Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


14th week of 2012 patent applcation highlights part 50
Patent application numberTitlePublished
20120084547METHOD AND TERMINAL OF BOOTING A COMPUTING SYSTEM - Provided is a method of booting a computing system which performs boot image transmission and device initialization in parallel. For example, using an Internal RAM and direct memory access (DMA), hardware initialization and loading of boot image from a main storage medium to a main memory are performed in parallel, thereby reducing time spent on booting.2012-04-05
20120084548Method and Module for Simulating Keyboard - This disclosure provides a method and a module for simulating a keyboard used in an electronic device having a hot key. The method for simulating a keyboard at least includes the following steps. First, whether the hot key is pressed is checked. If the hot key is pressed, a pressing time of the hot key is calculated. If the pressing time is over a first predetermined time, a first scanning code is sent. When the pressing time is within the first predetermined time, whether to send a second scanning code is determined according to the pressing time.2012-04-05
20120084549Attesting a Component of a System During a Boot Process - A method, apparatus and program product for attesting a component of a system during a boot process. The method comprises the steps of: verifying that the system is in a trusted state; in response to verifying that the system is in a trusted state, requesting an enrollment of the system wherein the requesting step further comprises the step of: retrieving enrollment data associated with the system; retrieving current input data associated with the component of the system; comparing the current input data against the enrollment data in order to determine whether the system can retain its trusted state; wherein in response to the comparing step, if the current input data matches the enrollment data, the system retains its trusted state; and accepting the trusted state until receipt of a notification, from the system having a retained trusted state, of an update to the system.2012-04-05
20120084550INFORMATION PROCESSING SYSTEM AND STARTUP CONTROL METHOD - An information processing system including a control apparatus and a housing includes a device that operates under control of the control apparatus, the control apparatus includes a memory that stores operability information including plural pieces of the operability information each indicate whether an device is operable under the control of the control apparatus, and a startup controller that obtains designation information designating a piece of the operability information from the housing and reads a piece of the operability information designated by the obtained designation information, wherein the startup controller requests the housing to start up the device when the read piece of the operability information indicate that the device is operable, and excludes the device from being subject to startup control when the read piece of the operability information indicates that the device is inoperable.2012-04-05
20120084551FAN CONTROL METHOD AND APPARATUS FOR DEVICE AREA IN INFORMATION HANDLING SYSTEM - A fan control method for an information handling system is provided. The information handling system includes a device area and a fan for providing air flow to the device area. A plurality of devices is installed on the device area. The method includes the steps of: collecting thermal data of installed devices in the device area when booting up the information handling system; determining a threshold power of the installed devices and a discreteness level of the installed devices based on the thermal data; adjusting an initial speed of the fan based on the discreteness level; and calibrating the speed of the fan to obtain an optimized speed thereof based on the threshold power and the adjusted initial speed. A fan control apparatus for an information handling system is further provided.2012-04-05
20120084552DEMAND BASED USB PROXY FOR DATA STORES IN SERVICE PROCESSOR COMPLEX - A method, apparatus, system, and computer program product for secure server system management. A payload containing system software and/or firmware updates is distributed in an on-demand, secure I/O operation. The I/O operation is performed via a secured communication channel inaccessible by the server operating system to an emulated USB drive. The secure communication channel can be established for the I/O operation only after authenticating the recipient of the payload, and the payload can be protected from access by a potentially-infected server operating system. Furthermore, the payload can be delivered on demand rather than relying on a BIOS update schedule, and the payload can be delivered at speeds of a write operation to a USB drive.2012-04-05
20120084553Transferable device with alterable usage functionality - A method and device for providing a transferable device with alterable usage functionality includes but is not limited to a method including receiving a request from a user to alter one or more functions of the mobile device, responding to the request from the user by activating a first mode, the first mode to alter the one or more functions on the mobile device, and enabling a remote authentication function to allow the user to remotely alter the first mode to at least a second mode.2012-04-05
20120084554SYSTEM AND METHOD FOR HOSTING ENCRYPTED MONITORING DATA - A monitoring system includes at least one monitoring devices coupled to the electrical power distribution system at selected locations for collecting data related to the operation of the monitored system. The monitoring device(s) includes a communication port and processors programmed to segment the collected data into blocks optimized for user analysis operations, encrypt the segmented blocks of data, bundle the encrypted blocks of data with unencrypted metadata that identifies the data blocks by at least the monitoring location at which the encrypted blocks of data were obtained and the type of data, and transmit the encrypted blocks of data with the unencrypted metadata. The system includes at least one client device that has a communication port that is coupled to the monitoring device(s) and the client device and that has a processor programmed to generate and transmit queries regarding selected ones of the encrypted blocks of data. A monitoring service is coupled to the monitoring device(s) and includes a processor programmed to receive and store the encrypted blocks of data with the unencrypted metadata from the monitoring device(s), process the unencrypted metadata, and retrieve and transmit the selected ones of the encrypted blocks of data in response to the queries from the client device.2012-04-05
20120084555ENFORCING USE OF CHIPSET KEY MANAGEMENT SERVICES FOR ENCRYPTED STORAGE DEVICES - A method, system, and computer-readable storage medium containing instructions for controlling access to data stored on a plurality of storage devices associated with a first platform. The method includes authenticating a user to access the first platform, wherein the first platform includes first and second storage devices, chipset encryption hardware, and a memory. Data stored on the storage devices are encrypted, with first data on the first storage device being encrypted by the chipset encryption hardware and second data stored on the second storage device being encrypted by another encryption mechanism. The data are decrypted and the user is allowed to access the first data and the second data.2012-04-05
20120084556SYSTEM AND METHOD FOR RETRIEVING RELATED CERTIFICATES - A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, all certificates related to an identified certificate are retrieved from the certificate servers automatically by the certificate synchronization application, where the related certificates comprise at least one of one or more CA certificates and one or more cross-certificates. Embodiments described herein facilitate at least partial automation of the downloading and establishment of certificate chains, thereby minimizing the need for users to manually search for individual certificates.2012-04-05
20120084557TAMPERING MONITORING SYSTEM, CONTROL DEVICE, AND TAMPERING CONTROL METHOD - Provided is a tampering monitoring system that can identify a monitoring module that has been tampered with among a plurality of monitoring modules. A management apparatus is provided with an acquisition unit that acquires a new monitoring module that has not been tampered with, a generation unit that generates a decoy monitoring module by modifying the acquired monitoring module, a transmission unit that transmits the decoy monitoring module to the information security device and causes the information security device to install the decoy monitoring module therein, a reception unit that receives from the information security device, after the decoy monitoring module has been installed, monitoring results generated by the monitoring modules monitoring other monitoring modules, and a determination unit that identifies, by referring to the received monitoring results, a monitoring module that determines the decoy monitoring module to be valid and determines the identified monitoring module to be invalid.2012-04-05
20120084558INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - An information processing apparatus has an authentication and key exchange processing unit, a packet selector, a content key generator, a content decryption unit to decrypt, based on the content key, the encrypted content which is included in the content packet and received following the CCI packet, a CCI set identifier management unit to manage a CCI identifier corresponding to recognizable copy control information, a CCI selector, a CCI analyzer to analyze copy control information corresponding to the CCI identifier selected by the CCI selector, a content processing unit to perform, based on an analysis result of the CCI analyzer, the receiving process on the content data corresponding to the content packet received following the CCI packet, a first communication connection unit to perform the authentication and key exchange process, and a second communication connection unit to transmit the content packet and the CCI packet.2012-04-05
20120084559Communications Source Authentication - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for authenticating a communications source. In one aspect, a method includes decrypting a symbol that was received over a particular communications channel. The symbol is decrypted using a decryption key that is assigned to a particular endpoint that is assigned the particular communications channel. A measure of error is computed for the decrypted symbol. In turn, a determination is made whether the measure of error exceeds a threshold error measure. If the measure of error does not exceed the threshold error measure the decrypted symbol is identified as a valid symbol transmitted by the particular endpoint, and logged as such. If the measure of error exceeds the threshold error measure, the decrypted symbol is identified as a symbol from a different endpoint; and 2012-04-05
20120084560REBOOT CONTROLLER TO PREVENT UNAUTHORIZED REBOOT - A method, computer program product and system of preventing the unauthorized rebooting of a server having a change record, reboot password and valid reboot key. The method includes authenticating that rebooting is authorized by the change record; responsive to entering a reboot password, authenticating that a valid reboot password has been entered; and responsive to entering a reboot key, authenticating by a computer processor that a valid reboot key has been entered.2012-04-05
20120084561TOKEN-BASED AUTHENTICATION USING MIDDLE TIER - An intermediary system that facilitates a connection request from a client to a server. The intermediary system may participate in either or both of a token creation phase and a server connection phase. If participating in the token creation phase, the intermediary system generates a token that may later be used by the client during a server connection phase. The token includes a session identifier and is returned to the client. If participating in the server connection phase, the intermediary receives the token, extracts the session identifier from the token, and compares against the session identifier for the session in which the token was created. If the session identifiers match, then the intermediary connects to the server to complete the connection request.2012-04-05
20120084562METHODS AND SYSTEMS FOR UPDATING A SECURE BOOT DEVICE USING CRYPTOGRAPHICALLY SECURED COMMUNICATIONS ACROSS UNSECURED NETWORKS - Methods and systems for updating a virtual terminal associated with a secure network are disclosed. One method includes validating at a service enclave an identity of a user of a virtual terminal. The service enclave includes an authorization server, and the virtual terminal is generated from a trusted set of processing modules executing from a secure boot device at a client computing device. The method further includes authorizing the user of the virtual terminal to access a customer enclave and an update enclave based on security credentials received from the virtual terminal. The method also includes, while the user of the virtual terminal establishes a secure connection between the client computing device and the customer enclave, transmitting updates from the update enclave to the client computing device, thereby updating the trusted set of processing modules.2012-04-05
20120084563Systems and methods for multi-factor remote user authentication - What is disclosed is a handheld multi-factor remote user authentication card device in the form factor of a prior art one factor of “what you have” security card. The handheld multifactor card-device has innovative features that enable this single card device itself to function and accomplish a multifactor remote user authentication of “what you know”, “what you have”, “where you are” and “what you are”, factors to a network. The authentication logic dynamically adjusts what factors are applicable for specific security application enabling a universal remote authentication card-device.2012-04-05
20120084564SECURITY OPERATION METHOD AND SYSTEM FOR ACCESS POINT - A system and a method of operating a security for an Access Point (AP) are provided. The method includes sending, by a mobile terminal, a key code conversion request message to the AP, generating, by the AP, a conversion key code in response to the key code conversion request message, sending, by the AP, the generated conversion key code to the mobile terminal, and accessing, by the mobile terminal, the AP based on the received conversion key code.2012-04-05
20120084565CRYPTOGRAPHIC DEVICE THAT BINDS AN ADDITIONAL AUTHENTICATION FACTOR TO MULTIPLE IDENTITIES - Binding a security artifact to a service provider. A method includes generating a pseudonym for a security artifact. The pseudonym is an identifier of the security artifact to the service provider that is unique to the service provider in that the pseudonym is not used to identify the security artifact to other service providers. Further, the pseudonym uniquely identifies the particular security artifact to the service provider even when a user has available a number of different security artifacts to authenticate to the same service provider to access a user account for the user. The method further includes providing the pseudonym for the security artifact to the service provider. The pseudonym for the security artifact is bound with a user account at the service provider for a user associated with the security artifact.2012-04-05
20120084566METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHIC SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS - Methods and systems for providing secure access to network resources are disclosed. A method includes defining in a provisioning utility one or more communities of interest, each community of interest including one or more users and associated with a key. The method includes providing a service key to a client computing device that is useable to establish a secure connection to a service enclave including an authorization server. The method also includes transmitting from the authorization server, for each community of interest including an identified user of the client computing device, an identity of a customer enclave and a key associated with a community of interest including the user of the client computing device, the community of interest including computing resources included in the customer enclave.2012-04-05
20120084567GROUP SIGNATURE SYSTEM AND METHOD PROVIDING CONTROLLABLE LINKABILITY - A group signature system includes: a key issuer server for generating a first parameter of a group public key, generating a corresponding master issuing key, and issuing a signature key to a user when a user device joins; an opener server for generating a second parameter of the group public key, and a corresponding master opening key and master linking key; and a linker server for checking whether two valid signatures have been linked by using the master linking key when the two signatures corresponding to a group public key are given. The group signature system further includes: a signature verifying unit for confirming a validity of the given signatures and a signer information confirming unit for confirming a validity of singer confirming information generated by the opener server.2012-04-05
20120084568Lightweight Secure Neighbor Discovery Protocol for Low-Power and Lossy Networks - An apparatus comprising a network node configured to support a lightweight secure neighbor discovery (LSEND) protocol for securing neighbor discovery protocols (NDP) for energy-aware devices, wherein the network node is configured to wirelessly communicate with a host node, wherein the network node is configured to exchange LSEND protocol messages with the host node, and wherein the LSEND protocol uses reduced public key and signature sizes and more lightweight signature calculations in comparison to a secure neighbor discovery (SEND) protocol for securing NDP communications that are more suitable for low-power and lossy networks (LLNs).2012-04-05
20120084569Method for Creating a Secure Dataset and Method for Evaluating the Same - A method is provided for creating a secure dataset using a software application running on a data processing system, wherein the method comprises the following steps: receiving digital image data (2012-04-05
20120084570Remote Resources Single Sign On - Exemplary techniques for enabling single sign-on to an operating system configured to conduct a remote presentation session are disclosed. In an exemplary embodiment, a user credential can be encrypted using an encryption key generated by a remote presentation session server and sent to a client. The client can send the encrypted user credential to the remote presentation session server. The remote presentation session server can decrypt the user credential and use it to log a user into an operating system running on the remote presentation session server. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures.2012-04-05
20120084571IMAGE-BASED KEY EXCHANGE - This disclosure is directed for improved techniques for configuring a device to generate a secondary password based at least in part on a secure authentication key. The techniques of this disclosure may, in some examples, provide for capturing, by a computing device, an image of a display of another computing device. The captured image includes at least one encoded graphical image, such as a barcode, that includes an indication of the content of a secure authentication key. The computing device may use the secure authentication key to generate a secondary password to be used in conjunction with a primary password to gain access to a password-protected web service.2012-04-05
20120084572SECURE DEVICE SHARING - A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device with others but maintain security over aspects of the device. A task change request is evaluated to determine whether the requested task is permitted and, if so, the requested task is allowed; if not, then an authorization process is invoked to prompt the user to input authorization data. Upon verification of the authorization data, the device may be unlocked and the requested change implemented. The permitted tasks may designate specific applications, specific operations or functions within applications or at the operating system level, one or more currently open windows, and other levels of granularity.2012-04-05
20120084573SECURITY PROTECTION FOR MEMORY CONTENT OF PROCESSOR MAIN MEMORY - Subject matter disclosed herein relates to memory devices and security of same.2012-04-05
20120084574INFORMATION STORAGE APPARATUS, INFORMATION STORAGE METHOD, AND ELECTRONIC DEVICE - According to one embodiment, there is provided an information storage apparatus, including: a plurality of nonvolatile memories configured to store encryption information so that the stored encryption information are read out therefrom; a plurality of encryption processing modules provided correspondingly with the respective memories, and configured to encrypt the information to be stored in the memories and to decrypt the encryption information read out from the memories; and a storage processing module configured to collectively store a plurality of key information that are utilized when the encryption processing modules encrypt the information to be stored or decrypt the encryption information read out.2012-04-05
20120084575Synchronized Voltage Scaling and Device Calibration - A method is provided for scaling voltage in an integrated circuit. A calibration operation is performed on a functional module on the integrated circuit periodically at a rate T1. At least one parameter on the integrated circuit in monitored to determine when a performance threshold is reached. A change is initiated to an operating voltage for a portion of the integrated circuit in response to reaching the threshold. The rate of performing calibration operation is increased to a higher rate T2 for a window of time W in response to initiating the change in operating voltage, after which the rate of performing calibration is returned to the rate T1.2012-04-05
20120084576INFORMATION PROCESSING APPARATUS AND POWER SUPPLY CONTROL METHOD - According to one embodiment, an information processing apparatus includes: an optical disk apparatus; a receiver which receives a command indicating that a tray provided in the optical disc apparatus is ejected; a power supply module which supplies electric-power to each of modules of the information processing apparatus; and a power supply controller which controls supply of electric-power to each of the modules from the power supply module. When the supply of electric-power to each of the modules is stopped, the power supply controller continues the supply of electric-power to the optical disc apparatus during a certain time. When the power supply controller receives the command within the certain time, the power supply controller ejects the tray and stops the supply of electric-power to the optical disc apparatus.2012-04-05
20120084577CHARGE PUMP APPARATUS, A MEMORY INTEGRATED CIRCUIT AND METHODS OF POWER SUPPLY - A power supply, and a method of controlling the power supply, in which more or less power capacity of the power supply is activated depending on the state of a digital data signal on a data bus. The power supply has a control circuit which detects the number of “zero” bits present on the data bus, and responsively activates one or more of a plurality of power supply circuits such as charge pump circuits. The outputs of the charge pump circuits are mutually connected to a driver adapted to program memory cells of a flash memory circuit. A charge pump apparatus and a memory integrated circuit are also described.2012-04-05
20120084578Using a Single Terminal for a Power Enable Output Signal and Detecting an Over-Current Condition - A power controller for a peripheral bus interface. A peripheral bus power controller includes a first terminal, a second terminal coupled to receive an power enable input signal from a host controller, and a third terminal coupled to provide an over-current output signal indicative of an over-current condition to the host controller. The peripheral bus power controller further includes an enable circuit configured to assert a power enable output signal on the first terminal responsive to receiving the power enable input signal and a first buffer configured to provide the over-current output signal to the host controller responsive to the power controller detecting the over-current condition on the first terminal.2012-04-05
20120084579Power Distribution To Computer System - Power distribution to computer systems. At least some of the illustrative embodiments are systems including a power supply configured to convert an alternating current (AC) power signal to a direct current (DC) power signal (and the power supply comprising a first power port and a second power port, the second power port different than the first power port), a first computer system coupled to the first power port (the power supply configured to provide DC operational power to the first computer system through the first power port, and the first computer system the only computer system receiving operational power through the first power port), and a second computer system different than the first computer system (the second computer system coupled to the second power port, the power supply configured to provide DC operational power to the second computer system through the second power port, and the second computer system the only computer system receiving operational power from the second power port).2012-04-05
20120084580Power Budget Allocation in Multi-Processor Systems - Systems, apparatuses, methods, and software that implement power budget allocation optimization algorithms in multi-processor systems, such as server farms. The algorithms are derived from a queuing theoretic model that minimizes the mean response time of the system to the jobs in the workload while accounting for a variety of factors. These factors include, but are not necessarily limited to, the type of power (frequency) scaling mechanism(s) available within the processors in the system, the power-to-frequency relationship(s) of the processors for the scaling mechanism(s) available, whether or not the system is an open or closed loop system, the arrival rate of jobs incoming into the system, the number of jobs within the system, and the type of workload being processed.2012-04-05
20120084581POWER SUPPLY CONTROL APPARATUS, ELECTRIC DEVICE, POWER SUPPLY CONTROL SYSTEM, AND POWER SUPPLY CONTROL METHOD AND PROGRAM - A power supply control apparatus includes an opening/closing unit that is used for starting or stopping power supply to an electric device, a reception unit configured to receive power-supply-control information that is transmitted from the electric device, and a control unit configured to control the opening/closing unit based on the power-supply-control information that is received by the reception unit.2012-04-05
20120084582STORAGE DRIVE MANAGEMENT - With embodiments of the invention, a more robust solution is provided using a storage driver that may already be used for the platforms operating system. This is efficient because the storage driver typically already monitors storage drive access requests, and thus knows when traffic is outstanding (performance may be critical) or when it's not outstanding (and power may be saved).2012-04-05
20120084583DATA TRANSFORM METHOD AND DATA TRANSFORMER - A data transform method and a data transformer. The method includes: importing a data transform rule; acquiring from the data transform rule a source data definition, a destination data definition and a data transform rule definition; predicting resource energy consumption parameters of a data transform node server according to the source data definition, the destination data definition and the data transform rule definition; and deploying a resource energy consumption optimization policy of the data transform node server according to the predicted resource energy consumption parameters of the data transform node server.2012-04-05
20120084584POWER MANAGEMENT METHOD AND APPARATUS - A power management method in a user terminal receives a power from a power supply unit to charge a system voltage, compares the system voltage with a preset voltage, and controls a power input from the power supply unit according to the comparison result.2012-04-05
20120084585INFORMATION PROCESSING APPARATUS CAPABLE OF REMOTE POWER CONTROL, POWER CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An information processing apparatus that has a plurality of functional units and is capable of communicating with a power monitoring apparatus and supplying power to an appropriate functional unit according to whether a main power switch is operated by an operator or a power-on instruction is received from the power monitoring apparatus. Power that should be supplied to the plurality of functional units is generated. When the main power switch is manually operated by the operator in a state where the generated power is not supplied to the plurality of functional units, control is performed to supply the generated power to the plurality of functional units. In response to the power-on instruction received in a state where the generated power is not supplied to the plurality of functional units, control is provided to supply the generated power to functional units designated in advance among the plurality of functional units.2012-04-05
20120084586METHOD, DEVICE, AND SYSTEM FOR GUARANTEED MINIMUM PROCESSOR POWER STATE DWELL TIME - A method, device, and system are disclosed. In one embodiment the method includes causing a processor to enter into a first power state. Then an interrupt is received that signals the processor to leave the first power state. The method continues by causing the processor to remain in the first power state if the interrupt was received less than a minimum dwell time after the processor entered the first power state.2012-04-05
20120084587Automated Power Management of a Peripheral Device - Based on bounds of a period of reduced operation for a base device, a base device generates a power management message for transmission to a peripheral device. In the power management message, the base device inserts bounds of a period of reduced operation for the peripheral device. As a result, the periods of reduced operation conserve battery power in both devices and the two devices may reestablish a communications channel upon reaching the end of the period of reduced operation and resuming normal operations.2012-04-05
20120084588VOLTAGE REGULATOR WITH DRIVE OVERRIDE - Techniques to enable voltage regulators to adjust for coming load changes are presented herein. In some embodiments, a functional block such as a microprocessor core having an associated clock signal is powered by at least one switching-type voltage regulator. When the functional block is about to require an increased level of power, the associated clock is provided to drive the at least one regulator switches overriding their normal drive signal, which has a lower frequency. Thus, the switches are driven at a higher frequency sufficiently prior to (e.g., just ahead of) the load change to reduce the amount of droop that would otherwise occur.2012-04-05
20120084589Hardware Dynamic Cache Power Management - In an embodiment, a control circuit is configured to transmit operations to a circuit block that is being powered up after being powered down, to reinitialize the circuit block for operation. The operations may be stored in a memory (e.g. a set of registers) to which the control circuit is coupled. In an embodiment, the control circuit may also be configured to transmit other operations from the memory to the circuit block prior to the circuit block being powered down. Accordingly, the circuit block may be powered up or powered down even during times that the processors in the system are powered down (and thus software is not executable at the time), without waking the processors for the power up/power down event. In an embodiment, the circuit block may be a cache coupled to the one or more processors.2012-04-05
20120084590IMPLEMENTING SLEEP LINES IN COMMODITY ETHERNET HARDWARE - A first Network Interface Controller operates in a low power mode. The first Network Interface Controller transitions from low power mode to a power-up sequence if a sleep packet in not received from a second Network Interface Controller at the first Network Interface Controller within a predetermined time threshold.2012-04-05
20120084591POWER MANAGEMENT SYSTEMS AND METHODS - Systems and methods for efficiently managing power consumption in portable electronic devices are provided. In one embodiment, power management circuitry may operate the device in a low power mode (e.g., a HIBERNATION mode), but enables the device to quickly become fully operational in response to a power-ON event, despite having been in that low power mode. This may be accomplished by powering a processor engaging memory (e.g., SDRAM) while other circuitry are powered OFF. In another embodiment, the display may be driven by an application portion when operating in an ON mode, but may be driven by a carrier portion when the application is operating in a low power mode. In another embodiment, various discrete circuitry portions are selectively turned ON and OFF, depending, for example, on whether a particular discrete circuitry portion is idle or its processing functionality is not needed.2012-04-05
20120084592POWER MANAGEMENT SYSTEM, METHOD THEREOF AND STORAGE MEDIUM - A power management method for a host computer, which is coupled to a USB hub, is provided. It prevents the USB hub from entering into a suspend mode while the host computer stays in a host active state. The method includes the following steps: a filter driver is loaded. When detecting a specified event, the filter driver issues a device sleep IRP request to control the USB hub enter into a suspend mode. Wherein the specified event represents that the host computer enters into a host sleep state.2012-04-05
20120084593METHOD AND SYSTEM FOR PROVIDING A CURRENT TIME VALUE - A method for providing applications with a current time value includes receiving a trap for an application to access a time memory page, creating, in a memory map corresponding to the application, a mapping between an address space of the application and the time memory page in response to the trap, accessing, based on the trap, a hardware clock to obtain a time value, and updating the time memory page with the time value. The application reads the time value from the time memory page using the memory map.2012-04-05
20120084594USB DEVICE WITH A CLOCK CALIBRATION FUNCTION AND METHOD FOR CALIBRATING REFERENCE CLOCKS OF A USB DEVICE THEREOF - A USB device with a clock calibration function and a method for calibrating reference clocks of a USB device are provided. A USB 2.0 initial calibration is performed on the USB device in order to control an embedded oscillator (EMOSC) of the USB device to output a first reference clock compliance USB 2.0 specification and USB 3.0 specification during the initialization phase. After that, a USB 3.0 on-line calibration is performed on the USB device in order to control the EMOSC of the USB device to calibrate a second reference clock during a super-speed mode of USB 3.0 specification.2012-04-05
20120084595OPTIMIZED RECOVERY - A method, article of manufacture, and apparatus for restoring data. In some embodiments, this includes determining an object to be recovered, determining a representation of the object, and requesting the representation of the object from a data resource system. In some embodiments, the representation of the object is a hash value of the object. In some embodiments, the representation of the object is a segment of the object.2012-04-05
20120084596MONITORING CIRCUIT - A monitoring circuit monitors for the occurrence of a failure event on a data bus. The monitoring circuit includes a failure detection circuit for detecting the occurrence of the failure event within a device coupled to the data bus. An isolation circuit isolates the device from the data bus in response to the occurrence of the failure event.2012-04-05
20120084597COMPUTER SYSTEM AND DATA PROCESSING METHOD FOR COMPUTER SYSTEM - A plurality of computers to execute jobs, a management computer to manage the execution of jobs and the disposition of data in the computers and a storage device storing data are interconnected via a network. The management program for the management computer divides the data into distributed data according to hint information and distributively disposes the distributed data and their replicas in memory storages allocated in memories of the computers. The computers execute the job using the distributed data allocated to their own memory. In the event of a fault in any of the computers, the management computer requests computers having the replicas of those distributed data disposed in the faulted computer to re-execute the job.2012-04-05
20120084598System and Method for Providing Total Real-Time Redundancy for a Plurality of Client-Server Systems - An automated and scalable system for total real-time redundancy of a plurality of client-server systems, wherein, data is replicated through a network connection and operationally located on a virtual machine that substitutes for a failed client-server system, wherein the virtual machine is activated and installed on the cloud computing environment. Monitoring applications are installed on both the client-server systems and the cloud computing environment. System components are identified, a network connection is initiated, a heartbeat is established, data replication is automated, system failure is detected, failover is initiated, and subsequent client-server restoration is automated.2012-04-05
20120084599FAILOVER INFORMATION MANAGEMENT DEVICE, STORAGE PROCESSING DEVICE, AND FAILOVER CONTROL METHOD - A failover information management device manages information on a failover system including two storage processing devices to each of which a storage medium is connectable. The failover information management device stores unsuitability information from which a combination of two storage processing devices determined to be unsuitable for constituting the failover system is identifiable.2012-04-05
20120084600METHOD AND SYSTEM FOR DATA RECONSTRUCTION AFTER DRIVE FAILURES - Methods and systems for data reconstruction following drive failures may include: storing data across two or more drives in one or more data stripes, each data stripe including two or more drive extents; detecting a degradation of a drive containing a drive extent associated with a first data stripe; assigning a reconstruction priority to the drive extent associated with the first data stripe; detecting a degradation of a drive containing a drive extent associated with a second data stripe; and assigning a reconstruction priority to the drive extent associated with the second data stripe.2012-04-05
20120084601COMPUTER SYSTEM RESCUE METHOD - A computer system rescue method uses the AMtek iTablet Recovery to diagnose, unfold, restore an operating system with a Windows Pre-install Environment (WinPE) component and back up or recover an operating system or data with a Windows APIs image component. Firstly, in the low-level disk formatting, a disk area is selectively partitioned into three primary sectors and n logical partitions, or is unconfigured for installation of Linux. After installing the Windows system and the operating system used by the user in one primary sector, the AMtek iTablet Recovery is particularly installed in another sector or a mass storage device such as a plug-and-play portable hard drive, and then all the old data of the user is moved to the Windows.old directory through the AMtek iTablet Recovery, thus separating the booting system from the operating system, in which manner, when the computer of the user is infected with a virus, the operating system is unstable or the computer fails to boot normally, the AMtek iTablet Recovery can reinstall or recover the operating system.2012-04-05
20120084602FAULT RESTORATION APPARATUS AND METHOD FOR USE IN A VIRTUAL ENVIRONMENT - A fault restoration technique for use in a virtual environment is provided. The fault restoration technique includes monitoring fault state values of a plurality of domains, detecting a faulty domain, if any, from the plurality of, and restoring the faulty domain by reloading the OS of the faulty domain.2012-04-05
20120084603EVALUATION OF MULTIPLE INPUT SIGNATURE REGISTER RESULTS - Provided is an apparatus that includes a processor comprising a plurality of processing cores and a corresponding plurality of LBIST modules, each LBIST module corresponding to one of the plurality of processing cores; a MISR read out connection, comprising a compare value register, a plurality of MISR registers equal in number to the plurality of cores, each MISR register corresponding to one of the plurality of processing cores and a corresponding plurality of XOR logic gates, each XOR logic gate coupled to the compare value register and a corresponding one of the MISR registers and configured to signal whether or not the event the compare value register and the corresponding MISR register match and logic, stored and executed on the processor, for transmitting the signals generated by the plurality of XOR logic gates.2012-04-05
20120084604Automation system for testing and measurement of system and device parameters, and control and automation of systems - A system and apparatus which allows for superior testing and measurement, as well as control and automation capabilities. This invention comprises a modular foundational system for automation that provides essential building blocks for a variety of test, measurement and internal/external control demands. The essentials include IEEE-488 communications capability which matches the caliber of large test stand, thus providing a configurable system that possesses great capabilities in test, measurement and automation, without prohibitive cost and complexities for the user. The platform described herein is also well suited for portable applications as the system does not occupy a significant amount of space.2012-04-05
20120084605REPLAYING CAPTURED NETWORK TRAFFIC - Systems, methods, and machine readable and executable instructions are provided for replaying captured network traffic. A method for replaying captured network traffic can include replaying multiple captured network traffic files simultaneously on the same network device, the captured network traffic files including original network traffic captured from N original connections between C original clients and S original servers. During replaying, rewriting IF addresses and/or port number information of data packets comprising the original network traffic to reflect test network traffic from M test connections between X test clients and Y test servers, where at least X is different than C or Y is different than S. The method further includes modifying checksums, during replaying, to correct values corresponding to the rewritten IF addresses and port number information. N, C, S, M, X, and Y are positive integers.2012-04-05
20120084606MANAGEMENT APPARATUS, METHOD FOR CONTROLLING SAME, AND STORAGE MEDIUM FOR SAME - A device management apparatus acquires the state of a device (image forming apparatus), and determines whether or not an error occurring in the image forming apparatus is the already-occurred error based on the change in the state of the image forming apparatus. When the error occurring in the image forming apparatus is an already-occurred error, the device management apparatus determines whether or not the error continues for a period of time equal to or longer than a predetermined period of time. When the error continues for a period of time equal to or longer than a predetermined period of time, the device management apparatus changes an error notification destination, and retransmits an electronic mail regarding the error to the changed notification destination.2012-04-05
20120084607FACILITATING LARGE-SCALE TESTING USING VIRTUALIZATION TECHNOLOGY IN A MULTI-TENANT DATABASE ENVIRONMENT - A system and method for testing in a database system. In one embodiment, a method includes receiving an indication of one or more changes to a software application, wherein each change corresponds to a different version of the software application. The method further includes generating one or more virtual machines for a version of the software application in response to the indication, wherein the one or more virtual machines test the version of the software application.2012-04-05
20120084608Mechanism for Performing Verification of Template Integrity of Monitoring Templates Used for Customized Monitoring of System Activities - A mechanism for performing verification of template integrity of monitoring templates used for customized monitoring of system activities. A method of embodiments of the invention includes calculating a first hash code for a monitoring template, the monitoring template to customize a performance monitor to serve as a universal monitor to facilitate a plurality of monitoring tools to perform monitoring of activities of a plurality of system components of the computer system, extracting the first hash code from the monitoring template, and calculating a second hash code for the monitoring template. The method further includes verifying integrity of the monitoring template by comparing the first hash code with the second hash code, and the integrity of the monitoring template is determined to be satisfactory if the first hash code matches the second hash code.2012-04-05
20120084609Method and System to Extract a Navigation Model for Analysis of a Web Application - In one embodiment, a method includes automated extraction of the Page Transition Graph (PTG) model for model-based analysis of web applications. Specifically, the method includes accessing one or more JAVASERVER PAGES (JSP) files, one or more Extensible Markup Language (XML) configuration files, and one or more class files of a web application; parsing the JSP files and extracting data in the JSP files that encode user or server events supported by the event-driven application; parsing the XML configuration files and extracting data in the XML configuration files that encode definitions used by the event-driven application when deployed; parsing the class files and extracting data in the class files that encode one or more actions or one or more forms used by the event-driven application when deployed; storing the extracted data as an abstract syntax tree (AST); populating a page transition graph (PTG) of the event-driven application based on the AST; and checking the extracted PTG for navigation errors such as unreachable pages, ghost pages and undefined transitions.2012-04-05
20120084610METHOD AND DEVICE FOR READING AND WRITING A MEMORY CARD - The present invention discloses a method and device for reading a memory card comprising a primary partition and at least one backup partition. The method comprises the following steps that: after writing a first file into the primary partition of the memory card, a read/write device writes the first file into the at least one back partition; and when reading a second file from the memory card, the read/write device reads the second file from the at least one backup partition or from the primary partition if an error occurs in the reading of the second file from the backup partition. The method and device provided herein address the problems existing in the prior art that an embedded system is unstable because of the low error tolerance of a memory card.2012-04-05
20120084611Apparatus, System, and Method for Bad Block Remapping - An apparatus, system, and method are disclosed for bad block remapping. A bad block identifier module identifies one or more data blocks on a solid-state storage element as bad blocks. A log update module writes at least a location of each bad block identified by the bad block identifier module into each of two or more redundant bad block logs. A bad block mapping module accesses at least one bad block log during a start-up operation to create in memory a bad block map. The bad block map includes a mapping between the bad block locations in the bad block log and a corresponding location of a replacement block for each bad block location. Data is stored in each replacement block instead of the corresponding bad block. The bad block mapping module creates the bad block map using one of a replacement block location and a bad block mapping algorithm.2012-04-05
20120084612METHOD OF CONTROLLING A TEST MODE OF A CIRCUIT - A test vector decode circuit includes a lockout circuit to prevent inadvertent latching of output vectors. The test vector decode circuit is driven by an additional output vector from the test vector decode circuit. The additional output vector, as well as the other output vectors, undergo at least one latching. A signal transmitted by the additional output vector as a result of the final latching activates the lockout circuit. The test vector decode circuit also receives a supervoltage signal. Only by turning off the supervoltage signal can all of the output test vectors be reset, including the additional output vector.2012-04-05
20120084613SCAN RESPONSE REUSE METHOD AND APPARATUS - The disclosure describes a novel method and apparatus for allowing response data output from the scan outputs of a circuit under test to be formatted and applied as stimulus data input to the scan inputs of the circuit under test. Also the disclosure described a novel method and apparatus for allowing the response data output from the scan outputs of a circuit under test to be formatted and used as expected data to compare against the response data output from the circuit under test. Additional embodiments are also provided and described in the disclosure.2012-04-05
20120084614SERIAL SCAN CHAIN IN A STAR CONFIGURATION - A method implemented to test a plurality of components coupled in a star configuration, each component having a test access port (TAP) controller. The method comprises performing a capture phase of a scan operation on all of the TAP controllers in the star configuration and sequentially selecting one of the TAP controllers at a time to perform a shift state. When all of the TAP controllers have been sequentially selected to perform the shift phase, the method further comprises selecting all of the TAP controllers to perform an update phase.2012-04-05
20120084615FAULT INFORMATION MANAGING METHOD AND FAULT INFORMATION MANAGING PROGRAM - To save the records of an instant fault generation history and an instant fault recovery history without omission, and to pursue the cause of the fault that causes data error and the like as well as to perform recovery works and the like accurately. Each of fault generation notifications transmitted from main signal packages are stored to an instant fault generation history table provided to a storage module of a monitoring control package along a time series cyclically without exception, and each of fault recovery notifications transmitted in accordance with a detection of recovery of the fault corresponding to each of the stored fault generation notifications is stored to the instant fault generation history storage table by corresponding to each of the fault generation notifications already stored to the instant fault generation history storage table.2012-04-05
20120084616BLOCK ACKNOWLEDGEMENT WITH RETRANSMISSION POLICY DIFFERENTIATION - One feature provides a Block Acknowledgement Retransmission Policy (BARP) frame that permits a transmitter to define a retransmission policy on a per-frame basis for frames transmitted in a block of frames. A block acknowledgement retransmission policy (BARP) frame is generated by a transmitter that individually identifies a retransmission policy for each frame in a block of frames. The BARP frame is then transmitted to a receiver, allowing the receiver to know which frames within a block of frames will be retransmitted and which frames will not be retransmitted.2012-04-05
20120084617MODIFIED PROGRESSIVE EDGE-GROWTH LDPC CODES FOR ULTRA-HIGH-SPEED SERIAL OPTICAL TRANSPORT - Systems and methods enabling ultra-high-speed optical transport The systems and methods include receiving a modulated, encoded input stream. Channel impairments are removed using MAP equalization. Symbols are detected in the input stream to produce a stream of encoded data. The stream of encoded data is decoded with one or more low density parity check (LDPC) decoders that use an LDPC code built by modified progressive edge growth. The LDPC code is built by iteratively expanding trees from each variable node until all check nodes are connected to the respective variable node, while controlling both the local girth and the global girth of the code.2012-04-05
20120084618JOINTLY ENCODING A SCHEDULING REQUEST INDICATOR AND ACKNOWLEDGMENTS/NEGATIVE ACKNOWLEDGMENTS - A User Equipment (UE) configured for jointly encoding a Scheduling Request Indicator (SRI) and Acknowledgments/Negative Acknowledgments (ACK/NACKs) is disclosed. The UE includes a processor and instructions stored in memory. The UE generates a Scheduling Request Indicator (SRI) bit and a plurality of Acknowledgement/Negative Acknowledgement (ACK/NACK) bits. The UE also encodes the SRI bit and the plurality of ACK/NACK bits with unequal error protection to generate a jointly-encoded SRI and ACK/NACK message and transmits the jointly-encoded SRI and ACK/NACK message.2012-04-05
20120084619METHOD AND ARRANGEMENT FOR BLIND DEMULTIPLEXING A POLARISATION DIVERSITY MULTIPLEX SIGNAL - A received optical signal (S2012-04-05
20120084620TRANSMISSION DEVICE AND RECEIVING DEVICE - A transmission device according to the present invention splits information bits, calculates two parity bit sequences from the split information bits, combines the parity bit sequences with information bits (encoded information bit) such that the calculated two parity bit sequences are not added to the same information bits. Then, the transmission device changes the order of the combined information, distributes each of the reordered information to levels L2012-04-05
20120084621DIGITAL BROADCASTING SYSTEM AND METHOD OF PROCESSING DATA - A digital broadcast system and a method of processing data are provided. The transmitting system of the digital broadcast system includes an encoder for encoding mobile data for FEC to build RS frames, a signaling encoder for encoding TPC data including the RS frame mode information, a divider for dividing at least one of the RS frames into a plurality of portions, a block processor for converting one portion to a plurality of SCCC blocks, a converter for converting the SCCC blocks to data blocks, a group formatter for forming data groups, a packet formatter for forming data packets including data in the data groups, a multiplexer for multiplexing main data packets including main data and the data packets, a trellis encoder for performing trellis encoding on data in the multiplexed data packets and a transmission unit for transmitting the broadcast signal including a parade of the data groups.2012-04-05
20120084622SYSTEM AND METHOD OF DATA ENCODING - A method includes reading data from a data area of a word line and reading first ECC data from an ECC area of the word line. The method also includes, in response to determining that an error indicator exceeds a threshold, storing second ECC data in the ECC area. The second ECC data corresponds to a subsection of the data area.2012-04-05
20120084623ERROR CORRECTION METHOD AND DATA REPRODUCTION DEVICE - The error correction processing includes: data reproduction processing of reproducing recording data, constituted by a plurality of data units each made of a plurality of bits, from a recording medium sequentially; error correction processing of performing error correction in the row direction and error correction in the column direction at least once for an error correction code block that has the reproduced recording data arranged in the row direction over a plurality of rows; determination processing of determining whether uncorrectable data is left behind after execution of the error correction processing; and erasure correction processing of performing, when it is determined that uncorrectable data is left behind, column-direction error correction considering data constituting at least one row of the error correction code block as erasure data, even in cases where uncorrectable data in the error correction in the row direction is not left behind.2012-04-05
20120084624DTV TRANSMITTING SYSTEM AND RECEIVING SYSTEM AND METHOD OF PROCESSING BROADCAST DATA - A DTV transmitting system includes a frame encoder, a randomizer, a block processor, a group formatter, a deinterleaver, and a packet formatter. The frame encoder builds an enhanced data frame and encodes the frame two times for first and second error correction, respectively. It further permutes a plurality of encoded data frames. The randomizer randomizes the permuted enhanced data, and the block processor codes the randomized data at a rate of 1/N1. The group formatter forms a group of enhanced data having one or more data regions and inserts the data coded at the rate of 1/N1 into at least one of the data regions. The deinterleaver deinterleaves the group of enhanced data, and the packet formatter formats the deinterleaved data into enhanced data packets.2012-04-05
20120084625APPARATUS AND METHOD FOR DECODING LDPC CODES IN A COMMUNICATIONS SYSTEM - An apparatus and method decode LDPC code. The apparatus includes a memory and a number of LDPC processing elements. The memory is configured to receive a LDPC codeword having a length equal to a lifting factor times a base LDPC code length, wherein the lifting factor is greater than one. The number of LDPC processing elements configured to decode the LDPC codeword, wherein each of the number of LDPC processing elements decode separate portions of the LDPC codeword.2012-04-05
20120084626System and Method for Adding a Storage Device to a Cluster as a Shared Resource - A system and method are described for adding a disk to a cluster as a shared resource. In one embodiment, a request is received to add a disk to a cluster as a shared disk resource. The disk may share a disk identifier with a second disk currently connected to the cluster as a shared resource. A determination is made as to which partition format is used by the disk. A unique disk identifier is retrieved and written to the disk in accordance with the determined partition format. The disk is then connected to the node as a shared disk resource. The disk may be a snapshot, mirror, or backup of the second disk currently connected to the cluster.2012-04-05
20120084627DATA RECOVERY USING OUTER CODEWORDS STORED IN VOLATILE MEMORY - Systems and methods are disclosed for data recovery using outer codewords stored in volatile memory. Outer codewords can be associated with one or more horizontal portions or vertical portions of a non-volatile memory (“NVM”). In some embodiments, an NVM interface of an electronic device can program user data to a super block of the NVM. The NVM interface can then determine if a program disturb has occurred in the super block. In response to detecting that a program disturb has occurred in the super block, the NVM interface can perform garbage collection on the super block. The NVM interface can then use outer codewords associated with the super block to recover from any uncorrectable error correction code errors detected in the super block.2012-04-05
20120084628RAM SINGLE EVENT UPSET (SEU) METHOD TO CORRECT ERRORS - An error detection and correction (EDAC) circuit mitigates the effect of single event upsets (SEU) events in a redundant memory system. The EDAC circuit includes a first input for receiving first data and parity information stored by a first memory device and a second input for receiving second data and parity information stored by a second memory device. First parity check logic calculates parity for the received first data and parity information. Second parity check logic calculates parity for the received second data and parity information. Bit comparison logic detects differences between the first data and the second data, and between the first parity information and the second parity information. Based on the parity check calculated for the first and second data, and the bit comparison, data select logic selects either the first data or the second data for provision to a data bus.2012-04-05
20120084629Systems and Methods for Generating Sitelets Using Information Assets - A definition of an information category a user wishes to publish to the Internet is received from a user. At least one information asset comprising a link to an information data object is received and assigned to the information category. Sitelet generation parameters are received from the user, including a sitelet category comprising the information category, and optionally, other sitelet generation parameters such as data feed types and additional information categories. A sitelet is then generated using the sitelet category and any other supplied sitelet generation parameters. The sitelet comprises a data feed of a first data feed type comprising a representation of the information assets assigned to the sitelet category and any additional information categories. The data feed type can be in any standard format, such as RSS or ATOM, or any custom format, such as iFrame HTML, XML or JSON. If the user specifies more than one data feed type, sitelets are generated for each data feed type.2012-04-05
20120084630Generating Behavior Information For a Link - A computer-implemented method includes receiving a request for a web page; retrieving information associated with the web page, wherein the information comprises a link and one or more link placeholders associated with the link; determining context information associated with the computing device;2012-04-05
20120084631SYSTEM AND METHOD OF EMBEDDING SYMBOLOGY IN ALPHABETIC LETTERS AND THEN LINKING THE LETTERS TO A SITE OR SITES ON THE GLOBAL COMPUTER NETWORK - A system and method of embedding symbology in alphabetic letters and then linking the letter to a site or sites on the global computer network, i.e., the Internet, are provided. The system and method provide for capturing an image of at least one character fixed in a medium; determining at least one letter of an alphabet corresponding to the at least one character; determining a numerical value for the determined at least one letter; looking up in a database a hyperlink corresponding to the numerical value; and presenting the hyperlink on a display device. The system and method further provide determining at least one marking within the at least one letter; and determining a location for the at least one marking within the at least one letter, wherein the combination of the at least one marking and the location for the at least one marking corresponds to the numerical value.2012-04-05
20120084632METHOD AND APPARATUS FOR INSERTING ADDRESS OF HYPERLINK INTO BOOKMARK - A method of inserting an address of a hyperlink into a bookmark is provided, including selecting a portion of a document; analyzing a plurality of hyperlinks contained in the selected portion; extracting at least one address from the analyzed hyperlinks; and inserting the extracted addresses into the bookmark.2012-04-05
20120084633METHOD OF GENERATING A GRAPHICAL RESUME - The method of generating a graphical resume allows a user to produce either a conventional textual resume or a resume in a graphical format. A database is established and a plurality of templates are stored in the database. The templates include an informational template, a textual resume template and a plurality of graphical resume templates. Each of the templates includes at least one fillable resume field. The informational template is displayed to the user and bibliographic data entered by the user is stored in the database. A plurality of resume formats are then displayed. The plurality of resume formats correspond to the textual and the graphical resume templates. Upon selection of one of the resume formats, the at least one fillable resume field of the corresponding one of the textual and the graphical resume templates is filled with the bibliographic data stored in the database to produce a resume.2012-04-05
20120084634METHOD AND APPARATUS FOR ANNOTATING TEXT - Methods and apparatus are provided for annotating text displayed by an electronic reader application. In one embodiment a method includes detecting user selection of a graphical representation of text displayed by a device, displaying a window based on the user selection, the window including a selectable element for the user to annotate displayed text associated with the user selection. The method may further include detecting a user selection of a selectable element to record audio data based on the window, initiating audio recording based on the user selection to record audio data, and storing recorded audio data by the device as an annotation to the user selected text.2012-04-05
20120084635PARAMETERIZED TEMPLATE COMPRESSION FOR BINARY XML - Compression and decompression of XML and other structured documents uses parameterized templates. A region of a serialized document is nominated as a template, information units are annotated as fixed or parameter values, and the template is recorded with a template identifier. A template invocation represents the nominated records. Nominated regions can be nested, and they do not necessarily correspond to XML elements or other well-formed portions of the original document. Templates may be defined on the fly, after compression has started.2012-04-05
20120084636METHOD AND SYSTEM FOR WEB INFORMATION EXTRACTION - An example of a method includes determining features of a first type for a web page of a plurality of web pages. The method also includes electronically determining a plurality of rules for an attribute of the first web page, wherein the plurality of rules are determined based on features of the first type. The method also includes electronically identifying a first rule, from the plurality of rules, which satisfies a first predefined criterion. The first predefined criteria include at least one of a first threshold for a precision parameter, a second threshold for a support parameter, a third threshold for a distance parameter and a fourth threshold for a recall parameter. The method further includes storing the first rule to enable extraction of value of the attribute from a second web page.2012-04-05
20120084637IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND STORAGE MEDIUM STORING IMAGE PROCESSING PROGRAM - An image processing apparatus including: a display portion which displays a web page based on web page data; a specifying section which specifies, as a specific area, an area in the displayed web page; an object obtaining section which obtains an object included in the specified specific area; a relevant-information obtaining section which obtains relevant information associated with the obtained object; a map-image-data obtaining section which obtains map image data for displaying a map image, on the basis of a specific position which is a position on the map image, which indicates a position of the object specified by the obtained relevant information; and an output section which outputs obtained the object, the obtained relevant information, and the map image to be displayed based on the obtained map image data, to the display screen such that a position mark indicating the object is marked on the specific position on the map image.2012-04-05
20120084638TECHNIQUES CONTENT MODIFICATION IN AN ENVIRONMENT THAT SUPPORTS DYNAMIC CONTENT SERVING - Methods and apparatuses for collaboratively editing page content. Instances of classes are stored in a central repository, wherein the classes correspond to components of a page. Concurrent user access to the classes is provided. The page is updated in response to modifications to the page content made utilizing the one or more class instances.2012-04-05
20120084639APPLICATION SERVER PROVIDING PERSONALIZED VOICE ENABLED WEB APPLICATION SERVICES USING EXTENSIBLE MARKUP LANGUAGE DOCUMENTS - A unified web-based voice messaging system provides voice application control between a web browser and an application server via an hypertext transport protocol (HTTP) connection on an Internet Protocol (IP) network. The application server, configured for executing a voice application defined by XML documents, selects an XML document for execution of a corresponding voice application operation based on a determined presence of a user-specific XML document that specifies the corresponding voice application operation. The application server, upon receiving a voice application operation request from a browser serving a user, dynamically generates a personalized HTML page having media content and control tags for personalized execution of the voice application operation. Hence, a user can personalize any number of voice application operations, enabling a web-based voice application to be completely customized or merely partially customized.2012-04-05
20120084640RESOLVING PAGE REFERENCES IN LAYOUT DEPENDENT DOCUMENTS - A method for resolving references in electronic documents (EDs), including: obtaining an ED having a reference to an item; generating, based on the ED, an intermediate document (ID) for input to a layout engine; identifying an entry having an initial value for the reference; calculating, during a first rendering of the ED, a first page having the item based on the ID and the initial value substituted for the reference; populating the entry with a first page number corresponding to the first page; calculating, during a second rendering of the ED, a second page having the item based on the first page number substituted for the reference; populating the entry with a second page number corresponding to the second page; and generating, in response to the first page number equaling the second page number, a first rendered document based on the second page number substituted for the reference.2012-04-05
20120084641SECURELY RENDERING ONLINE ADS IN A HOST PAGE - One or more techniques and/or systems are disclosed for rendering online ads on a webpage. A first inter-frame communication channel is created, which comprises a first communication channel between a first cross-domain frame and a host page, such as the webpage. The first cross-domain frame comprises content from a domain that is different than that of the host page domain. A second inter-frame communication channel is created comprising a second communication channel between the first cross-domain frame and a second cross-domain frame in the host page.2012-04-05
20120084642BALANCING MULTIPLE COLUMN LAYOUT - A method for managing multiple columns in a document. The method includes obtaining a text stream from the document; obtaining a current fill limit associated with an initial column of the multiple columns; placing, using a layout engine, the text stream within the multiple columns according to the current fill limit; identifying, after placing the text stream, a first fill level of a final column of the multiple columns; calculating a first difference between the current fill limit and the first fill level of the final column; calculating, in response to the first difference exceeding a tolerance, a revised fill limit based on the current fill limit; placing, using the layout engine, the text stream within the multiple columns according to the revised fill limit.2012-04-05
20120084643COMPONENT-SPECIFIC AND SOURCE-AGNOSTIC LOCALIZATION - Various embodiments of systems and methods for component-specific and source agnostic localization are described herein. An adapter interface is provided for one or more adapters such that the one or more adapters implement the adapter interface with a plurality of sources having a plurality of data formats. The plurality of sources includes localization adaptation content. One or more localization bundles are created for one or more consuming components. Each localization bundle is associated with at least one adapter of the one or more adapters. The one or more localization bundles are registered with a localization service. The localization service is consumed for obtaining portions of the localization adaptation content required for the one or more consuming components.2012-04-05
20120084644CONTENT PREVIEW - Methods, systems and machine readable tangible storage media that can provide one or more previews of content of a file or other object are described. In one embodiment, a preview of content of external data that is referenced by a link within a document is presented while the document is presented (e.g. displayed) by a first application, and the preview can be displayed in a bubble that is adjacent to and points to the link; the content of the external data is not accessible to the first application in one embodiment and the preview is presented by a non-native application or service which cannot create or edit the content of the external data. Other embodiments are also described.2012-04-05
20120084645CUSTOMIZING EMAIL SUBJECTS FOR SUBSCRIPTION GENERATED EMAIL MESSAGES - A solution for permitting users to customize subject headings of email subscriptions is disclosed. The customizations can be applied on a per subscription basis and/or on a per sender basis. Further, the customizations can be performed by a software program that changes an original email heading established by a subscription providing source. Specifically, the solution recognizes that most, if not all, subscription emails are automatically generated in consistent fashion and inherently have a repeating structure. The disclosed solution permits a user to identity portions of these repeating structures, which are to be used to generate replacement subject headings designed to be meaningful to the user. The solution can optionally maintain the original subject heading, which can be used in many situations, such as for use when replying or forwarding an email.2012-04-05
20120084646INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An apparatus and method provide logic for processing information. In one implementation, an apparatus includes a receiving unit configured to receive an instruction from a user to access portions of content associated with pages of an electronic document. The apparatus also includes a control unit configured to identify a page of the electronic document currently displayed to the user. The control unit is further configured to generate, in response to the instruction, sequential images corresponding to a transition between the identified page and a successive page, based on at least a position of the identified page within the electronic document.2012-04-05
Website © 2025 Advameg, Inc.