Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


23rd week of 2009 patent applcation highlights part 56
Patent application numberTitlePublished
20090144515METHOD AND SYSTEM THEREOF FOR RESTORING VIRTUAL DESKTOPS - A method and system thereof for restoring a virtual desktop. The method comprising generating a try-snapshot upon selection of a restore point of the virtual desktop, wherein the try-snapshot is an empty file; linking the try-snapshot subsequently to a snapshot of the restore point without modifying snapshots created after the snapshot of the restore point; and using the try-snapshot as an active snapshot upon affirmation of said restore point.2009-06-04
20090144516SYSTEMS AND METHODS FOR MANAGING DATA STORAGE MEDIA - Systems and methods are provided for passive data migration. A method is presented for distributing data that includes acts of identifying a date by which a computer readable medium is to be decommissioned and restricting distribution of data to the computer readable medium to reach a state of data content suitable for decommissioning the computer readable medium by the identified date. A system implementing data migration includes a storage medium, an interface and a processor. The interface is adapted to receive information to be stored on a storage medium, and the processor is configured to restrict storage of the data on one storage medium based on a target decommission date for that storage medium.2009-06-04
20090144517DATA PROCESSING APPARATUS AND DATA PROCESSING SYSTEM - Decrease in throughput performance called a “jamming” in a memory device is prevented. There is provided a timing generation part which gives, based on a request signal outputted for each unit of the data processing from a data processing part, an output timing for a burst transfer request to a burst transfer request generation part. Based on the relationship in size between a lapsed time from the output of the burst transfer request to the activation of the request signal and a time specified by a set threshold value of a threshold value register, the timing generation part controls output timing for a burst transfer request. When the lapsed time exceeds the time specified by a maximum threshold value, the burst transfer request generation part is given an output timing for the burst transfer request without waiting for the activation of the request signal. As a result, when the issuance of the request signal is delayed, a next burst transfer request can be given to the memory device without waiting for the issuance but preceding it.2009-06-04
20090144518SYSTEM AND METHOD FOR STORAGE MANAGEMENT - A system and method for monitoring the storage estate of an organization using an interactive website that is configured to produce and display a novel set of key performance indicators (KPIs) related to the storage estate, including KPIs related to data collected from at least one of storage area network data and network attached storage data. In one embodiment, the novel set of KPIs includes one or more of protection efficiency, application efficiency, and snapshot overhead, where protection efficiency is calculated as a ratio of logical addressable data storage volume to total physical volume of data storage for storage area network data of the organization, application efficiency is calculated as a fraction of disk storage allocated to end user devices that is actually used by the end user devices for storage area network data, and snapshot overhead is calculated as a ratio of a volume of storage allocated for replicated copies of data to allocated storage for network attached storage data.2009-06-04
20090144519Multithreaded Processor with Lock Indicator - Systems and methods including a multithreaded processor with a lock indicator are disclosed. In an embodiment, a system includes means for indicating a lock status of a shared resource in a multithreaded processor. The system includes means for automatically locking the shared resource before processing exception handling instructions associated with the shared resource. The system further includes means for unlocking the shared resource.2009-06-04
20090144520METHOD AND APPARATUS FOR SELECTING A DATA ITEM - A method of selecting a data item from a memory within a first device, the method comprising the steps of evaluating within the first device a function of an input argument so as to form an output value, using the output value to select a data item from the memory and transmitting the selected data item to a second device.2009-06-04
20090144521METHOD AND APPARATUS FOR SEARCHING EXTENSIBLE MARKUP LANGUAGE (XML) DATA - Extensible Markup Language (XML) data is represented as a list of structures with each structure in the list representing an aspect of the XML. A set of frequently used elements is extracted from the list of structure representation and stored in packed vectors. The packed vector representation allows Single Instruction Multiple Data (SIMD) instructions to be used directly on the XML data to increase the speed at which the XML data may be searched while minimizing the memory needed to store the XML data.2009-06-04
20090144522Data Processing Device and Method - A data processing device comprising a multidimensional array of coarse grained logic elements processing data and operating at a first clock rate and communicating with one another and/or other elements via busses and/or communication lines operated at a second clock rate is disclosed, wherein the first clock rate is higher than the second and wherein the coarse grained logic elements comprise storage means for storing data needed to be processed.2009-06-04
20090144523MULTIPLE-SIMD PROCESSOR FOR PROCESSING MULTIMEDIA DATA AND ARITHMETIC METHOD USING THE SAME - A multiple-single instruction multiple data (SIMD) processor and an arithmetic method using the same are disclosed. When various arithmetic operations should be individually carried out by SIMD arithmetic units, control right is sub-divided to perform the arithmetic operations, such that the time of the arithmetic operations can be shortened and the efficiency thereof can be raised. When sub-divided control is not required, the control right is withdrawn and the arithmetic operations are carried out using a minimum number of program memories and a minimum number of SIMD arithmetic units, such that memory and power consumption thereof can be reduced.2009-06-04
20090144524Method and System for Handling Transaction Buffer Overflow In A Multiprocessor System - There is disclosed a method and apparatus for handling transaction buffer overflow in a multi-processor system as well as a transaction memory system in a multi-processor system. The method comprises the steps of: when overflow occurs in a transaction buffer of one processor, disabling peer processors from entering transactions, and waiting for any processor having a current transaction to complete its current transaction; re-executing the transaction resulting in the transaction buffer overflow without using the transaction buffer; and when the transaction execution is completed, enabling the peer processors for entering transactions.2009-06-04
20090144525APPARATUS AND METHOD FOR SCHEDULING THREADS IN MULTI-THREADING PROCESSORS - An multi-threading processor is provided. The multi-threading processor includes a first instruction fetch unit to receive a first thread and a second instruction fetch unit to receive a second thread. A multi-thread scheduler coupled to the instruction fetch units and a execution unit. The multi-thread scheduler determines the width of the execution unit and the execution unit executes the threads accordingly.2009-06-04
20090144526SYSTEM AND METHOD OF ACCESSING A DEVICE - A method of accessing a device is provided. A command is received from an agent, over a network, for executing at least one instruction for accessing the device. Information is sent to the agent, over the network, regarding the execution of the at least one instruction.2009-06-04
20090144527STREAM PROCESSING APPARATUS, METHOD FOR STREAM PROCESSING AND DATA PROCESSING SYSTEM - The present invention provides a stream processing apparatus capable of improving the processing performance in the case of continuously processing a plurality of data streams. A control stream, different from a data stream, is prepared, and a program and a parameter are updated in advance in accordance with the control stream. Double buffer areas are prepared in a memory of the stream processing apparatus into which the program and the parameter are stored. The location of the data stream to be input is written in the control stream, and buffers for reading the data stream are multiplexed so as to read in advance the top portion of the data stream to be processed next.2009-06-04
20090144528METHOD FOR RUNNING NATIVE CODE ACROSS SINGLE OR MULTI-CORE HYBRID PROCESSOR ACHITECTURE - Provided is a method that enables an interpretive engine to execute in a non-homogeneous, multiple processor architecture. Am interpretive engine is modified to identify code native to a target processor that is executing an ISA different than the ISA of the processor executing the interpretive engine. An intermediate function is called to correlate the native code with a processor type and a target processor is identified. A context is created for the native code and the context is either transmitted to the target processor or stored in a memory location such that the target processor may retrieve the context. Once the context is transmitted, the target processor executes the task. Results are either transmitted to the originating processor or placed in memory such that the originating processor can access the result and the originating processor is signaled of the completion of the task.2009-06-04
20090144529SIMD Code Generation For Loops With Mixed Data Lengths - Generating loop code to execute on Single-Instruction Multiple-Datapath (SIMD) architectures, where the loop operates on datatypes having different lengths, is disclosed. Further, a preferred embodiment of the present invention includes a novel technique to efficiently realign or shift arbitrary streams to an arbitrary offset, regardless whether the alignments or offsets are known at the compile time or not. This technique enables the application of advanced alignment optimizations to runtime alignment. Length conversion operations, for packing and unpacking data values, are included in the alignment handling framework. These operations are formally defined in terms of standard SIMD instructions that are readily available on various SIMD platforms. This allows sequential loop code operating on datatypes of disparate length to be transformed (“simdized”) into optimized SIMD code through a fully automated process.2009-06-04
20090144530Operating environment configuration system and method - An operating environment configuration system comprises a first operating system of a computer device having at least one configuration setting associated therewith, and a second operating system of the computer device configured to automatically retrieve the at least one configuration setting and configure at least one component associated with the second operating system with the at least one configuration setting.2009-06-04
20090144531BOOTING WITH SUB SOCKET PARTITIONING - A method of booting up a computer system comprising a first multi-cored processor comprising a first plurality of cores and a second multi-cored processor comprising a second plurality of cores is disclosed. The method may comprise configuring a first partition comprising a first one or more cores from the first plurality of cores and from the second plurality of cores, configuring a second partition comprising a second one or more cores from the first plurality of cores and from the second plurality of cores, and configuring a third partition comprising a third one or more cores from the first plurality of cores and one or more cores from the second plurality of cores.2009-06-04
20090144532EFFICIENT METHOD FOR OPERATING SYSTEM DEPLOYMENT - Method and computer storage media for efficiently deploying an operating system are provided. A virtual hard drive file is received by a computing device. Upon receipt of the virtual hard drive file, the computing device is enhanced to expose and mount the virtual hard drive as a drive and boot option for the computing device. Thereafter, an initial boot sequence may be commenced utilizing the virtual hard drive file as the boot source. In some embodiments, a boot manager enhancer and a translator are utilized to do one or more of expose, mount and translate the virtual hard drive file. In some embodiments, a virtual SCSI miniport driver is utilized to do one or more of expose, mount, and translate the virtual hard drive file.2009-06-04
20090144533Firmware exclusive access of a peripheral storage device - A method includes searching a peripheral storage device for a key during a firmware boot process of a computer system. Operating system access to the peripheral storage device is disabled if the key exists. Another method includes disabling operating system access to a peripheral storage device coupled to a pre-determined attachment point of a computer system during a firmware boot process of the computer system.2009-06-04
20090144534Data Processing Systems and Methods - Various improvements to data processing systems involve enhancements to BIOS functionality, use of identifiers associated with specific instances of hardware, and data hiding techniques—sometimes alone, sometimes in combination. Many of these improvements can be applied to increase the security of computer systems, and networks of which they form part.2009-06-04
20090144535Method for automatically restoring system configuration with a single key - A method for automatically restoring a system configuration with a single key in a computer having a power button is provided. The method includes detecting a press mode of the power button; determining a relevant restoring item according to the press mode; performing a process for restoring the system configuration corresponding to the restoring item, which aims at updating/recovering the system configuration, or clearing the system configuration setting stored in a CMOS memory; and performing a normal boot process.2009-06-04
20090144536Monitoring method and monitor apparatus - A monitoring method and a monitor apparatus thereof are disclosed. The monitor apparatus is used to monitor an USB port of a computer. The monitor apparatus comprises an input/output control unit and a basic input/output system code storage unit. The basic input/output system code storage unit is used to store a basic input/output system code. A monitor method comprises following steps: executing the basic input/output system code; determining whether the USB port connects with a USB device or not; if the USB port connects with a USB device, reading out an identification of the USB device; determining whether the identification is a certified identification or not; and executing a correspondingly process if the identification is not a certified identification.2009-06-04
20090144537INFORMATION PROCESSING APPARATUS AND METHOD FOR STARTING UP INFORMATION PROCESSING APPARATUS - An information processing apparatus includes: a power button; a switching unit that switches a plurality of peripheral devices connected to the apparatus between a detectable state and an undetectable state; a determination unit that determines whether the start-up operation is a normal start-up operation for starting up all of the peripheral devices or a specific start-up operation for starting up a specific peripheral device that is selected from among the peripheral devices; a first switching control unit that controls the switching unit to switch the specific peripheral device to the detectable state and to switch a non-specific peripheral device that is selected from among the peripheral devices except the specific peripheral device to the undetectable state; and a second switching control unit that controls the switching unit to switch the non-specific peripheral device to the detectable state after the specific peripheral device is detected by the operating system.2009-06-04
20090144538Patch installation at boot time for dynamically installable, piecemeal revertible patches - A method for booting a computer operating system is provided. A boot loader is loaded from a first flash memory to a random access memory and executed. In one embodiment, the boot loader loads from a second flash memory to a random access memory an operating system file system image archive, installs the operating system file system image archive as a root file system, loads from the second flash memory multiple operating system patches stored separately from the base operating system file system image archive, and installs the multiple operating system patches over the root file system. In another embodiment, the boot loader loads and executes an initialization script that performs the operations instead of the boot loader.2009-06-04
20090144539HEADEND SYSTEM FOR DOWNLOADABLE CONDITIONAL ACCESS SERVICE AND METHOD OF OPERATING THE SAME - A method of operating a headend system for a downloadable conditional access service, the method including: receiving, by an Authentication Proxy (AP) server, basic authentication information from a Downloadable Conditional Access System (DCAS) host, the basic authentication information being required to authenticate the DCAS host; transmitting, by the AP server, the basic authentication information to an external trusted authority device which authenticates the DCAS host; generating, by the AP server, a session key for encrypting/decrypting a secure micro client using a session key sharing factor; obtaining, by the AP server, download-related information of the secure micro client from a DCAS Provisioning Server (DPS); and commanding, by the AP server, an Integrated Personalization System (IPS) server to download the secure micro client to the DCAS host based on the download-related information, the secure micro client being encrypted by the session key.2009-06-04
20090144540CERTIFICATE MANAGEMENT WITH CONSEQUENCE INDICATION - A certificate management operation request is managed on a device, access to which is governed by an authentication certificate. Upon receiving a request to perform a certificate management operation on a certificate, a consequence of performing the certificate management operation is determined and the consequence is indicated via a user interface of the device. For example, anytime a user attempts to use a certificate management application to delete, distrust or revoke a certificate, it is determined whether the certificate meets certain criteria, such as the certificate being the authentication certificate or being in the certificate chain of the authentication certificate. If the certificate meets the criteria, the user may be notified of a lack of permission to perform the requested operation and the operation may be prevented from completing. Alternatively, the user may be permitted to confirm the instruction to perform the requested operation, and the operation may be completed.2009-06-04
20090144541METHOD AND APPARATUS OF MUTUAL AUTHENTICATION AND KEY DISTRIBUTION FOR DOWNLOADABLE CONDITIONAL ACCESS SYSTEM IN DIGITAL CABLE BROADCASTING NETWORK - A method and apparatus of X.509 certificate-based mutual authentication and key distribution for a Downloadable Conditional Access System (DCAS) in a digital cable broadcasting network is provided for composing a software-based secure DCAS in various Conditional Access Systems (CASs) based on an embodiment form of Conditional Access (CA) application for CA of digital cable broadcasting.2009-06-04
20090144542SYSTEM FOR DISTRIBUTING DIGITAL MEDIA TO EXHIBITORS - A system for packaging digital media and distributing digital media to exhibitors is described, which system enables distribution by utilizing media content booking, media content packaging, encryption, and delivery components.2009-06-04
20090144543SECRET SHARING DEVICE, METHOD, AND PROGRAM - A secret sharing device of (k, n) threshold scheme creates a generator matrix G, first divided secret data, and random number data, calculates shared partial data based on the product of matrices with the random number data, the divided secret data, and the generator matrix G, and delivers the shared information formed by the shared partial data and the header information individually to the storage units. The secret sharing device calculates a recovery matrix and multiplies the shared information by the recovery matrix, hence to recover the secret information.2009-06-04
20090144544CABLE NETWORK SYSTEM AND METHOD FOR CONTROLLING SECURITY IN CABLE NETWORK ENCRYPTED DYNAMIC MULTICAST SESSION - A security control method in a cable network dynamic multicast session, and more particularly, a method of controlling forward secrecy and backward secrecy in a Data Over Cable Service Interface Specifications (DOCSIS) 3.0 network dynamic multicast session is provided. A security control method in a cable network dynamic multicast session, includes: maintaining a multicast group that is allocated with a first Downstream Service Identifier (DSID) and a first Security Association Identifier (SAID) and that is joined by a first cable modem and a second cable modem; receiving a LeaveMulticastSession message from the second cable modem; exchanging, corresponding to the LeaveMulticastSession message, a Dynamic Bonding Change (DBC) message for changing a multicast parameter with the second cable modem; and updating a first Traffic Encryption Key (TEK) corresponding to the first DSID with a second TEK.2009-06-04
20090144545COMPUTER SYSTEM SECURITY USING FILE SYSTEM ACCESS PATTERN HEURISTICS - A system for computer system security using file system access pattern heuristics is provided. The system includes access patterns to establish nominal read and write frequencies to a file system using heuristics, dynamic policies, and a policy manager. The policy manager monitors accesses to the file system to determine read and write access frequencies to the file system. The policy manager also compares the read and write access frequencies to the access patterns, and determines whether the read and write access frequencies exceed the access patterns per the dynamic policies. The policy manager further identifies an attack on the file system in response to exceeding the dynamic policies, where the identified attack is associated with a communication path to the file system. The policy manager additionally modifies an aspect of access via the communication path in accordance with the attack response in the dynamic policies to mitigate the attack.2009-06-04
20090144546APPLICATION CONTROLLED ENCRYPTION OF WEB BROWSER DATA - A browser cache-securing component facilitates online communication of confidential data, such as for financial information, purchasing transactions, or user identification. Caching webpages for subsequent presentation enhances user productivity and efficiency while reducing burdens on network resources. Yet, the security risks of intrusions into cache memory are mitigated by retaining encrypted data in cache memory without prior decryption. A modest overhead in decrypting when and if the webpage is to be presented again gains a security and privacy advantage without taking away functionality. Decrypted versions of confidential data can thereby be relegated to volatile memory. Upon termination of a session, a session key shared by a network server is deleted, preventing subsequent decryption. Executing the browser cache-securing component in a virtual machine environment allows multiple browser types to benefit from the security feature.2009-06-04
20090144547AUTHENTICATION PROTOCOL - The invention relates to an authentication protocol for increasing safety against a man-in-the-middle (MITM) access attack for point-to-point communication (2009-06-04
20090144548AUTHENTICATION WHILE EXCHANGING DATA IN A COMMUNICATION SYSTEM - An apparatus and method is described for authentication while exchanging data in a communication system includes deriving (2009-06-04
20090144549COPYRIGHT PROTECTION PROCESSING APPARATUS AND COPYRIGHT PROTECTION PROCESSING METHOD - According to one embodiment, a copyright protection processing apparatus is provided in a source device containing content items that are objects of copyright protection. The apparatus includes a network interface which is connected to a sink device which utilizes the content items, and a protection process section which executes mutual authentication for exchanging keys requested by the sink device in a state where a network connection is established with the sink device via the network interface and performs a protection process of encrypting the content items by the secret key shared as a result of successful mutual authentication and transmitting the encrypted content items to the sink device. A content list process section adds an item of error information to the content list to be transmitted to the sink device, upon failure in the mutual authentication.2009-06-04
20090144550METHOD AND SYSTEM FOR SECURE COMMUNICATION IN NEAR FIELD COMMUNICATION NETWORK - Disclosed is a method for secure communication between a plurality of electronic devices in a Near Field Communication (NFC) network, and a system for supporting the method. To this end, a first electronic device shares a plurality of keys with the at least one device among the plurality of electronic devices and selects a first key among the plurality of keys and exchanges data encrypted based on the first key with the at least one device among the plurality of electronic devices and replaces the first key with at least one key among the plurality of keys while exchanging the data after at least one predetermined criterion has been satisfied.2009-06-04
20090144551Period Keys - A method for securing encryption keys is described, the method including providing a first device and a second device, the first device including first secure hardware and first insecure hardware, and the second device including second secure hardware and second insecure hardware, generating in the first secure hardware at least two period keys, the at least two period keys stored in the first secure hardware, generating in the first secure hardware a plurality of session keys, the session keys being stored in either the first secure hardware or the first insecure hardware, encrypting at least one of the plurality of session keys generated in the first device according to a first of the two period keys included in the first secure hardware, encrypting at least one of the plurality of session keys generated in the first device according to a second of the two period keys included in the first secure hardware, generating in the second secure hardware at least two period keys, the at least two period keys stored in the second secure hardware, generating in the second secure hardware a plurality of session keys, the session keys being stored in either the second secure hardware or the second insecure hardware, encrypting at least one of the plurality of session keys generated in the second device according to a first of the two period keys included in the second secure hardware, encrypting at least one of the plurality of session keys generated in the second device according to a second of the two period keys included in the second secure hardware, at a time when a session is established between the first device and the second device, decrypting one encrypted session key in the first device and decrypting one encrypted session key in the second device, and establishing an encrypted session between first device and the second device, the encrypted session being encrypted according to the one decrypted session key included in the first device and the one decrypted session key included in the second device, wherein the at least two period keys included in the first device and the at least two period keys included in the second device are periodically regenerated in order to produce new period keys, thereby rendering useless any session keys encrypted according to an old period key.2009-06-04
20090144552Method of Electronic Archiving, In Particular Remote Archiving, of Documents or Objects - The invention relates to a method of electronic archiving, in particular remote archiving, of at least one document or object. The method is characterized in that it comprises the operations of creating a digital document of the document or object to be archived, of electronically signing the document and of sealing the document, with date-stamping, of creating a sealed envelope containing the document with the certificate of signing, of drawing up a certificate for the operation of creating the envelope and of transporting the envelope with its certificate to the place of archiving, of opening the envelope at this place, while checking the integrity of the envelope and the document and of archiving the latter on a long-duration medium for use with the elements proving the integrity of the document. The invention is usable for the archiving of documents or objects2009-06-04
20090144553SYSTEM AND METHOD OF CONTROLLING ACCESS TO A DEVICE - A method of controlling access to a device. First information is provided. Second information is retrieved from the device. The first information is used to retrieve associated third information. A key is generated based on the second information and the third information. Access to the device is controlled by using the key.2009-06-04
20090144554Two-way authentication with non-disclosing password entry - A method of two-way authentication between a user and a known host using a non-disclosing password entry system generates a matrix of characters having a random characteristic with random characteristics being selected from a set of custom symbols, pictures or patterns (rather than alpha-numeric characters) that only the user recognizes. When the user sets up an account with the known host, a subset of these characteristics is predetermined for use specifically by the user. One or more of these may additionally be used in the user's PIN or password for easy memorization, allowing the user to first authenticate the log-in screen before the user enters the PIN for user authentication to the known host. Alternatively, randomized alpha-numeric characters may be used, but with a predefined grouping or subset of the characters in a predefined position on the initial character matrix presentation. If the user doesn't see the predefined special characters or figures in the character matrix, or the particular alpha-numeric subset in the character matrix, then the log-in screen is recognized as a fake.2009-06-04
20090144555FIXED CLIENT IDENTIFICATION SYSTEM FOR POSITIVE IDENTIFICATION OF CLIENT TO SERVER - A tamperproof ClientID system to uniquely identify a client machine is invoked upon connection of a client application to a backend. Upon initial connection, the backend issues a unique ClientID containing a checksum. The client application prepares at least two different scrambled versions of the ClientID and stores them in respective predetermined locations on the client machine. Upon subsequent connection to the backend, the client application retrieves and unscrambles the values at the two locations, verifies the checksums and compares the values. If the checksums are both correct and the values match, the ClientID value is sent to the backend, otherwise the client application sends an error code.2009-06-04
20090144556GENERIC ELECTRONIC KEY PROVIDED WITH A CUSTOMIZED SMART CARD - A portable electronic device has a case including: a smart chip, an application which is stored in the smart chip, at least one interface for a user, and a microcontroller which controls the smart chip and the interface. The aforementioned microcontroller is configured to execute the primitive functions of the electronic key in order for the interface to be used, while the smart chip is configured to execute the application. The application is configured to generate calls to the primitive functions in order to communicate with the user by means of the interface.2009-06-04
20090144557RECOVERABLE SECURE DATA STORE SYSTEM AND METHOD - A data security provision system and method are provided herein.2009-06-04
20090144558Method For Anit-Keylogger - A method for preventing keyloggers from logging text data, that is outputted by a computer user data input device. By encrypting the text data of the user data input device, the keyloggers cannot understand the text data of the user data input device in a computer.2009-06-04
20090144559ELECTRONIC DEVICE BOOTED UP WITH SECURITY, A HASH COMPUTING METHOD, AND A BOOT-UP METHOD THEREOF - A method for authenticating a public key to execute a process with security, including: invoking a process; reading a public key from a first source; calculating a hash value of the public key with a block encryption algorithm, wherein part of the public key is an initial input value of the block encryption algorithm; reading a hash value from a second source; comparing the calculated hash value to the read hash value to determine if the public key is authentic; and executing the process if the public key is authentic.2009-06-04
20090144560Image retrieval system and method - An image retrieval system that provides secured image data in response to a query specified by a user. The system includes a data retrieval unit, an encryption unit, and an output unit. The data retrieval unit is configured to retrieve image data relevant to the specified query from a collection of image data. The encryption unit is configured to encrypt at least a portion of the retrieved image data according to the specified query. The output unit is configured to output the at least partially encrypted image data to the user. The image data represents an image formed of one or more regions each having a keyword associated therewith. The encrypted portion is decryptable by the user only when the user is authorized to view the entire image.2009-06-04
20090144561Method and System for Software Protection Using Binary Encoding - Software is protected by encoding the target software instructions and decoding the target instructions.2009-06-04
20090144562Method and system for encryption of file characteristics of .ZIP files - The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data. 2009-06-04
20090144563Method of detecting data tampering on a storage system - A storage system according to the invention maintains an arithmetic signature or fingerprint generated using the content of selected units of data stored on the media. The signature is stored in metadata in non-volatile storage on the system's electronics card preferably in a tamper resistant module (TRM). When reading a data unit from storage, the system uses the saved signature to verify that the data unit has not been altered by unauthorized means after it was stored. The content of the stored data is thereby bound to the metadata stored in the system's non-volatile storage so that by-passing or physically separating the bulk storage media (e.g. disks) from the system's electronics will not allow alteration of the data without detection. The method also prevents unauthorized data roll-back because the signature of old data will not match the current signature in the metadata.2009-06-04
20090144564DATA ENCRYPTION INTERFACE FOR REDUCING ENCRYPT LATENCY IMPACT ON STANDARD TRAFFIC - Methods and apparatus that may be utilized in systems to reduce the impact of latency associated with encrypting data on non-encrypted data are provided. Secure and non-secure data may be routed independently. Thus, non-secure data may be forwarded on (e.g., to targeted write buffers), without waiting for previously sent secure data to be encrypted. As a result, non-secure data may be made available for subsequent processing much earlier than in conventional systems utilizing a common data path for both secure and non-secure data.2009-06-04
20090144565Method and system for asymmetrically encrypting .ZIP files - The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data.2009-06-04
20090144566Method for Equalizing Performance of Computing Components - A performance measure (e.g., processor speed) for computing components such as servers is optimized by creating models of power consumption versus the performance measure for each server, adding the power models to derive an overall power model, and calculating an optimum set point for the performance measure which corresponds to a power limit on the servers using the overall power model. The set point is then used to set power budgets for the servers based on their power models, and the servers maintain power levels no greater than their respective power budgets. The server power models are preferably created in real time by monitoring power consumption and the performance measure to derive sets of data points for the servers, and performing regression on the sets of data points to yield power models for the servers. Multiple server power models may be created for different program applications.2009-06-04
20090144567BLADE SERVER - A blade server that includes at least two data processing modules for receiving data and processing the received data; an exchange backboard for achieving data exchange between the data processing modules, and also for achieving data exchange between each of the data processing modules and an interconnection module; the interconnection module for achieving connection and high-speed data exchange between the data processing modules; an I/O interface module for achieving a connection between the blade server and an external network; and a management and control module for controlling the switching between the data processing modules and also for monitoring and managing the blade server. The blade server unites multiple networks such as a high-speed network, an Ethernet, a KVM network and a management network, reduces the cost for high-speed exchange, and reduces the delay for network exchange.2009-06-04
20090144568APPARATUS AND METHOD FOR MODULAR DYNAMICALLY POWER MANAGED POWER SUPPLY AND COOLING SYSTEM FOR COMPUTER SYSTEMS, SERVER APPLICATIONS, AND OTHER ELECTRONIC DEVICES - Network architecture, computer system and/or server, circuit, device, apparatus, method, and computer program and control mechanism for managing power consumption and workload in computer system and data and information servers. Further provides power and energy consumption and workload management and control systems and architectures for high-density and modular multi-server computer systems that maintain performance while conserving energy and method for power management and workload management. Dynamic server power management and optional dynamic workload management for multi-server environments is provided by aspects of the invention. Modular network devices and integrated server system, including modular servers, management units, switches and switching fabrics, modular power supplies and modular fans and a special backplane architecture are provided as well as dynamically reconfigurable multi-purpose modules and servers. Backplane architecture, structure, and method that has no active components and separate power supply lines and protection to provide high reliability in server environment.2009-06-04
20090144569COMMUNICATION DEVICE, AMC AND METHOD FOR SUPPLYING POWER TO THE AMC - A communication device includes a power supply system, the power supply system includes: an MCH, a power module, and at least one AMC module. The AMC module is adapted to send a load power supply control command according to a received load power supply control request. The power module is adapted to receive input of external power supply, and provide management power supply and load power supply after converting the input of external power supply. The at least one Advanced Mezzanine Card (AMC) module is adapted to send the load power control request to the MCH, receive the load power supply control command sent by the MCH, and control provision of the load power supply of the power module according to the load power supply control command.2009-06-04
20090144570SYSTEM AND METHOD FOR PREVENTING USER O.S. IN VMM SYSTEM FROM DEENERGIZING DEVICE BEING USED BY SERVICE O.S. - A call from a user operating system (UOS) to BIOS to configure a connected device into a reduced energy consumption mode is routed through a virtual machine monitor (VMM). The VMM determines whether a service O.S. (SOS) is in need of the device and if so the VMM informs the UOS that the device has been configured as ordered, while allowing the SOS to complete its task with the device. If the SOS is not in need of the device, or at the completion of the SOS task with the device, the VMM passes the call to ACPI/BIOS to configure the device in the demanded energy consumption mode.2009-06-04
20090144571INTEGRATED CIRCUIT APPARATUS - An integrated circuit apparatus may include: a plurality of power domains to which power voltage is separately supplied; a plurality of circuit macros belonging to a plurality of the power domains respectively; a plurality of power switches to conduct or to substantially block power coming from a power circuit and going to the plurality power domains, respectively; and a power-controlling unit including a controller to control the plurality of power switches, a power domain register to store power domain data which corresponds to a plurality of external interrupt signals that are indicative of power domains that are to be activated; and an interrupt handler to respond to the external interrupt signals by delivering the power domain data corresponding to the external interrupt signals to the controller, the controller being operable to turn on/off the power switches corresponding to the power domain data, respectively.2009-06-04
20090144572APPARATUS AND METHOD FOR CONTROLLING VOLTAGE AND FREQUENCY - A method and an apparatus for controlling voltage level and clock signal frequency supplied to a system. The apparatus includes a hardware module, adapted to receive at least one indication of a load of the system and to determine a voltage level and a clock signal frequency to be provided to the system, and a software module, adapted to configure a voltage source and a clock signal source in response to the determination. The method includes: (i) receiving, at a hardware module, indication of a load of a system; (ii) determining, by the hardware module, a voltage level and a clock signal frequency to be provided to the system; and (iii) configuring, by a software module, a voltage source and a clock signal source in response to the determination.2009-06-04
20090144573IMAGE FORMING APPARATUS AND CONTROL METHOD OF IMAGE FORMING APPARATUS - A disclosed image forming apparatus includes a printing unit configured to print an image onto a recording sheet based on image data; a controlling unit configured to control a print execution process for the printing unit and to control all units of the image forming apparatus; and a monitoring unit configured to monitor, while the printing unit and the controlling unit are in a power-saving mode in which power supply to the printing unit and the controlling unit is stopped, whether there is a resuming factor for resuming operation from the power-saving mode. The monitoring unit includes a requesting unit configured to send, to the printing unit, a request to resume operation and a request to set a printing mode, before sending a request to resume operation to the controlling unit, in the event that the resuming factor is detected.2009-06-04
20090144574Method and Device for Controlling Operation of a Portable Electronic Device - A method for controlling operation of a portable electronic device includes detecting an angle between a lid of the portable electronic device and a plumb line and controlling the operation of the portable electronic device according to the angle.2009-06-04
20090144575CHARGING OF MOBILE DEVICES - A system which enables battery powered devices such as notebook computers to efficiently charge smaller mobile devices such as music players, cell phones and PDAs using the power signals provided over their data connections is made more efficient by ensuring that the power to the small mobile device is not interrupted should the notebook computer otherwise go into a standby or low-power state. The presence of the small mobile device is known and any power-down capabilities of the notebook computer are limited, at least for the period where the small mobile device is being recharged. This detection can be done at any of the levels of software present in the notebook computer. This charging and not powering down can be further optimized by determining the particular device and its charging requirements or by having the device provide feedback as to its charge state.2009-06-04
20090144576SYSTEM AND METHOD FOR PRESERVING PROCESSOR MEMORY DURING POWER LOSS - A method, and a system of using the method, of preserving memory of a processor powered by an external source. The method includes determining a drop in a first power to be supplied to the processor, generating a reset signal when the drop falls below a threshold, supplying a second power from a power store to the processor based on the reset signal, and holding the reset signal until the first power rises above the threshold.2009-06-04
20090144577DYNAMIC BATTERY CAPACITY ALLOCATION FOR DATA RETENTION AMONG MOBILE COMPUTERS AND ELECTRONIC DEVICES - Systems devices and/or methods that facilitate dynamic battery capacity allocation are presented. Extended use times or smaller form factors can be achieved for devices employing dynamic battery capacity allocation. By determining factors that can include the type of memory, the usage of the memory, and/or the user's preference to continue to use a device rather than retain data in a volatile memory for a period of time before supplying alternative power, the device can be available for use for longer periods of time on a battery or a smaller battery can be used to achieve similar use time.2009-06-04
20090144578POWER MANAGEMENT UNIT AND SYSTEMS LSI HAVING THE POWER MANAGEMENT UNIT - A power management unit for controlling power supply voltages of first and second power domains to which first and second CPUs belong respectively includes a power IC which supplies first and second power supply voltages to the first and second power domains respectively; a clock generating portion which generates first and second clocks and supplies the first and second clocks to the first and second CPUs respectively; and a power and clock control portion which is connected both to the power IC and to the clock generating portion.2009-06-04
20090144579Methods and Apparatus for Handling Errors Involving Virtual Machines - A virtual machine monitor (VMM) in a data processing system handles errors involving virtual machines (VMs) in the processing system. For instance, an error manager in the VMM may detect an uncorrectable error in involving a component associated with a first VM in the processing system. In response to detection of that error, the error manager may terminate the first VM, while allowing a second VM in the processing system to continue operating. In one embodiment, the error manager automatically determines which VM is affected by the uncorrectable error, in response to detecting the uncorrectable error. The error manager may also automatically spawn a new VM to replace the first VM, if the processing system has sufficient resources to support the new VM. Other embodiments are described and claimed.2009-06-04
20090144580Data Transfer Controlling Method, Content Transfer Controlling Method, Content Processing Information Acquisition Method And Content Transfer System - A method of controlling data transfer, a method of controlling content transfer, a method of obtaining content processing information, and a system for transferring content are provided. The method of controlling data transfer in a data interoperable environment includes: receiving a request for transmitting data from a client; gathering information on entities which are to participate in transmitting data; forming a chain including at least two entities by using the gathered information on the entities; transmitting a plurality of data through the chain; and receiving an event message for representing a transmission status of the data transmitted from at least one of the entities included in the chain. Accordingly, it is possible to control a transmission of the data so that the plurality of data can be transmitted through a single session and to receive the transmission status of the data as an event message.2009-06-04
20090144581Data Transfer Controlling Method, Content Transfer Controlling Method, Content Processing Information Acquisition Method And Content Transfer System - A method of controlling data transfer, a method of controlling content transfer, a method of obtaining content processing information, and a system for transferring content are provided. The method of controlling data transfer in a data interoperable environment includes: receiving a request for transmitting data from a client; gathering information on entities which are to participate in transmitting data; forming a chain including at least two entities by using the gathered information on the entities; transmitting a plurality of data through the chain; and receiving an event message for representing a transmission status of the data transmitted from at least one of the entities included in the chain. Accordingly, it is possible to control a transmission of the data so that the plurality of data can be transmitted through a single session and to receive the transmission status of the data as an event message.2009-06-04
20090144582ANTI-VIRUS METHOD BASED ON SECURITY CHIP - An anti-virus method based on a security chip according to the present invention is provided. The method comprises the following steps: a hash value obtained by a hashing operation for a computer key file and a system control program are stored in a memory of the security chip, and a backup file of the computer key file is stored in a backup storage area. When power up, the integrity of the system control program is verified by using the hash value of the system control program stored in the memory of the security chip. If the system control program is integral, a control is executed by the system control program, and the system control program verifies the integrity of the computer key file using the hash value of the computer key file stored in the memory of the security chip. If all the computer key files are integral, the operating system is started; on the contrary, if any of the computer key file is not integral, it will be restored using the backup file of the computer key file stored in the backup storage area.2009-06-04
20090144583Memory Circuit - The invention provides a memory circuit comprising a plurality of storage cells for storing data and redundant spare storage cells for replacing defective storage cells, and a memory access logic for accessing said storage cells connected to a replacement setting register which is writeable during operation of said memory circuit to store replacement settings.2009-06-04
20090144584System and method for performance monitoring and repair of computers - A system and method for monitoring computer performance and repairing and/or optimizing system configurations. During these idle times, the present process executes a sequence of background system analyses that can trigger associated optimization, maintenance, or repair actions based on a comparison of current computer states and baseline optimal health data. If other tasks are initiated by a user of the system, while the present invention is performing any of its actions, the monitoring and repair program terminates itself and releases full control back to the user and operating system.2009-06-04
20090144585Debugging method of the basic input/output system - A debugging method of the BIOS is disclosed. Firstly a debugging routine is written into a boot program. Then the BIOS executes the boot program. The BIOS judges whether a status value is equal to a default value of the debugging routine or not. When the status value is equal to the default value, the BIOS outputs a test value according to the debugging routine. When the status value is not equal to the default value, the debugging routine is quit, and the BIOS continues to execute the boot program.2009-06-04
20090144586SYSTEM AND PROGRAM PRODUCTS FOR FACILITATING ACCESS TO STATUS AND MEASUREMENT DATA ASSOCIATED WITH INPUT/OUTPUT PROCESSING - Input/output processing is facilitated by readily enabling access to information associated with input/output processing. This information includes status information and measurement data provided by a control unit executing input/output commands. The status and measurement data are provided in a status control block identified in a transport control word, which is further used to specify a location in memory that includes the input/output commands to be executed.2009-06-04
20090144587DEVICE AND METHOD FOR ELECTRONIC CONTROLLING - An electronic controlling device and method is disclosed. One embodiment provides at least one module performing specific functions within one of a plurality of module modes on reception of a corresponding module mode request. A system control unit is provided to operate the at least module in one of a plurality of module modes by distributing a corresponding system mode request. The at least one module is adapted to translate the distributed system mode request to a module mode request which is configurable.2009-06-04
20090144588FINITE STATE MACHINE ERROR RECOVERY - The use of a simple (e.g., magnitude comparator) circuit, and of a flag bit, for detecting and preventing errors from occurring in the FSM state bits that could otherwise cause the system to hang. Preferably, the flag bit is set with all the valid state transitions, and a magnitude comparator (for instance) is used to continuously monitor the value of the current state bits. When a FSM state transition occurs based on the flag bit and the output of the magnitude comparator, a potential error condition can be detected and the FSM transition can be blocked or the FSM can be safely transitioned into a predetermined “reset state”.2009-06-04
20090144589DEVICE AND METHOD FOR CONTROLLING AN EXECUTION OF A DMA TASK - A method for controlling an execution of a first DMA task, the method includes comprises monitoring an execution of the first DMA task, the method characterized by including defining a first DMA task execution interval and a first DMA task execution sub-interval; and performing a first possible timing violation responsive operation if the first DMA task was not completed during the first DMA task execution sub-interval. A device having a first DMA task controlling capabilities, the device includes a memory unit; characterized by including a DMA controller that is adapted to monitor an execution of the first DMA task that involves an access to the memory unit, and to perform a first possible timing violation responsive operation if the first DMA task was not completed during a first DMA task execution sub-interval.2009-06-04
20090144590INTERLEAVING REDUNDANCY APPARATUS AND METHOD - One embodiment of the invention relates to a network communication device. The network communication device includes a network interface configured to receive an initial data stream. The network communication device also includes an interleaving redundancy encoder that comprises a memory unit arranged in N columns and D rows. The interleaving redundancy encoder is configured to calculate at least one redundancy byte based on a series of equally spaced, non-consecutive bytes in the initial data stream, where a number of bytes between equally spaced bytes is approximately equal to D−1. Other systems and methods are also disclosed.2009-06-04
20090144591DETERMINING BIT ERROR RATE USING SINGLE DATA BURST - A communication system comprises a transceiver capable of receiving a data burst as part of a paging block. The system also comprises processing logic capable of comparing at least part of the data burst to a plurality of permutations of the data burst to locate a matching permutation. The processing logic determines a bit error rate (BER) in accordance with a difference between the data burst and the matching permutation. The processing logic uses the BER to operate the communication system.2009-06-04
20090144592Method and Apparatus for Describing Components Adapted for Dynamically Modifying a Scan Path for System-on-Chip Testing - The present invention provides a new hardware description language for chip-level JTAG testing. This new hardware description language, referred to as New BSDL (NSDL), enables testing resources of a system-on-chip to be described, thereby enabling the system-on-chip to be described in a manner that facilitates testing of the system-on-chip. The present invention provides a bottom-up approach to describing a system-on-chip. The present invention supports algorithmic descriptions of each of the components of the system-on-chip, and supports an algorithmic description of interconnections between the components of the system-on-chip, thereby enabling generation of an algorithmic description of the entire system-on-chip or portions of the system-on-chip. The present invention supports devices adapted for dynamically modifying the scan path of a system-on-chip (referred to herein as crossroad devices), including methods for describing such devices and use of such devices to perform testing of system-on-chips.2009-06-04
20090144593Method and apparatus for describing parallel access to a system-on-chip - The present invention provides a new hardware description language for chip-level JTAG testing. This new hardware description language, referred to as New BSDL (NSDL), enables testing resources of a system-on-chip to be described, thereby enabling the system-on-chip to be described in a manner that facilitates testing of the system-on-chip. The present invention provides a bottom-up approach to describing a system-on-chip. The present invention supports algorithmic descriptions of each of the components of the system-on-chip, and supports an algorithmic description of interconnections between the components of the system-on-chip, thereby enabling generation of an algorithmic description of the entire system-on-chip or portions of the system-on-chip. The present invention supports parallel access to one or more system-on-chip devices, including methods for describing and using parallel access for testing.2009-06-04
20090144594METHOD AND APPARATUS FOR DESCRIBING AND TESTING A SYSTEM-ON-CHIP - The present invention provides a new hardware description language for chip-level JTAG testing. This new hardware description language, referred to as New BSDL (NSDL), enables testing resources of a system-on-chip to be described, thereby enabling the system-on-chip to be described in a manner that facilitates testing of the system-on-chip. The present invention provides a bottom-up approach to describing a system-on-chip. The present invention supports algorithmic descriptions of each of the components of the system-on-chip, and supports an algorithmic description of interconnections between the components of the system-on-chip, thereby enabling generation of an algorithmic description of the entire system-on-chip or portions of the system-on-chip.2009-06-04
20090144595BUILT-IN SELF-TESTING (BIST) OF FIELD PROGRAMMABLE OBJECT ARRAYS - A field programmable object array integrated circuit has built-in self-testing capability. The integrated circuit comprises an array of programmable objects, a plurality of interfaces, and a controller. The array of objects is designed to operate at an operational clock speed during non-testing operation, wherein the design of the objects is not constrained to require within an object extra circuitry not essential to non-testing operation to facilitate built-in self-testing. The interfaces are connected to the objects to enable communication with the objects and to thereby facilitate built-in self-testing of the objects. The controller causes a selected subset of the objects to be activated and configured for testing, to stimulate the selected subset for some time with an input test pattern delivered via the interfaces while the selected subset of objects operates at the operational clock speed, and to observe a response of the selected subset of objects.2009-06-04
20090144596DECODER WITH RESILIENCY TO HANDLE ERRORS IN A RECEIVED DATA STREAM - A decoder provided according to an aspect of the present invention determines a type of each network abstraction layer (NAL) unit, and discards a NAL unit when the size of the NAL unit is inconsistent with the size according to the determined type. According to another aspect, a decoder corrects for errors in the non-pay load portions and uses the corrected non-pay load portions to recover the original data contained in the payload portions of the data stream. In an embodiment, various global parameters (which are applicable to the data stream unless changed further in the data stream) and the values in the slice headers are examined to correct the parameters in the slice headers. According to one more aspect, an end of frame is reliably detected by using an expected number of macro-blocks in a frame and a set of logical conditions of slice header parameters.2009-06-04
20090144597ENCODING/DECODING TECHNIQUE FOR REBROADCASTING LOST PACKETS - When retransmitting lost packets of data to multiple devices in a wireless network, the original sequence of packets containing all the lost packets may be encoded into a smaller number of packets for the retransmission. These encoded packets may be collectively addressed to all the intended receiving devices through broadcast or multicast addressing. These encoded packets may then be selectively decoded by the receiving devices, using the successfully received previous packets as part of the decoding process. Repetitive exclusive OR algorithms may be used for encoding and decoding.2009-06-04
20090144598ERROR CORRECTING CODE PREDICATION SYSTEM AND METHOD - In memory devices that degrade with use, a memory controller may monitor and record a usage history of portions of the memory. The memory controller can then vary a strength of error correction coding to protect information written to various portions of the memory having different usage histories. More specifically, and memory can receive information to be stored in the memory, select a portion of memory to store the information, and store the information in the selected portion of the memory with an error correction coding having a strength that is based on a usage history of the selected portion of the memory.2009-06-04
20090144599METHOD FOR EVALUATING THE OPERATING SAFETY OF A SYSTEM - Evaluating the operating safety of a complex software and or hardware system such as a system for displaying flight information on an instrument panel of an aircraft. The evaluation method includes construction of a first architecture of the system, divided into several blocks each comprising data inputs/outputs, the inputs of a block being connected to the outputs of other blocks in the first architecture; identification of failures of the outputs of the blocks of the architecture; construction of first boolean expressions expressing the states of the outputs of the blocks of the first architecture as a function of the states of the identified failures, of the states of the inputs of the blocks; definition of a first feared event to be examined by a second boolean expression constructed based on the first boolean expressions; and reduction of the second boolean expression in a sum of monomials.2009-06-04
20090144600Efficient re-read operations from memory devices - A method for data storage includes storing data, which is encoded with an Error Correction Code (ECC), in a group of analog memory cells by writing respective first storage values to the memory cells in the group. After storing the data, respective second storage values are read from the memory cells in the group, and the read second storage values are processed so as to decode the ECC.2009-06-04
20090144601FEC-BASED RELIABILITY CONTROL PROTOCOLS - In a transport system, data is reliably transported from a sender to a receiver by organizing the data to be transported into data blocks, wherein each data block comprises a plurality of encoding units, transmitting encoding units of a first data block from the sender to the receiver, and detecting, at the sender, acknowledgments of receipt of encoding units by the receiver. At the sender, a probability that the receiver received sufficient encoding units of the first data block to recover the first data block at the receiver is detected and the probability is tested against a threshold probability to determine whether a predetermined test is met. Following the step of testing and prior to the sender receiving confirmation of recovery of the first data block at the receiver, when the predetermined test is met, transmitting encoding units of a second data block from the sender. If an indication of failure to recover the first data block is received at the sender, sending further encoding units for the first data block from the sender to the receiver. In some embodiments, the predetermined test is a comparison of the probability against the threshold probability and the predetermined test is met when the probability is greater than the threshold probability.2009-06-04
20090144602Method and System for Encoding or Decoding a Sequence of Digital Data - A method is provided for encoding and decoding a sequence of digital data, according to which a portion of the sequence of digital data corresponds to a data block that includes several data packets, at least two data packets per data block containing an identifier. The position of the data packet within the corresponding data block can be determined based on the identifier, and the data is encoded or decoded by taking into account the identifier.2009-06-04
20090144603Assigning Codes to and Repairing Huffman Trees - A method for assigning codes to Huffman trees and repairing invalid Huffman trees is disclosed using a calculated delta and moving nodes within the Huffman tree by adjusting their encode register entries.2009-06-04
20090144604CONVOLUTIONAL ENCODING WITH PARTITIONED PARALLEL ENCODING OPERATIONS - Convolutional encoding throughput is increased by partitioning input information bits into a plurality of blocks that are convolutionally encoded in parallel. A plurality of convolutional encoding operations which have respective initial encode states that are mutually different from one another are applied in parallel to one of the blocks to produce a respectively corresponding plurality of convolutional encoding results. One of the convolutional encoding results is selected based on a convolutional encoding operation applied to another of the blocks.2009-06-04
20090144605PAGE CLASSIFIER ENGINE - Embodiments of the present invention relate to classifying pages of an electronic document, such as a scanned book page. OCR software is applied to the contents of the electronic document, revealing semantic information about the content of the electronic document. Software-based features are applied to the semantic information to determine the type of page the electronic document is. Page types may include table of contents (TOC), table of figures (TOF), bibliography, index, or other types of pages commonly found in a book, magazine, or other publication. Once determined, the determined page type is stored and used by other software engines.2009-06-04
20090144606System and method for performing filtering operations on a hierarchical table - A system and method are described selectively filtering certain rows of a table. For example, a computer-implemented method according to one embodiment of the invention comprises: receiving user-specified filtering criteria from a client indicating one or more rows of a table to be included within a filtering operation; receiving filtering data comprising a value or range of values for filtering the one or more rows to be included within the filtering operation; filtering the one or more rows indicated by the user-specified filtering criteria using the filtering data to generate a set of filtered rows; and generating a table containing the filtered rows and other rows to which filtering was not applied.2009-06-04
20090144607Method and System for Localized Scrolling Table Display in a Webpage - The present invention discloses a method for localized scrolling table display in a webpage. The method includes: dividing a table being displayed into at least a 2×2 array of an upper left table, a lower left table, an upper right table and a lower right table; setting the lower left table and the upper right table to hide portions that are beyond display area; and setting the lower right table to hide portions that are beyond the display area and to include a vertical scrollbar and a horizontal scrollbar. The upper right table and the lower right table are controlled by the horizontal scrollbar, and the lower left table and the lower right table are controlled by the vertical scrollbar. The present invention is able to display a table in a webpage with a localized scrolling display and a partial frozen display, and allows unlimited number of data columns and rows in the webpage and still maintains good readability. This satisfies the need for displaying table of a large amount of data for data comparison, and allows the user to conveniently and freely scroll any cell of the table to the display area to be displayed.2009-06-04
20090144608Device and method for creating summaries of multimedia documents - The invention relates to a device (2009-06-04
20090144609NLP-based entity recognition and disambiguation - Methods and systems for entity recognition and disambiguation using natural language processing techniques are provided. Example embodiments provide an entity recognition and disambiguation system (ERDS) and process that, based upon input of a text segment, automatically determines which entities are being referred to by the text using both natural language processing techniques and analysis of information gleaned from contextual data in the surrounding text. In at least some embodiments, supplemental or related information that can be used to assist in the recognition and/or disambiguation process can be retrieved from knowledge repositories such as an ontology knowledge base. In one embodiment, the ERDS comprises a linguistic analysis engine, a knowledge analysis engine, and a disambiguation engine that cooperate to identify candidate entities from a knowledge repository and determine which of the candidates best matches the one or more detected entities in a text segment using context information.2009-06-04
20090144610TRANSLATING XML WITH MULTIPLE NAMESPACE EXTENSIONS - A plurality of namespace extensions in a XML file is managed. A file is parsed to identify the plurality of namespace extension elements. The namespace extension elements are grouped into a single element utilizing a set of rules.2009-06-04
20090144611ROLE-BASED XML+ CREATION TOOL - Methods and systems are provided for facilitating the creation of XML+ by presenting functionality and interfaces that clearly separate business and accounting logic from the technical specifications of the underlying language or standard.2009-06-04
20090144612DISPLAY OF DOCUMENT DATA - To locate a target document generated using a target language but other otherwise synchronized to a source document generated using a different source language, a URL or other document identifier for the source webpage is received and parsed to identify one or more elements; for example, a domain element or a path element. Each of the elements is analyzed to determine whether it includes one or more character strings associated with the source language; e.g., a language name, a language code, a country name and/or a country code. Each such character string is processed to generate a corresponding character string associated with the target language. A list of candidates for a second document identifier is generated and sequentially accessed to find the target document.2009-06-04
20090144613Overriding images in user interfaces - A method and apparatus for overriding images in user interfaces using web application styling sheets. In one embodiment, a method may include creating a first style sheet defining a first image. The first style sheet allows customization of the first image by referencing the first image using a background attribute and a first location. A second style sheet defines a second image using a background attribute and a second location. The method may further include creating a web page with a link to the first style sheet and a link to the second style sheet, and sending the web page to a client for presentation, where the second image overrides the first image when the web page is presented to a user.2009-06-04
20090144614DOCUMENT LAYOUT EXTRACTION - Computer-readable media, systems, and methods for document layout extraction are described. In embodiments, textual data in an electronic format is received and the textual data is converted from the electronic format to an independent interface format, the independent interface format including coordinates to one or more structural elements of the textual data. Further, in embodiments, a structure and layout analysis of the textual data is performed to generate a set of structure and layout information. Still further, in embodiments, the textual data and the set of structure and layout information is stored in an enriched interface format, the enriched interface format providing for search and navigation of the textual data.2009-06-04
Website © 2025 Advameg, Inc.