. A sequential kernel is executed at each processing core to compute a local count for items in an assigned portion of the data stream for that processing core. The counts are aggregated for all the processing cores to determine a final count for the items in the data stream. A frequency-aware counting method (FCM) for data streams includes dynamically capturing relative frequency phases of items from a data stream and placing the items in a sketch structure using a plurality of hash functions where a number of hash functions is based on the frequency phase of the item. A zero-frequency table is provided to reduce errors due to absent items. | 2009-01-29 |
20090031176 | Anomaly detection - A system such as a Web-based system in which a plurality of computers interact with each other is monitored to detect online an anomaly. Transactions of a service provided by each of a plurality of computers to another computer are collected, a matrix of correlations between nodes in the system is calculated from the transactions, and a feature vector representing anode activity balance is obtained from the matrix. The feature vector is monitored using a probability model to detect a transition to an anomalous state. | 2009-01-29 |
20090031177 | Method for providing download and upload service in network control system - The present invention relates to a method for providing a download and upload service using variable length packet communication in a living network control system. For example, a user located inside or outside a house controls or monitors operations or operation states of various appliances such as refrigerator or laundry machine through a living network installed at home, such as a RS-485 network, small output network, or power line network so that convenience of remote control and supervision can be provided to a user. Further, in a case where a download or upload service is executed in a living network in which various appliances connected thereto, variable length packet communication, which is capable of diving data by the buffer size of a device, and then sending and assembling the data, is used so that a download and upload service for various appliances connected through the living network can be more effectively executed. | 2009-01-29 |
20090031178 | Method and System for Adaptive Interleaving - A method a system for automatically controlling an adaptive interleaver involves monitoring performance parameters of a transmission system and controlling the adaptive interleaver in response to the performance parameters. The SNR and the data rate of the transmission system are preferably determined. The data rate is analyzed and the adaptive interleaver is adjusted in response to the data rate and the SNR. Alternatively, the BER and the data rate of the transmission system are determined. The data rate is analyzed and the adaptive interleaver is adjusted in response to the data rate and the BER. Alternatively, any one of the SNR, BER or data rate can alone be monitored and used to the adaptive interleaver. The system provides a effective system for adjusting an adaptive interleaver in response to performance parameters of a transmission system. | 2009-01-29 |
20090031179 | JTAG TEST CODE AND DATA COMPILER AND METHOD - A software compiler is described here that is capable of analyzing JTAG test functions and translating them into code and date usable and accessible by a JTAG-bus controller hardware circuit. The compiler is capable of reading instructions and data information not directly usable by a JTAG-bus controller, such as Serial Victor Format, and generating instructions and data executable by a JTAG-bus controller hardware circuit. This allows the JTAG-bus controller to directly access such compiled code during the test without using an interpreter to translate such information before executing them. | 2009-01-29 |
20090031180 | Method for Discovering and Isolating Failure of High Speed Traces in a Manufacturing Environment - A mechanism is provided for discovering and isolating failure of high speed traces in a manufacturing environment. The mechanism utilizes transmit pre-emphasis and receiver equalization in combination with attenuated wrap plugs to enhance discovery and isolation of manufacturing defects in the manufacturing environment. The mechanism adjusts pre-emphasis and equalization in real time in high speed devices, allowing for much greater variation to compensate for design margins and specification variances. While the card is under test with wrap-backs installed, the pre-emphasis and receiver equalization are brought to the limits while logging the bit error rate to a non-volatile memory element. The mechanism then compares the bit error rate information to empirically derived signatures for failure isolation. | 2009-01-29 |
20090031181 | Automated root cause identification of logic controller failure - A method, system, and computer program product for automated root cause identification of a failure of a logic controller have been provided. The method includes receiving logic controller failure information, receiving a logic model of logic code for the logic controller, and mapping the logic controller failure information to the logic model to identify a logic failure model state. The method further includes determining a potential trigger of the failure of the logic controller as a root cause via tracing through at least one path in the logic model to reach the logic failure model state. The method also includes identifying the root cause in the logic code via mapping the root cause from the logic model to the logic code, and outputting the logic code with the identified root cause of the failure of the logic controller. | 2009-01-29 |
20090031182 | Information Communication Terminal, Radio Communication Apparatus and Radio Communication Network System Capable of Performing Communication Corresponding to Purpose - An information communication terminal performs communications with another information communication terminal over a radio communication network system. In the information communication terminal, a receiving unit receives an externally transmitted frame. In a state where error correction is to be performed, a correction processing unit outputs data after performing error correction according to correction information in the frame on data in the frame received by the receiving unit. In a state where the error correction is not to be performed, the correction processing unit outputs the data without performing the error correction on the data in the frame received by the receiving unit. A determining unit determines whether the error correction is to be performed by the correction processing unit or not. | 2009-01-29 |
20090031183 | RETRANSMISSION CONTROL SCHEME AND WIRELESS COMMUNICATION APPARATUS - A retransmission control scheme and a wireless communication apparatus wherein the efficiency of retransmission control is enhanced to further improve the system throughput. In this wireless communication apparatus ( | 2009-01-29 |
20090031184 | MIMO Hybrid-ARQ Using Basis Hopping - A Hybrid Automatic Retransmission Request (H-ARQ) technique is provided for Multi-Input Multi-Output (MIMO) systems. The technique changes the basis (V) upon retransmission, which helps reduce the error probability upon retransmission. This basis hopping technique provides for improved performance gain without significant increase in design complexity. In one embodiment, communication device ( | 2009-01-29 |
20090031185 | HYBRID ARQ SYSTEMS AND METHODS FOR PACKET-BASED NETWORKS - Systems and methods for hybrid automatic repeat-request (HARQ) communication, comprising a transmitter employing hybrid automatic repeat-request (HARQ) and able to retransmit an incorrectly received packet without differently re-encoding data bits. The transmitter is further able to select at least one bit from any in a set to forward in at least one retransmission. The set contains any bits punctured from an original transmission corresponding to the retransmission. Other embodiments transmit, by a transmitter using hybrid automatic repeat-request (HARQ), a packet containing at least one punctured bit, select—without differently re-encoding data bits—at least one bit from any in a set to forward in at least one re-transmission of an incorrectly received packet, and retransmit the packet with at least one different punctured bit. The set contains any bits punctured from an original transmission corresponding to the re-transmission. | 2009-01-29 |
20090031186 | Error correction coding apparatus - An error correction coding apparatus is disposed to generate a low-density parity-check code | 2009-01-29 |
20090031187 | DATA RECORDING/REPRODUCING APPARATUS AND DATA RECORDING/REPRODUCING METHOD - A data format, a data recording/reproducing method, and a data recording/reproducing apparatus are provided for effectively correcting data errors caused by dust and scratches on a recording medium even with the use of a conventional ECC. The data recording/reproducing apparatus includes a generation unit that generates predetermined data units by dividing an ECC sector including error correction codes generated by an error correction encoder into prescribed data units and encoding the prescribed units into iterative encoded data units using an iterative encoder so that the predetermined data units may consist of the iterative-encoded data units, a recording unit, a reproducing unit, an iterative decoder for conducting iterative decoding on the predetermined data units, and an error correction decoder. The apparatus further includes a distribution unit for distributing the predetermined data units generated by the generation unit. The distribution unit distributes the iterative encoded data units using at least two ECC sectors and records the distributed data units on a recording medium. | 2009-01-29 |
20090031188 | ERROR CORRECTING CODE GENERATION METHOD AND MEMORY CONTROL APPARATUS - An objective of the present invention is to make it possible to appropriately correct an error of data in a cache memory. A store processing unit generates an nt-ECC on the basis of data stored in a non-target area that was read out from a cache memory with a search of the cache memory, and generates t-ECC on the basis of the data to be stored in the buffer. | 2009-01-29 |
20090031189 | METHOD AND SYSTEM FOR FORMING A FORMATTED CONTENT STREAM AND USING A CYCLIC REDUNDANCY CHECK - A communication system | 2009-01-29 |
20090031190 | TURBO DECODING SYSTEM, TRANSMISSION POWER CONTROL METHOD AND CDMA MOBILE COMMUNICATION TERMINAL - There are provided a turbo decoding system of a CDMA mobile communication terminal, a transmission power control method, and a CDMA mobile communication terminal in which interference in the other users is suppressed by not increasing the transmission power of a base station to a value over the necessary value and excessive repetitive processing is prevented in the turbo decoding section to reduce consumption power. | 2009-01-29 |
20090031191 | Wyner-Ziv Coding Based on TCQ and LDPC Codes - An encoder employs a trellis coded quantization (TCQ) unit and a compression unit. The TCQ uses a set of polynomials that have been selected to maximize granular gain. The TCQ unit operates on a block of samples from a source. The compression unit compresses bit planes of the TCQ output, using parity check matrices of corresponding LDPC codes, to obtain corresponding syndromes. The parity check matrices are selected so their compression performance approaches close to the limit for Slepian-Wolf coding. A decoder employs a decoding unit and an estimation unit. The decoding unit decodes the syndromes using side information to produce an estimate for the TCQ output. The side information is correlated with the source. The estimation unit estimates the block of source samples using the estimated TCQ output and the side information. Trellis coded vector quantization may be used as an alternative to TCQ. | 2009-01-29 |
20090031192 | CHANNEL ENCODING APPARATUS AND METHOD - A channel encoding apparatus and method are provided in which part of the parity bits are set to erroneous bits, and full parity bits are created by correcting the erroneous bits using a channel decoding apparatus of a receiver in a communication system. In the channel encoding apparatus, in order to generate a coded bit stream by adding a parity bit stream to a message bit stream, a partial parity generator generates a partial parity bit stream as a part of the parity bit stream using the message bit stream, an erasure generator generates a bit stream having an erroneous value as the remaining part of the parity bit stream, and a decoder calculates the value of the parity bit stream by correcting the bit stream having the erroneous value using a parity-check matrix that determines the parity bit stream, the message bit stream, and the partial parity bit stream. | 2009-01-29 |
20090031193 | SYNDROME-ERROR MAPPING METHOD FOR DECODING LINEAR AND CYCLIC CODES - A decoding method is presented for error-correcting codes based on the syndrome decoding scheme, which means the set of all syndromes is one-to-one corresponding to the set of all correctable error patterns. The improvement in the high-speed error-correcting capability is achieved by searching a syndrome-error table, which is built upon the mathematical basis: there is a one-to-one correspondence between the set of all syndromes and the set of all correctable error patterns. | 2009-01-29 |
20090031194 | ERROR-DETECTING AND CORRECTING FPGA ARCHITECTURE - A method and apparatus are provided for an error-correcting FPGA. ECC data for configuration is generated and programmed into the ECC rows in the configuration memory. While booting, it is determined whether an integrity-check bit is set. If so, an integrity check is performed. If a single-bit error is detected, if the bit error is an erroneous “0” value, the memory location containing the erroneous “0” value is reprogrammed to a “1” value. If the bit error is an erroneous “1,” value, the memory block data is saved in a non-volatile memory block, the configuration memory block containing the error is erased and reprogrammed using the corrected bit. If there is more than one error, an error flag is set. The user reads the status of the error flag through the JTAG port. If the error flag is set then a full reprogramming cycle is initiated. | 2009-01-29 |
20090031195 | Method and apparatus for encoding and decoding Reed-Muller codes - A method and apparatus for encoding and decoding Reed-Muller codes are provided. In exemplary embodiments, a method comprises receiving a code-word encoded with a Reed-Muller code, generating a pattern to retrieve voting bits, decoding the code-word based on the voting bits and, and providing the decoded code-word. | 2009-01-29 |
20090031196 | Error-correcting method used for decoding data transmissions - An error-correcting method used for decoding of data transmissions is disclosed. The error-correcting method is used for data with an error-correcting part and comprises: providing a multinomial for processing an error-correcting part to get an operational result; providing a database for saving the corresponding operational results of each single bit; and finding the error bit according to the operational results. | 2009-01-29 |
20090031197 | ERASURE DECODING FOR RECEIVERS - A system comprising communication logic capable of receiving data signals from a network. The signals comprise both erasure error and random error. The system also comprises processing logic coupled to the communication logic and adapted to partition parity check bytes of the received signals into a first portion and a second portion. The processing logic uses the first portion for random error correction and the second portion for erasure error correction. | 2009-01-29 |
20090031198 | Method, an electrical system, a digital control module, and an actuator control module in a vehicle - A method, control module and system of a vehicle including at least a first and a second control computer each containing a number of local Digital Control Modules and at least one Actuator Control Module wherein the Actuator Control Module of each control computer is operatively connected to all local Digital Control Modules of the same control computer, wherein the Actuator Control Module of each control computer is further operatively connected to all Digital Control Modules of the electrical system in a manner that enables each Actuator Control Module of the system to receive internal data of each Digital Control Module of the electrical system. | 2009-01-29 |
20090031199 | FILE DOWNLOAD AND STREAMING SYSTEM - A method of encoding data operates on an ordered set of input symbols and includes generating redundant symbols from the input symbols, and includes generating output symbols from a combined set of symbols including the input symbols and the redundant symbols, wherein the number of possible output symbols is much larger than the number of the combined set of symbols, wherein at least one output symbol is generated from more than one symbol in the combined set of symbols and from less than all of the symbols in the combined set of symbols. The redundant symbols are generated from an ordered set of input symbols in a deterministic process such that a first set of static symbols calculated using a first input symbol has a low common membership with a second set of static symbols calculated using a second input symbol distinct from the first input symbol. | 2009-01-29 |
20090031200 | High Rate, Long Block Length, Low Density Parity Check Encoder - There is provided a parity check encoder ( | 2009-01-29 |
20090031201 | OPTIMIZED DECODING IN A RECEIVER - A receiver includes a decoder configured to decode at least a portion of a data stream comprising a data frame. The data frame includes a code block having a data block and a parity block. The receiver also includes a controller. The controller is configured to determine whether to disable at least a portion of the receiver during transmission of the parity block to the receiver when the data block contains at least one erasure. | 2009-01-29 |
20090031202 | Methods, Systems, and Computer Program Products for Class Verification - A method, system, and computer program product for class verification are provided. The method includes initiating loading of a class, and searching for the class in verification caches. A record from the verification caches, including a checksum, is returned upon locating the class. The method further includes comparing the checksum in the record to a checksum of the class being loaded, and completing the loading of the class when the checksums match. The method additionally includes performing bytecode verification of the class upon one of: a checksum comparison mismatch, and a failure to locate the class in the verification caches. The method also includes calculating a new checksum of the class upon a successful bytecode verification, and storing the new checksum in the verification caches. | 2009-01-29 |
20090031203 | HYPERLINKS - A method of creating hyperlinks from an electronic document and for accessing printed hyperlinks is described. A document | 2009-01-29 |
20090031204 | Stakeholder Matrix - A system implementing a situation-oriented directory for retrieving a stakeholder identification includes a memory storing a relational database corresponding to the situation-oriented directory including a plurality of attribute-value combinations and a plurality of stakeholder identifications, wherein the plurality of attribute-value combinations are mapped to the plurality of stakeholder identifications such that for each attribute-value combination exactly one stakeholder is mapped, and a processor in communication with the memory for receiving a query and retrieving the stakeholder identification from among the plurality of stakeholder identifications based on the attribute-value combinations. | 2009-01-29 |
20090031205 | System for exporting-impoting the content of input cells from a scalable template instance to another - The present invention is directed to a method, system and program for exporting-importing the content of input cells from a source scalable template instance in a source multi-dimensional spreadsheet to a destination scalable template instance in a destination multi-dimensional spreadsheet; a multi-dimensional spreadsheet comprising a plurality of cells identified by a cell address along each dimension; a scalable template instance comprising a variable number of contiguous elements of same size ordered and aligned along a given spreadsheet dimension and structured according to information defined in an associated scalable template; an element being defined as a range of cells; a range of cells comprising one or a plurality of cells; said scalable template comprising an element profile; an element profile defining a cell content and a cell destination for each cell within each element; said cell destination specifying whether the cell is an input cell for receiving an entry or an output cell for producing a result. The method comprises the steps of:
| 2009-01-29 |
20090031206 | System in a spreadsheet for exporting-importing the content of input cells from a scalable template instance to another - The present invention is directed to a method, system and program for exporting-importing the content of input cells from a source scalable template instance in a source multi-dimensional spreadsheet to a destination scalable template instance in a destination multi-dimensional spreadsheet; a multi-dimensional spreadsheet comprising a plurality of cells identified by a cell address along each dimension; a scalable template instance comprising a variable number of contiguous elements of same size ordered and aligned along a given spreadsheet dimension and structured according to information defined in an associated scalable template; an element being defined as a range of cells; a range of cells comprising one or a plurality of cells; said scalable template comprising an element profile; an element profile defining a cell content and a cell destination for each cell within each element; said cell destination specifying whether the cell is an input cell for receiving an entry or an output cell for producing a result. The method comprises the steps of:
| 2009-01-29 |
20090031207 | Dynamic Method for the Visual Rendering of Data Display and Input Windows on a Computer Screen - The invention concerns a method for visual rendering of data display and input windows on a computer screen. The windows are opened with a browser by a remote Web site user. In response to a request emitted by the user's browser the site returns thereto, via the network whereon they are connected, a generic form of the requested page not including any pre-positioning information. The browser, during a brief display of the generic form of the page, captures the dimensions of the displayed elements, calculates new display widths and redimensions the elements. Thereafter, the browser displays permanently the page whereof the elements have been adjusted to obtain a good visual rendering. The generic form of the page can therefore be defined independently of the user's display means and in particular does not require using a table for positioning the elements to be displayed. | 2009-01-29 |
20090031208 | Expanding Rows and Cells Within a Table - A method for modifying a table to show cell and row details. In one embodiment, the method includes receiving a command to expand a row with multiple cells to disclose details or in another embodiment to expand a single cell of a row, shifting the cells positioned below the row downward and expanding the row. The row or individual cell is expanded by displaying a detail region that is contiguous to row and positioned below the row. The cells positioned below the expanded row are shifted downward to provide sufficient space for the detail region such that the detail region does not hide any portion of any of the cells positioned below the expanded row. | 2009-01-29 |
20090031209 | Apparatus and method for adding product or service offers from one website to another website - Product or service offers from one website can be quickly and easily added to another website. For example, a web page containing information associated with one or more offers for one or more items can be generated and provided to a user. The information could represent pricing information or discounts associated with the one or more items. The user can select one of the offers, such as by selecting pricing information or a discount associated with one of the items. A formatted forum post or a gift registry entry could be generated, where at least part of the contents of the forum post or gift registry entry is automatically selected or generated based on the selected offer. A thread in a forum can be created using the forum post, or the gift registry entry can be added to at least one gift registry. | 2009-01-29 |
20090031210 | OPTIMIZED PAGE SCRIPT DOWNLOADS IN A COMPONENT BASED ARCHITECTURE - Embodiments of the present invention address deficiencies of the art in respect to module dependency loading in an Ajax environment, and provide a novel and non-obvious method, system and computer program product for the optimized downloading of Javascript in a component based architecture. In an embodiment of the invention, a method for optimized downloading of scripts in a component-based architecture can be provided. The method can include identifying a set of module dependencies for a script embedded in a page received for rendering, locating the module dependencies in a dependency graph for the script, determining from the dependency graph a subset of the module dependencies that have yet to be loaded for the page, requesting each module in the subset in a single request, and loading each requested module in conjunction with rendering the page. | 2009-01-29 |
20090031211 | PROGRAMMING EXTENSION FOR AUTHORING STYLE RULES - A programming extension for authoring style rules is provided. An example programming extension for authoring style rules comprises a style rules editor and a style definition class module. An example style rules editor may be configured to receive a request to generate a collection of style rules and to receive input associated with one or more style rules. The requested collection of style rules is to be suitable for use with a document-based web page. The style definition class module may be configured to generate a Java™ representation of the collection of style rules based on the input associated with the one or more style rules. | 2009-01-29 |
20090031212 | Embedded system with web-based user interface, firmware structure thereof and method for providing information thereof - Embedded system with web-based user interface, firmware structure thereof, and method for providing information thereof are provided. The firmware of the embedded system includes an execution part and a presentation part, which are separated, wherein the execution part includes a web service program and a program interface while the presentation part includes a web page which includes a request for dynamic content associated with the program interface so as to obtain corresponding dynamic content. When the system takes the presentation part as the static content of its web-based user interface, the web service program, in response to a static content request, reads the web page from the non-volatile memory and outputs it to a device, and in response to the dynamic content request, invokes the program interface to obtain the corresponding dynamic content and output it to the device. | 2009-01-29 |
20090031213 | SYSTEM AND METHOD FOR WEBSITE COLORIZATION - A method permits a user to modify color attributes of a website. The website is based on a template being made of CSS documents, and a folder containing images for the website. A subfolder containing the images in a grayscale version and an additional folder for the layered images that are required for the template preview mechanism in the Graphic User Interface are also provided. The template is separated into at least two areas, each area being composed of a plurality of layers. Images within each area of the template are grouped and each group is attributed an initial color and each group being provided with a coloring method. The method involves the steps of selecting by the user a template for a website; displaying the template to the user with initial colors; identifying each area of the template; providing a graphical user interface by which the user selects a given area of the template and modifies a color thereof; and modifying the color of an area of the template according to the user's selection and according to the colorizing method. | 2009-01-29 |
20090031214 | VIEWING OF INTERNET CONTENT - Different pieces of Internet content are manually selected during viewing on a screen, the selected pieces are arranged into a single publication, and the publication is sent to print. | 2009-01-29 |
20090031215 | METHOD AND APPARATUS FOR GENERATING AN ELECTRONIC LEARNING PRESENTATION IN A NETWORK COMPUTING ENVIRONMENT - The illustrative embodiments described herein provide a computer-implemented method, apparatus, and computer program product for generating an electronic learning presentation in a network-computing environment. In one embodiment, the process presents a list of templates. Each template in the list of templates includes a set of editable fields adapted for receiving educational content. The educational content is adapted for teaching a particular subject matter. The process receives a selection of at least one template in the list of templates. The process also receives the educational content into the at least one template. The process generates a set of pages using the at least one template to form the electronic learning presentation. The set of pages includes the educational content. | 2009-01-29 |
20090031216 | PREFLIGHTING FOR WEB PUBLISHING - A computer-implemented method for preflighting of electronic documents containing content intended for web publication is described together with an integrated system for performing the preflighting checks and managing the workflows associated with web publication of content. The method allows the web publisher to predefine rules for the preflighting checks in accordance with its technical specifications for web publication and also personalize the rules according to the sender of the document. Rules may be defined and applied to content indirectly incorporated by embedded links to third party hosted web sites. The system provides for a high degree of flexibility in the way the rules may be specified and implemented and also allows for the use of other reference identifiers, which provide a separate channel by which booking and reconciliation functionality may be achieved associated for any given publication of content. | 2009-01-29 |
20090031217 | Device and a Method for Generating Trademarks - System and method for generating trademarks, comprising reception of a input signal ( | 2009-01-29 |
20090031218 | ELECTRONIC DOCUMENT VIEWING SYSTEM AND METHOD THEREFOR - A document is divided into a plurality of regions so that each page has a meaning and, for each of the regions, there is generated a similarity table indicating a similarity degree and a data amount corresponding to the multiplexed resolution level data. By referencing this similarity table, each page of the electronic document in the region specified by the user is represented by a predetermined similarity (resolution) and at the reading speed specified by the user. Moreover, by referencing the similarity table, each page of the electronic document is represented at the maximum speed while guaranteeing the predetermined similarity. | 2009-01-29 |
20090031219 | ELECTRONIC DEVICE AND METHOD FOR PREVIEWING MEDIA CONTENT - An electronic device ( | 2009-01-29 |
20090031220 | METHOD OF MANAGING CHARACTER FONTS WITHIN MULTIMEDIA SCENES, AND THE CORRESPONDING COMPUTER PROGRAM AND TERMINAL - A method is provided for managing fonts in a radio communication terminal, which can receive fonts in order to render contents on a screen. One such method involves the use of the following elements in the terminal, namely: a font database that lists all of the fonts or font portions stored by the terminal and matches at least one management parameter with each of the fonts; and set of font management commands including at least one command, which is applied to a font portion and which belongs to the group containing at least a command for transmitting a font portion for storage in the terminal, a command for updating a font portion stored in the terminal and a command for deleting a font portion stored in the terminal. | 2009-01-29 |
20090031221 | Providing A Presentation in a Remote Location - A method for providing computer readable instructions for a presentation in a remote location is disclosed. In the method non-editable computer readable instructions for a presentation at a remote location are received from a central data storage via a data network. A user at the remote location then provides at least one set of computer readable instructions that are associated with the presentation. A modified presentation is presented at the remote location based on the non-editable set of computer readable instructions and the associated computer readable instructions. The associated computer readable instructions can then be sent to the central data storage for use in at least one subsequent execution of the presentation. | 2009-01-29 |
20090031222 | Network design processing device, network design processing method and network design processing program - In a network design processing device | 2009-01-29 |
20090031223 | CHAT SYSTEM, CHAT DEVICE AND CONTROL METHOD OF CHAT SERVER, INFORMATION STORAGE MEDIUM - Provided are a chat system for achieving good communication among users, a control method for a chat device and devices in a chat server, and an information storage medium. A message transfer unit ( | 2009-01-29 |